##
Updated at UTC 2026-04-24T04:23:12.159990
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-40630 | 9.8 | 0.00% | 2 | 0 | 2026-04-24T00:16:29.040000 | A vulnerability in SenseLive X3050’s web management interface allows unauthor | |
| CVE-2026-40620 | 9.8 | 0.00% | 2 | 0 | 2026-04-24T00:16:28.690000 | A vulnerability in SenseLive X3050’s embedded management service allows full adm | |
| CVE-2026-25775 | 9.8 | 0.00% | 2 | 0 | 2026-04-24T00:16:26.757000 | A vulnerability in SenseLive X3050’s remote management service allows firmware r | |
| CVE-2026-41353 | 8.1 | 0.00% | 2 | 0 | 2026-04-23T22:16:42.493000 | OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the | |
| CVE-2026-41352 | 8.8 | 0.00% | 2 | 0 | 2026-04-23T22:16:42.327000 | OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a | |
| CVE-2026-41349 | 8.8 | 0.00% | 2 | 0 | 2026-04-23T22:16:41.827000 | OpenClaw before 2026.3.28 contains an agentic consent bypass vulnerability allow | |
| CVE-2026-41336 | 7.8 | 0.00% | 2 | 0 | 2026-04-23T22:16:39.603000 | OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_B | |
| CVE-2026-33819 | 10.0 | 0.00% | 2 | 0 | 2026-04-23T22:16:37.817000 | Deserialization of untrusted data in Microsoft Bing allows an unauthorized attac | |
| CVE-2026-33102 | 9.3 | 0.00% | 2 | 0 | 2026-04-23T22:16:37.093000 | Url redirection to untrusted site ('open redirect') in M365 Copilot allows an un | |
| CVE-2026-32210 | 9.3 | 0.00% | 2 | 0 | 2026-04-23T22:16:35.260000 | Server-side request forgery (ssrf) in Microsoft Dynamics 365 (Online) allows an | |
| CVE-2026-32172 | 8.0 | 0.00% | 2 | 0 | 2026-04-23T22:16:33.720000 | Uncontrolled search path element in Microsoft Power Apps allows an unauthorized | |
| CVE-2026-26210 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T22:16:26.400000 | KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in | |
| CVE-2026-31178 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T21:32:28 | An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allo | |
| CVE-2026-6920 | 7.5 | 0.00% | 2 | 0 | 2026-04-23T21:32:28 | Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 al | |
| CVE-2026-39087 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T21:32:26 | An issue in Ntfy ntfy.sh before v.2.21 allows a remote attacker to execute arbit | |
| CVE-2026-31177 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T21:31:22 | An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allo | |
| CVE-2026-6942 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T21:16:06.947000 | radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerabi | |
| CVE-2026-41268 | 7.7 | 0.00% | 2 | 0 | 2026-04-23T21:16:06.120000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-28950 | 6.2 | 0.02% | 5 | 0 | 2026-04-23T21:16:05.527000 | A logging issue was addressed with improved data redaction. This issue is fixed | |
| CVE-2026-5816 | 8.0 | 0.01% | 1 | 0 | 2026-04-23T20:30:30.267000 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.10 | |
| CVE-2026-41138 | 8.3 | 0.00% | 2 | 0 | 2026-04-23T20:16:14.380000 | Flowise is a drag & drop user interface to build a customized large language mod | |
| CVE-2026-41246 | 8.1 | 0.00% | 2 | 0 | 2026-04-23T19:17:29.670000 | Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to be | |
| CVE-2026-40886 | 7.7 | 0.00% | 2 | 0 | 2026-04-23T19:17:28.617000 | Argo Workflows is an open source container-native workflow engine for orchestrat | |
| CVE-2026-31181 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T19:17:26.633000 | An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allo | |
| CVE-2025-62373 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T19:17:22.843000 | Pipecat is an open-source Python framework for building real-time voice and mult | |
| CVE-2026-34291 | 8.7 | 0.03% | 1 | 0 | 2026-04-23T18:48:51.783000 | Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (com | |
| CVE-2026-33999 | 7.8 | 0.00% | 2 | 0 | 2026-04-23T18:33:25 | A flaw was found in the X.Org X server. This integer underflow vulnerability, sp | |
| CVE-2026-40471 | 9.6 | 0.00% | 2 | 0 | 2026-04-23T18:33:25 | hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its en | |
| CVE-2026-40472 | 9.9 | 0.00% | 2 | 0 | 2026-04-23T18:33:23 | In hackage-server, user-controlled metadata from .cabal files are rendered into | |
| CVE-2026-35225 | None | 0.00% | 2 | 0 | 2026-04-23T18:33:23 | An unauthenticated remote attacker is able to exhaust all available TCP connecti | |
| CVE-2026-34001 | 7.8 | 0.00% | 2 | 0 | 2026-04-23T18:33:21 | A flaw was found in the X.Org X server. This use-after-free vulnerability occurs | |
| CVE-2026-41460 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T18:33:20 | SocialEngine versions 7.8.0 and prior contain a SQL injection vulnerability in t | |
| CVE-2026-41679 | 10.0 | 0.17% | 4 | 0 | 2026-04-23T18:16:29.447000 | Paperclip is a Node.js server and React UI that orchestrates a team of AI agents | |
| CVE-2026-41461 | 8.5 | 0.00% | 2 | 0 | 2026-04-23T18:16:29.330000 | SocialEngine versions 7.8.0 and prior contain a blind server-side request forger | |
| CVE-2026-34297 | 7.5 | 0.03% | 2 | 0 | 2026-04-23T18:10:28.700000 | Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business | |
| CVE-2026-33825 | 7.8 | 13.76% | 6 | 3 | 2026-04-23T17:26:30.713000 | Insufficient granularity of access control in Microsoft Defender allows an autho | |
| CVE-2026-40470 | 9.9 | 0.00% | 2 | 0 | 2026-04-23T16:16:25.523000 | A critical XSS vulnerability affected hackage-server and hackage.haskell.org. H | |
| CVE-2026-34003 | 7.8 | 0.00% | 2 | 0 | 2026-04-23T16:16:24.920000 | A flaw was found in the X.Org X server's XKB key types request validation. A loc | |
| CVE-2026-23751 | 9.8 | 0.00% | 2 | 0 | 2026-04-23T16:16:24.463000 | Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versi | |
| CVE-2026-31018 | 8.8 | 0.04% | 1 | 0 | 2026-04-23T16:15:59.613000 | In Dolibarr ERP & CRM <= 22.0.4, PHP code detection and editing permission enfor | |
| CVE-2026-40869 | 7.5 | 0.03% | 1 | 0 | 2026-04-23T16:08:50.607000 | Decidim is a participatory democracy framework. Starting in version 0.19.0 and p | |
| CVE-2026-40931 | 8.4 | 0.01% | 1 | 0 | 2026-04-23T15:49:20.480000 | Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and | |
| CVE-2026-28386 | 9.1 | 0.05% | 1 | 0 | 2026-04-23T15:40:23.007000 | Issue summary: Applications using AES-CFB128 encryption or decryption on systems | |
| CVE-2026-39440 | 10.0 | 0.00% | 2 | 0 | 2026-04-23T15:39:02 | Improper Control of Generation of Code ('Code Injection') vulnerability in Funne | |
| CVE-2026-41167 | 9.1 | 0.08% | 3 | 0 | 2026-04-23T15:37:23.773000 | Jellystat is a free and open source Statistics App for Jellyfin. Prior to versio | |
| CVE-2026-40882 | 7.6 | 0.06% | 1 | 0 | 2026-04-23T15:37:23.580000 | OpenRemote is an open-source internet-of-things platform. Prior to version 1.22. | |
| CVE-2026-40372 | 8.1 | 0.04% | 7 | 0 | 2026-04-23T14:55:42 | ## Executive Summary: A bug in `Microsoft.AspNetCore.DataProtection` 10.0.0-10 | |
| CVE-2026-35251 | 7.5 | 0.01% | 1 | 0 | 2026-04-23T12:57:56.917000 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp | |
| CVE-2026-35230 | 7.5 | 0.01% | 1 | 0 | 2026-04-23T12:56:40.480000 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp | |
| CVE-2026-6887 | 9.8 | 0.08% | 6 | 0 | 2026-04-23T12:31:45 | Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has | |
| CVE-2026-6903 | 7.5 | 0.03% | 2 | 0 | 2026-04-23T12:31:45 | The LabOne Web Server, backing the LabOne User Interface, contains insufficient | |
| CVE-2026-6886 | 9.8 | 0.16% | 2 | 0 | 2026-04-23T12:31:45 | Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has | |
| CVE-2026-6885 | 9.8 | 0.19% | 2 | 0 | 2026-04-23T12:31:45 | Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has | |
| CVE-2026-34285 | 9.1 | 0.03% | 1 | 0 | 2026-04-23T12:08:08.803000 | Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion | |
| CVE-2026-34287 | 9.1 | 0.03% | 1 | 0 | 2026-04-23T12:07:28.307000 | Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion | |
| CVE-2026-41040 | 7.5 | 0.04% | 4 | 0 | 2026-04-23T09:33:05 | GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of se | |
| CVE-2026-3844 | 9.8 | 0.06% | 3 | 0 | 2026-04-23T04:00:28 | The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads du | |
| CVE-2026-41196 | 0 | 0.07% | 1 | 0 | 2026-04-23T02:16:17.900000 | Luanti (formerly Minetest) is an open source voxel game-creation platform. Start | |
| CVE-2026-41455 | 8.5 | 0.03% | 1 | 0 | 2026-04-23T00:31:19 | WeKan before 8.35 contains a server-side request forgery vulnerability in webhoo | |
| CVE-2026-41454 | 8.3 | 0.04% | 1 | 0 | 2026-04-23T00:31:19 | WeKan before 8.35 contains a missing authorization vulnerability in the Integrat | |
| CVE-2026-41175 | 8.1 | 0.05% | 1 | 0 | 2026-04-22T22:16:31.820000 | Statamic is a Laravel and Git powered content management system (CMS). Prior to | |
| CVE-2026-40517 | 7.8 | 0.02% | 1 | 0 | 2026-04-22T22:16:31.183000 | radare2 prior to 6.1.4 contains a command injection vulnerability in the PDB par | |
| CVE-2026-41468 | 8.7 | 0.07% | 3 | 0 | 2026-04-22T21:32:18 | Beghelli Sicuro24 SicuroWeb embeds AngularJS 1.5.2, an end-of-life component con | |
| CVE-2026-34415 | 9.8 | 0.19% | 3 | 0 | 2026-04-22T21:32:18 | Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input vali | |
| CVE-2026-26354 | 8.1 | 0.05% | 1 | 0 | 2026-04-22T21:32:11 | Dell PowerProtect Data Domain with Domain Operating System (DD OS) of Feature Re | |
| CVE-2026-34275 | 9.8 | 0.04% | 1 | 0 | 2026-04-22T21:24:26.997000 | Vulnerability in the Oracle Advanced Inbound Telephony product of Oracle E-Busin | |
| CVE-2026-40911 | 10.0 | 0.17% | 2 | 0 | 2026-04-22T21:24:26.997000 | WWBN AVideo is an open source video platform. In versions 29.0 and prior, the YP | |
| CVE-2026-40906 | 9.9 | 0.03% | 3 | 0 | 2026-04-22T21:24:26.997000 | Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by pa | |
| CVE-2026-35229 | 7.5 | 0.03% | 1 | 0 | 2026-04-22T21:24:26.997000 | Vulnerability in the Java VM component of Oracle Database Server. Supported ver | |
| CVE-2026-40884 | 9.8 | 0.06% | 1 | 0 | 2026-04-22T21:24:26.997000 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains | |
| CVE-2026-24189 | 8.2 | 0.04% | 1 | 0 | 2026-04-22T21:24:26.997000 | NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticated | |
| CVE-2026-24177 | 7.7 | 0.03% | 1 | 0 | 2026-04-22T21:24:26.997000 | NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API | |
| CVE-2026-40868 | 8.1 | 0.03% | 1 | 0 | 2026-04-22T21:24:26.997000 | Kyverno is a policy engine designed for cloud native platform engineering teams. | |
| CVE-2026-41651 | 8.8 | 0.03% | 9 | 2 | 2026-04-22T21:23:52.620000 | PackageKit is a a D-Bus abstraction layer that allows the user to manage package | |
| CVE-2026-33471 | 9.6 | 0.03% | 2 | 0 | 2026-04-22T21:23:52.620000 | nimiq-block contains block primitives to be used in Nimiq's Rust implementation. | |
| CVE-2026-41059 | 8.2 | 0.13% | 1 | 0 | 2026-04-22T21:23:52.620000 | OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 provid | |
| CVE-2026-40575 | 9.1 | 0.08% | 1 | 0 | 2026-04-22T21:23:52.620000 | OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 provid | |
| CVE-2026-41133 | 8.8 | 0.03% | 1 | 0 | 2026-04-22T21:23:52.620000 | pyLoad is a free and open-source download manager written in Python. Versions up | |
| CVE-2026-22754 | 7.5 | 0.03% | 1 | 0 | 2026-04-22T21:23:52.620000 | Vulnerability in Spring Spring Security. If an application uses <sec:intercept-u | |
| CVE-2026-22753 | 7.5 | 0.05% | 1 | 0 | 2026-04-22T21:23:52.620000 | Vulnerability in Spring Spring Security. If an application is using securityMatc | |
| CVE-2026-6023 | 8.1 | 0.34% | 1 | 0 | 2026-04-22T21:23:52.620000 | In Progress® Telerik® UI for AJAX versions 2024.4.1114 through 2026.1.421, the R | |
| CVE-2026-34065 | 7.5 | 0.04% | 1 | 0 | 2026-04-22T21:23:52.620000 | nimiq-primitives contains primitives (e.g., block, account, transaction) to be u | |
| CVE-2026-6846 | 7.8 | 0.01% | 1 | 0 | 2026-04-22T21:23:52.620000 | A flaw was found in binutils. A heap-buffer-overflow vulnerability exists when p | |
| CVE-2026-6859 | 8.8 | 0.15% | 1 | 0 | 2026-04-22T21:23:52.620000 | A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_re | |
| CVE-2026-35548 | 8.5 | 0.03% | 1 | 0 | 2026-04-22T21:23:52.620000 | An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins | |
| CVE-2026-41060 | 7.7 | 0.03% | 1 | 0 | 2026-04-22T21:23:52.620000 | WWBN AVideo is an open source video platform. In versions 29.0 and below, the `i | |
| CVE-2026-6832 | 8.1 | 0.09% | 1 | 0 | 2026-04-22T21:23:52.620000 | Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/sessi | |
| CVE-2026-40925 | 8.3 | 0.02% | 1 | 0 | 2026-04-22T21:23:52.620000 | WWBN AVideo is an open source video platform. In versions 29.0 and prior, `objec | |
| CVE-2026-6823 | 8.2 | 0.08% | 1 | 0 | 2026-04-22T21:23:52.620000 | HKUDS OpenHarness prior to PR #147 remediation contains an insecure default conf | |
| CVE-2026-34413 | 8.6 | 0.33% | 1 | 0 | 2026-04-22T21:18:45.917000 | Xerte Online Toolkits versions 3.15 and earlier contain a missing authentication | |
| CVE-2026-40568 | 8.5 | 0.03% | 1 | 0 | 2026-04-22T21:10:14.290000 | FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to | |
| CVE-2026-40870 | 7.5 | 0.03% | 1 | 0 | 2026-04-22T21:08:48.550000 | Decidim is a participatory democracy framework. Starting in version 0.0.1 and pr | |
| CVE-2026-40887 | 9.1 | 4.56% | 1 | 0 | template | 2026-04-22T21:08:48.550000 | Vendure is an open-source headless commerce platform. Starting in version 1.7.4 |
| CVE-2026-40946 | 0 | 0.05% | 1 | 0 | 2026-04-22T20:28:12.780000 | Oxia is a metadata store and coordination system. Prior to 0.16.2, the OIDC auth | |
| CVE-2026-41135 | 7.5 | 0.04% | 1 | 0 | 2026-04-22T19:49:46 | ## Summary A memory leak vulnerability in the free5GC PCF (Policy Control Funct | |
| CVE-2026-40937 | 8.3 | 0.05% | 1 | 0 | 2026-04-22T19:24:54 | # Missing Admin Auth on Notification Target Endpoints in RustFS ### Finding Su | |
| CVE-2026-5262 | 8.0 | 0.02% | 1 | 0 | 2026-04-22T18:31:58 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.1. | |
| CVE-2026-4922 | 8.1 | 0.01% | 1 | 0 | 2026-04-22T18:31:58 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.0 | |
| CVE-2026-35344 | 3.3 | 0.01% | 2 | 0 | 2026-04-22T18:31:54 | The dd utility in uutils coreutils suppresses errors during file truncation oper | |
| CVE-2018-25270 | 9.8 | 0.18% | 1 | 0 | 2026-04-22T18:31:52 | ThinkPHP 5.0.23 contains a remote code execution vulnerability that allows unaut | |
| CVE-2026-35368 | 7.9 | 0.01% | 1 | 0 | 2026-04-22T18:31:46 | A vulnerability exists in the chroot utility of uutils coreutils when using the | |
| CVE-2026-35246 | 7.6 | 0.01% | 1 | 0 | 2026-04-22T18:31:43 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp | |
| CVE-2026-35245 | 7.5 | 0.04% | 1 | 0 | 2026-04-22T18:31:43 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp | |
| CVE-2026-35242 | 7.6 | 0.01% | 2 | 0 | 2026-04-22T18:31:43 | Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp | |
| CVE-2026-35243 | 7.8 | 0.01% | 1 | 0 | 2026-04-22T18:31:43 | Vulnerability in the Oracle Application Development Framework (ADF) product of O | |
| CVE-2026-34309 | 8.1 | 0.03% | 1 | 0 | 2026-04-22T18:31:42 | Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleS | |
| CVE-2026-35231 | 7.5 | 0.03% | 1 | 0 | 2026-04-22T18:31:42 | Vulnerability in the Oracle Financial Services Transaction Filtering product of | |
| CVE-2026-34310 | 7.5 | 0.03% | 1 | 0 | 2026-04-22T18:31:41 | Vulnerability in the Oracle Financial Services Analytical Applications Infrastru | |
| CVE-2026-34320 | 7.5 | 0.03% | 1 | 0 | 2026-04-22T15:32:43 | Vulnerability in the Oracle Financial Services Customer Screening product of Ora | |
| CVE-2026-5398 | 8.4 | 0.01% | 1 | 0 | 2026-04-22T15:32:43 | The implementation of TIOCNOTTY failed to clear a back-pointer from the structur | |
| CVE-2026-34290 | 7.5 | 0.04% | 1 | 0 | 2026-04-22T15:32:42 | Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion | |
| CVE-2026-6356 | 9.6 | 0.03% | 1 | 1 | 2026-04-22T15:31:57 | A vulnerability in the web application allows standard users to escalate their p | |
| CVE-2026-33593 | 7.5 | 0.02% | 1 | 0 | 2026-04-22T15:31:56 | A client can trigger a divide by zero error leading to crash by sending a crafte | |
| CVE-2026-6857 | 7.5 | 0.37% | 1 | 0 | 2026-04-22T15:31:51 | A flaw was found in camel-infinispan. This vulnerability involves unsafe deseria | |
| CVE-2026-34305 | 7.5 | 0.03% | 2 | 0 | 2026-04-22T15:31:41 | Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware | |
| CVE-2026-34279 | 9.1 | 0.04% | 1 | 0 | 2026-04-22T15:31:40 | Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle E | |
| CVE-2026-34286 | 9.1 | 0.03% | 2 | 0 | 2026-04-22T15:31:39 | Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion | |
| CVE-2026-40161 | 7.7 | 0.03% | 1 | 0 | 2026-04-22T11:38:56 | ### Summary The Tekton Pipelines git resolver in API mode sends the system-conf | |
| CVE-2026-4119 | 9.1 | 0.02% | 2 | 0 | 2026-04-22T09:31:41 | The Create DB Tables plugin for WordPress is vulnerable to authorization bypass | |
| CVE-2026-6022 | 7.5 | 0.04% | 1 | 0 | 2026-04-22T09:31:40 | In Progress® Telerik® UI for AJAX prior to 2026.1.421, RadAsyncUpload contains a | |
| CVE-2026-6235 | 9.8 | 0.03% | 1 | 0 | 2026-04-22T09:31:40 | The Sendmachine for WordPress plugin for WordPress is vulnerable to authorizatio | |
| CVE-2026-6834 | 6.5 | 0.04% | 1 | 0 | 2026-04-22T06:30:35 | The a+HRD developed by aEnrich has a Missing Authorization vulnerability, allowi | |
| CVE-2026-6784 | 7.5 | 0.04% | 2 | 0 | 2026-04-22T00:32:48 | Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bug | |
| CVE-2026-6772 | 7.5 | 0.04% | 1 | 0 | 2026-04-22T00:32:44 | Incorrect boundary conditions in the Libraries component in NSS. This vulnerabil | |
| CVE-2026-6748 | 9.8 | 0.05% | 1 | 0 | 2026-04-22T00:32:43 | Uninitialized memory in the Audio/Video: Web Codecs component. This vulnerabilit | |
| CVE-2026-6771 | 9.8 | 0.05% | 1 | 0 | 2026-04-22T00:32:43 | Mitigation bypass in the DOM: Security component. This vulnerability was fixed i | |
| CVE-2026-31019 | 8.8 | 0.15% | 1 | 0 | 2026-04-21T21:32:31 | In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application us | |
| CVE-2026-6819 | 8.8 | 0.04% | 1 | 0 | 2026-04-21T21:31:34 | HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands | |
| CVE-2026-40938 | 7.5 | 0.07% | 1 | 0 | 2026-04-21T20:28:37 | ## Summary The git resolver's `revision` parameter is passed directly as a posi | |
| CVE-2026-41197 | None | 0.04% | 1 | 0 | 2026-04-21T20:16:10 | ## Description Noir programs can invoke external functions through foreign call | |
| CVE-2026-40050 | 9.8 | 0.27% | 2 | 0 | 2026-04-21T18:32:04 | CrowdStrike has released security updates to address a critical unauthenticated | |
| CVE-2025-15638 | 10.0 | 0.01% | 1 | 0 | 2026-04-21T18:32:04 | Net::Dropbear versions before 0.14 for Perl contains a vulnerable version of lib | |
| CVE-2026-41329 | 9.9 | 0.04% | 1 | 0 | 2026-04-21T16:20:24.180000 | OpenClaw before 2026.3.31 contains a sandbox bypass vulnerability allowing attac | |
| CVE-2026-5752 | 9.3 | 0.02% | 3 | 0 | 2026-04-21T15:16:37.563000 | Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with r | |
| CVE-2026-33626 | 7.5 | 0.03% | 3 | 0 | 2026-04-21T15:04:13 | ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in LMDeplo | |
| CVE-2026-20128 | 7.5 | 0.05% | 2 | 0 | 2026-04-21T13:00:03.373000 | A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD- | |
| CVE-2026-20133 | 6.5 | 1.39% | 1 | 0 | 2026-04-20T21:32:43 | A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated, | |
| CVE-2026-20122 | 5.4 | 1.12% | 2 | 0 | 2026-04-20T21:31:38 | A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authe | |
| CVE-2026-33824 | 9.8 | 0.10% | 3 | 2 | 2026-04-17T19:21:23.993000 | Double free in Windows IKE Extension allows an unauthorized attacker to execute | |
| CVE-2026-40933 | 10.0 | 0.07% | 2 | 0 | 2026-04-16T21:18:18 | ### Summary Due to unsafe serialization of stdio commands in the MCP adapter, an | |
| CVE-2026-40890 | 7.5 | 0.04% | 1 | 0 | 2026-04-15T21:18:41 | ### Summary Processing a malformed input containing a `<` character that is not | |
| CVE-2026-40879 | 7.5 | 0.04% | 1 | 0 | 2026-04-15T21:14:55 | ### Impact Attacker sends many small, valid JSON messages in one TCP frame → ha | |
| CVE-2026-40576 | 9.4 | 0.05% | 1 | 0 | 2026-04-15T21:06:59 | ## Summary A path traversal vulnerability exists in [`excel-mcp-server`](https: | |
| CVE-2018-25193 | 7.5 | 0.14% | 2 | 0 | 2026-04-15T14:53:58.147000 | Mongoose Web Server 6.9 contains a denial of service vulnerability that allows r | |
| CVE-2026-34621 | 8.6 | 7.60% | 2 | 5 | 2026-04-13T21:23:27 | Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by a | |
| CVE-2026-39987 | None | 6.99% | 5 | 5 | template | 2026-04-09T19:06:18 | ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal |
| CVE-2026-4747 | 8.8 | 0.08% | 1 | 2 | 2026-04-01T15:30:57 | Each RPCSEC_GSS data packet is validated by a routine which checks a signature i | |
| CVE-2025-15467 | 8.8 | 0.70% | 3 | 6 | 2026-03-19T19:16:19.230000 | Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with malic | |
| CVE-2026-20126 | 8.8 | 0.02% | 1 | 0 | 2026-03-04T21:21:49.053000 | A vulnerability in Cisco Catalyst SD-WAN Manager could allow an authenticated, l | |
| CVE-2026-24884 | 8.4 | 0.01% | 1 | 0 | 2026-02-27T20:27:32.587000 | Compressing is a compressing and uncompressing lib for node. In version 2.0.0 an | |
| CVE-2025-69419 | 7.4 | 0.06% | 1 | 0 | 2026-01-29T18:32:43 | Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously craft | |
| CVE-2026-21445 | None | 6.97% | 1 | 1 | template | 2026-01-05T01:10:11 | ### Summary Multiple critical API endpoints in Langflow are missing authenticati |
| CVE-2023-46805 | 8.2 | 94.41% | 2 | 9 | template | 2025-10-31T21:59:38.500000 | An authentication bypass vulnerability in the web component of Ivanti ICS 9.x, 2 |
| CVE-2024-21887 | 9.1 | 94.41% | 2 | 12 | template | 2025-10-31T21:56:55.430000 | A command injection vulnerability in web components of Ivanti Connect Secure (9. |
| CVE-2023-33538 | 8.8 | 89.90% | 2 | 2 | 2025-10-22T00:33:51 | TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to | |
| CVE-2026-41267 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-41230 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-41229 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-41228 | 0 | 0.06% | 3 | 0 | N/A | ||
| CVE-2026-41564 | 0 | 0.02% | 4 | 0 | N/A | ||
| CVE-2026-41241 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-6786 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-6785 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-33656 | 0 | 0.05% | 1 | 1 | N/A | ||
| CVE-2026-41064 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-34063 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-35328 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-3323 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-41056 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-41055 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-41058 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-40706 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-40905 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-40903 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-40909 | 0 | 0.10% | 1 | 0 | N/A | ||
| CVE-2026-40569 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-40613 | 0 | 0.08% | 1 | 0 | N/A |
updated 2026-04-24T00:16:29.040000
2 posts
🚨 CRITICAL: SenseLive X3050 v1.523 is vulnerable to authentication bypass (CVE-2026-40630) via alternate paths. No fix yet — restrict device network access and monitor closely. https://radar.offseq.com/threat/cve-2026-40630-cwe-288-authentication-bypass-using-b2eedf7d #OffSeq #CVE202640630 #IoTSecurity #VulnAlert
##🚨 CRITICAL: SenseLive X3050 v1.523 is vulnerable to authentication bypass (CVE-2026-40630) via alternate paths. No fix yet — restrict device network access and monitor closely. https://radar.offseq.com/threat/cve-2026-40630-cwe-288-authentication-bypass-using-b2eedf7d #OffSeq #CVE202640630 #IoTSecurity #VulnAlert
##updated 2026-04-24T00:16:28.690000
2 posts
SenseLive X3050 V1.523 is at CRITICAL risk (CVE-2026-40620, CVSS 9.3): missing auth lets remote attackers gain admin access. No patch yet — restrict management access, monitor logs, and follow vendor updates. https://radar.offseq.com/threat/cve-2026-40620-cwe-306-missing-authentication-for--0af2786c #OffSeq #CVE202640620 #IoTSecurity
##SenseLive X3050 V1.523 is at CRITICAL risk (CVE-2026-40620, CVSS 9.3): missing auth lets remote attackers gain admin access. No patch yet — restrict management access, monitor logs, and follow vendor updates. https://radar.offseq.com/threat/cve-2026-40620-cwe-306-missing-authentication-for--0af2786c #OffSeq #CVE202640620 #IoTSecurity
##updated 2026-04-24T00:16:26.757000
2 posts
🔍 CVE-2026-25775: SenseLive X3050 (V1.523) critical vuln — remote firmware updates possible without auth! Patch unavailable. Restrict access & monitor for unauthorized firmware actions. https://radar.offseq.com/threat/cve-2026-25775-cwe-306-missing-authentication-for--773ccfcd #OffSeq #IoTSecurity #CVE202625775
##🔍 CVE-2026-25775: SenseLive X3050 (V1.523) critical vuln — remote firmware updates possible without auth! Patch unavailable. Restrict access & monitor for unauthorized firmware actions. https://radar.offseq.com/threat/cve-2026-25775-cwe-306-missing-authentication-for--773ccfcd #OffSeq #IoTSecurity #CVE202625775
##updated 2026-04-23T22:16:42.493000
2 posts
🟠 CVE-2026-41353 - High (8.1)
OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41353 - High (8.1)
OpenClaw before 2026.3.22 contains an access control bypass vulnerability in the allowProfiles feature that allows attackers to circumvent profile restrictions through persistent profile mutation and runtime profile selection. Remote attackers can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T22:16:42.327000
2 posts
🟠 CVE-2026-41352 - High (8.8)
OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with device pairing credentials can execute arbitrary node commands on the host ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41352 - High (8.8)
OpenClaw before 2026.3.31 contains a remote code execution vulnerability where a device-paired node can bypass the node scope gate authentication mechanism. Attackers with device pairing credentials can execute arbitrary node commands on the host ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T22:16:41.827000
2 posts
🟠 CVE-2026-41349 - High (8.8)
OpenClaw before 2026.3.28 contains an agentic consent bypass vulnerability allowing LLM agents to silently disable execution approval via config.patch parameter. Remote attackers can exploit this to bypass security controls and execute unauthorize...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41349 - High (8.8)
OpenClaw before 2026.3.28 contains an agentic consent bypass vulnerability allowing LLM agents to silently disable execution approval via config.patch parameter. Remote attackers can exploit this to bypass security controls and execute unauthorize...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T22:16:39.603000
2 posts
🟠 CVE-2026-41336 - High (7.8)
OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_HOOKS_DIR environment variable, enabling loading of attacker-controlled hook code. Attackers can replace trusted default-on bundled hooks from untrusted workspa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41336/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41336 - High (7.8)
OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_HOOKS_DIR environment variable, enabling loading of attacker-controlled hook code. Attackers can replace trusted default-on bundled hooks from untrusted workspa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41336/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T22:16:37.817000
2 posts
🔴 CVE-2026-33819 - Critical (10)
Deserialization of untrusted data in Microsoft Bing allows an unauthorized attacker to execute code over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33819/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-33819 - Critical (10)
Deserialization of untrusted data in Microsoft Bing allows an unauthorized attacker to execute code over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33819/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T22:16:37.093000
2 posts
🔴 CVE-2026-33102 - Critical (9.3)
Url redirection to untrusted site ('open redirect') in M365 Copilot allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33102/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-33102 - Critical (9.3)
Url redirection to untrusted site ('open redirect') in M365 Copilot allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33102/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T22:16:35.260000
2 posts
🔴 CVE-2026-32210 - Critical (9.3)
Server-side request forgery (ssrf) in Microsoft Dynamics 365 (Online) allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-32210 - Critical (9.3)
Server-side request forgery (ssrf) in Microsoft Dynamics 365 (Online) allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T22:16:33.720000
2 posts
🟠 CVE-2026-32172 - High (8)
Uncontrolled search path element in Microsoft Power Apps allows an unauthorized attacker to execute code over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32172/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32172 - High (8)
Uncontrolled search path element in Microsoft Power Apps allows an unauthorized attacker to execute code over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32172/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T22:16:26.400000
2 posts
🔴 CVE-2026-26210 - Critical (9.8)
KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in the balance_serve backend mode where the scheduler RPC server binds a ZMQ ROUTER socket to all interfaces with no authentication and deserializes incoming messages usi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-26210 - Critical (9.8)
KTransformers through 0.5.3 contains an unsafe deserialization vulnerability in the balance_serve backend mode where the scheduler RPC server binds a ZMQ ROUTER socket to all interfaces with no authentication and deserializes incoming messages usi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:32:28
2 posts
🔴 CVE-2026-31178 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMaxAlive parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31178/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-31178 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMaxAlive parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31178/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:32:28
2 posts
🟠 CVE-2026-6920 - High (7.5)
Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6920 - High (7.5)
Out of bounds read in GPU in Google Chrome on Android prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:32:26
2 posts
🔴 CVE-2026-39087 - Critical (9.8)
An issue in Ntfy ntfy.sh before v.2.21 allows a remote attacker to execute arbitrary code via the parseActions function
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39087/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39087 - Critical (9.8)
An issue in Ntfy ntfy.sh before v.2.21 allows a remote attacker to execute arbitrary code via the parseActions function
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39087/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:31:22
2 posts
🔴 CVE-2026-31177 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMinAlive parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-31177 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunMinAlive parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:16:06.947000
2 posts
🔴 CVE-2026-6942 - Critical (9.8)
radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-6942 - Critical (9.8)
radare2-mcp version 1.6.0 and earlier contains an os command injection vulnerability that allows remote attackers to execute arbitrary commands by bypassing the command filter through shell metacharacters in user-controlled input passed to r2_cmd_...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:16:06.120000
2 posts
🟠 CVE-2026-41268 - High (7.7)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41268/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41268 - High (7.7)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise is vulnerable to a critical unauthenticated remote command execution (RCE) vulnerability. It can be exploited via a parameter override...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41268/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T21:16:05.527000
5 posts
Apple issues iOS/iPadOS 26.4.2 to fix a Notification Services bug (CVE-2026-28950) that could retain deleted-app notification previews — Signal says preserved fragments will be removed after users update. Install now: https://cyberinsider.com/apple-fixes-ios-privacy-flaw-that-allowed-signal-message-retrieval/ 🔒📱 #iOS #Privacy #Security
##Apple fixes iOS flaw exposing deleted messages via notification logs (CVE-2026-28950).
Even encrypted apps were impacted.
Patch now.
Apple issues iOS/iPadOS 26.4.2 to fix a Notification Services bug (CVE-2026-28950) that could retain deleted-app notification previews — Signal says preserved fragments will be removed after users update. Install now: https://cyberinsider.com/apple-fixes-ios-privacy-flaw-that-allowed-signal-message-retrieval/ 🔒📱 #iOS #Privacy #Security
##Apple fixes iOS flaw exposing deleted messages via notification logs (CVE-2026-28950).
Even encrypted apps were impacted.
Patch now.
https://support.apple.com/en-us/127002
Impact: Notifications marked for deletion could be unexpectedly retained on the device
Description: A logging issue was addressed with improved data redaction.
CVE-2026-28950
<3
##updated 2026-04-23T20:30:30.267000
1 posts
🟠 CVE-2026-5816 - High (8)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.10 before 18.10.4 and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute arbitrary JavaScript in a user's browser session due to improper pa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5816/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T20:16:14.380000
2 posts
🟠 CVE-2026-41138 - High (8.3)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41138/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41138 - High (8.3)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, there is a remote code execution vulnerability in AirtableAgent.ts caused by lack of input verification when using Pandas. The user’s input ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41138/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T19:17:29.670000
2 posts
🟠 CVE-2026-41246 - High (8.1)
Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPP...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41246/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41246 - High (8.1)
Contour is a Kubernetes ingress controller using Envoy proxy. From v1.19.0 to before v1.33.4, v1.32.5, and v1.31.6, Contour's Cookie Rewriting feature is vulnerable to Lua code injection. An attacker with RBAC permissions to create or modify HTTPP...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41246/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T19:17:28.617000
2 posts
🟠 CVE-2026-40886 - High (7.7)
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() function causes a controller-wide panic when a work...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40886 - High (7.7)
Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. From 3.6.5 to 4.0.4, an unchecked array index in the pod informer's podGCFromPod() function causes a controller-wide panic when a work...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T19:17:26.633000
2 posts
🔴 CVE-2026-31181 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunServerAddr parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-31181 - Critical (9.8)
An issue was discovered in ToToLink A3300R firmware v17.0.0cu.557_B20221024 allowing attackers to execute arbitrary commands via the stunServerAddr parameter to /cgi-bin/cstecgi.cgi.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T19:17:22.843000
2 posts
🔴 CVE-2025-62373 - Critical (9.8)
Pipecat is an open-source Python framework for building real-time voice and multimodal conversational agents. Versions 0.0.41 through 0.0.93 have a vulnerability in `LivekitFrameSerializer` – an optional, non-default, undocumented frame serializ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-62373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-62373 - Critical (9.8)
Pipecat is an open-source Python framework for building real-time voice and multimodal conversational agents. Versions 0.0.41 through 0.0.93 have a vulnerability in `LivekitFrameSerializer` – an optional, non-default, undocumented frame serializ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-62373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:48:51.783000
1 posts
🟠 CVE-2026-34291 - High (8.7)
Vulnerability in the Oracle HTTP Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Difficult to exploit vulnerability allows unauthenticated attacker with network ac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34291/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:25
2 posts
🟠 CVE-2026-33999 - High (7.8)
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33999/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33999 - High (7.8)
A flaw was found in the X.Org X server. This integer underflow vulnerability, specifically in the XKB compatibility map handling, allows an attacker with local or remote X11 server access to trigger a buffer read overrun. This can lead to memory-s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33999/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:25
2 posts
🔴 CVE-2026-40471 - Critical (9.6)
hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its endpoints. Scripts on foreign sites could trigger requests to hackage server, possibly abusing latent credentials to upload packages or perform other administrative acti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40471/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40471 - Critical (9.6)
hackage-server lacked Cross-Site Request Forgery (CSRF) protection across its endpoints. Scripts on foreign sites could trigger requests to hackage server, possibly abusing latent credentials to upload packages or perform other administrative acti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40471/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:23
2 posts
🔴 CVE-2026-40472 - Critical (9.9)
In hackage-server, user-controlled metadata from .cabal files are rendered into HTML
href attributes without proper sanitization, enabling stored
Cross-Site Scripting (XSS) attacks.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40472 - Critical (9.9)
In hackage-server, user-controlled metadata from .cabal files are rendered into HTML
href attributes without proper sanitization, enabling stored
Cross-Site Scripting (XSS) attacks.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:23
2 posts
#OT #Advisory VDE-2026-040
CODESYS EtherNetIP - Improper timeout handling
CODESYS EtherNet/IP is an add‑on for the CODESYS Development System that provides a fully integrated EtherNet/IP protocol stack along with diagnostic capabilities. A flaw in the EtherNet/IP adapter protocol stack library results in a vulnerability within the generated application code. When an EtherNet/IP adapter is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35225
https://certvde.com/en/advisories/vde-2026-040/
#oCSAF
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-04_vde-2026-040.json
#OT #Advisory VDE-2026-040
CODESYS EtherNetIP - Improper timeout handling
CODESYS EtherNet/IP is an add‑on for the CODESYS Development System that provides a fully integrated EtherNet/IP protocol stack along with diagnostic capabilities. A flaw in the EtherNet/IP adapter protocol stack library results in a vulnerability within the generated application code. When an EtherNet/IP adapter is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35225
https://certvde.com/en/advisories/vde-2026-040/
#oCSAF
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-04_vde-2026-040.json
updated 2026-04-23T18:33:21
2 posts
🟠 CVE-2026-34001 - High (7.8)
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34001 - High (7.8)
A flaw was found in the X.Org X server. This use-after-free vulnerability occurs in the XSYNC fence triggering logic, specifically within the miSyncTriggerFence() function. An attacker with access to the X11 server can exploit this without user in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:33:20
2 posts
🔴 CVE-2026-41460 - Critical (9.8)
SocialEngine versions 7.8.0 and prior contain a SQL injection vulnerability in the /activity/index/get-memberall endpoint where user-supplied input passed via the text parameter is not sanitized before being incorporated into a SQL query. An unaut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41460/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41460 - Critical (9.8)
SocialEngine versions 7.8.0 and prior contain a SQL injection vulnerability in the /activity/index/get-memberall endpoint where user-supplied input passed via the text parameter is not sanitized before being incorporated into a SQL query. An unaut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41460/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:16:29.447000
4 posts
🔴 CVE-2026-41679 - Critical (10)
Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Prior to version 2026.416.0, an unauthenticated attacker can achieve full remote code execution on any network-accessible Paperclip instance runnin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 New security advisory:
CVE-2026-41679 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-41679-paperclip-unauthenticated-remote-code-execution
🔴 CVE-2026-41679 - Critical (10)
Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Prior to version 2026.416.0, an unauthenticated attacker can achieve full remote code execution on any network-accessible Paperclip instance runnin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-41679 in Paperclip (<2026.416.0) enables unauthenticated remote code execution via API chain — no user creds needed. Upgrade to 2026.416.0+ ASAP! Full details: https://radar.offseq.com/threat/cve-2026-41679-cwe-287-improper-authentication-in--09e9d7e4 #OffSeq #CVE202641679 #infosec #rce
##updated 2026-04-23T18:16:29.330000
2 posts
🟠 CVE-2026-41461 - High (8.5)
SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41461 - High (8.5)
SocialEngine versions 7.8.0 and prior contain a blind server-side request forgery vulnerability in the /core/link/preview endpoint where user-supplied input passed via the uri request parameter is not sanitized before being used to construct outbo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T18:10:28.700000
2 posts
🟠 CVE-2026-34297 - High (7.5)
Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Knowledge Integration). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows unauthenticated attacker w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34297/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34297 - High (7.5)
Vulnerability in the Oracle HCM Common Architecture product of Oracle E-Business Suite (component: Knowledge Integration). Supported versions that are affected are 12.2.3-12.2.15. Easily exploitable vulnerability allows unauthenticated attacker w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34297/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T17:26:30.713000
6 posts
3 repos
https://github.com/kaleth4/CVE-2026-33825
https://github.com/Letlaka/redsun-bluehammer-undefend-detection-pack
🛡️ Microsoft Defender Elevation of Privilege Vulnerability
Description
🛡️ Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.
##Just in: CVE-2026-33825 "BlueHammer" just hit the CISA KEV. Meanwhile, I'm not near my Windows PC, so I'm not sure if the Red Sun still prevails.
##🛡️ Microsoft Defender Elevation of Privilege Vulnerability
Description
🛡️ Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.
##Just in: CVE-2026-33825 "BlueHammer" just hit the CISA KEV. Meanwhile, I'm not near my Windows PC, so I'm not sure if the Red Sun still prevails.
##🚨 [CISA-2026:0422] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0422)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-33825 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-33825)
- Name: Microsoft Defender Insufficient Granularity of Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825 ; https://nvd.nist.gov/vuln/detail/CVE-2026-33825
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260422 #cisa20260422 #cve_2026_33825 #cve202633825
##CVE ID: CVE-2026-33825
Vendor: Microsoft
Product: Defender
Date Added: 2026-04-22
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-33825
updated 2026-04-23T16:16:25.523000
2 posts
🔴 CVE-2026-40470 - Critical (9.9)
A critical XSS vulnerability affected hackage-server and
hackage.haskell.org. HTML and JavaScript files provided in source
packages or via the documentation upload facility were served
as-is on the main hackage.haskell.org domain. As a consequen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40470 - Critical (9.9)
A critical XSS vulnerability affected hackage-server and
hackage.haskell.org. HTML and JavaScript files provided in source
packages or via the documentation upload facility were served
as-is on the main hackage.haskell.org domain. As a consequen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T16:16:24.920000
2 posts
🟠 CVE-2026-34003 - High (7.8)
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34003 - High (7.8)
A flaw was found in the X.Org X server's XKB key types request validation. A local attacker could send a specially crafted request to the X server, leading to an out-of-bounds memory access vulnerability. This could result in the disclosure of sen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T16:16:24.463000
2 posts
🔴 CVE-2026-23751 - Critical (9.8)
Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service that is accessible without authentication and uses a d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23751/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-23751 - Critical (9.8)
Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 (other versions may be affected) exposes a deprecated .NET Remoting HTTP channel on port 2424 via the Ascent Capture Service that is accessible without authentication and uses a d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23751/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T16:15:59.613000
1 posts
🟠 CVE-2026-31018 - High (8.8)
In Dolibarr ERP & CRM <= 22.0.4, PHP code detection and editing permission enforcement in the Website module is not applied consistently to all input parameters, allowing an authenticated user restricted to HTML/JavaScript editing to inject PHP...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31018/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T16:08:50.607000
1 posts
🟠 CVE-2026-40869 - High (7.5)
Decidim is a participatory democracy framework. Starting in version 0.19.0 and prior to versions 0.30.5 and 0.31.1, a vulnerability allows any registered and authenticated user to accept or reject any amendments. The impact is on any users who hav...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40869/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T15:49:20.480000
1 posts
🟠 CVE-2026-40931 - High (8.4)
Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and 1.10.5, the patch for CVE-2026-24884 relies on a purely logical string validation within the isPathWithinParent utility. This check verifies if a resolved path string ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T15:40:23.007000
1 posts
Broadcom has three critical listings today: https://support.broadcom.com/web/ecx/security-advisory
- Datacom Health Check Analyzer 1.1 Vulnerability
- IDMS Server: OpenSSL Vulnerability CVE-2026-28386
- MICS REST API SERVER - 14.5 Vulnerability in Spring Security
Also:
Cisco has a critical advisory:
- CVE-2026-20122; CVE-2026-20126 and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
Cisco has also tagged 7Zip and Adobe for zero-day reports https://talosintelligence.com/vulnerability_info @TalosSecurity #infoec #Broadcom #vulnerability #zeroday #Adobe
##updated 2026-04-23T15:39:02
2 posts
🔴 CVE-2026-39440 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in Funnelforms LLC FunnelFormsPro allows Remote Code Inclusion.This issue affects FunnelFormsPro: from n/a through 3.8.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39440/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39440 - Critical (9.9)
Improper Control of Generation of Code ('Code Injection') vulnerability in Funnelforms LLC FunnelFormsPro allows Remote Code Inclusion.This issue affects FunnelFormsPro: from n/a through 3.8.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39440/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T15:37:23.773000
3 posts
Five critical self-hosted flaws landed April 20-22. Marimo pre-auth remote takeover (CVE-2026-39987, CVSS 9.3), exploited in 10 hours. Apache Airflow XCom. Spinnaker Echo. Jellystat SQL injection to takeover (CVE-2026-41167, 9.1). OpenVPN 2.7.2 fixed two. Three trace to injection. Across 14 compliant platforms I have architected, the audit finding is patch cadence, not availability. A 10-hour window makes quarterly cadence a breach timeline.
##🚨 CRITICAL: CyferShepard Jellystat <1.1.10 vulnerable to SQL injection (CVE-2026-41167). Auth’d users can read any DB table & execute commands on the PostgreSQL host. Upgrade to 1.1.10 ASAP! https://radar.offseq.com/threat/cve-2026-41167-cwe-89-improper-neutralization-of-s-51b08aed #OffSeq #Jellystat #SQLi #Infosec
##🔴 CVE-2026-41167 - Critical (9.1)
Jellystat is a free and open source Statistics App for Jellyfin. Prior to version 1.1.10, multiple API endpoints in Jellystat build SQL queries by interpolating unsanitized request-body fields directly into raw SQL strings. An authenticated user c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T15:37:23.580000
1 posts
🟠 CVE-2026-40882 - High (7.6)
OpenRemote is an open-source internet-of-things platform. Prior to version 1.22.0, the Velbus asset import path parses attacker-controlled XML without explicit XXE hardening. An authenticated user who can call the import endpoint may trigger XML e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40882/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T14:55:42
7 posts
Microsoft a publié un patch pour une faille critique dans ASP.NET : CVE-2026-40372 https://www.it-connect.fr/microsoft-a-publie-un-patch-pour-une-faille-critique-dans-asp-net-cve-2026-40372/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft
###Microsoft corrige de urgencia un fallo crítico en ASP.NET Core Data Protection (CVE-2026-40372)
##Microsoft a publié un patch pour une faille critique dans ASP.NET : CVE-2026-40372 https://www.it-connect.fr/microsoft-a-publie-un-patch-pour-une-faille-critique-dans-asp-net-cve-2026-40372/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft
##Microsoft Issues Emergency Patches for Critical ASP.NET Core Cryptographic Flaw
Microsoft released emergency patches for a critical ASP.NET Core vulnerability (CVE-2026-40372) that allows unauthenticated attackers to forge authentication cookies and gain SYSTEM privileges. The flaw primarily affects applications on Linux and macOS using specific versions of the Data Protection NuGet package.
**If you're running ASP.NET Core apps using the Microsoft.AspNetCore.DataProtection NuGet package (versions 10.0.0 through 10.0.6), especially on Linux or macOS, upgrade immediately to version 10.0.7 and redeploy your applications. After updating, rotate the DataProtection key ring to invalidate any forged tokens or sessions that may have been issued during the vulnerable window.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/microsoft-issues-emergency-patches-for-critical-asp-net-core-cryptographic-flaw-0-1-8-4-c/gD2P6Ple2L
If you missed this. Microsoft posted this patch yesterday:
ASP.NET Core Elevation of Privilege Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40372
More:
The Hacker News: Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug https://thehackernews.com/2026/04/microsoft-patches-critical-aspnet-core.html @thehackernews #Microsoft #infosec #vulnerability
##CVE-2026-40372 in ASP.NET Core enables privilege escalation via cryptographic validation flaws.
Patch released - but token persistence risk remains without key rotation.
Source: https://thehackernews.com/2026/04/microsoft-patches-critical-aspnet-core.html
Follow TechNadu. Insights? 👇
##🔴 CVE-2026-40372 - Critical (9.1)
Improper verification of cryptographic signature in ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40372/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:57:56.917000
1 posts
🟠 CVE-2026-35251 - High (7.5)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35251/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:56:40.480000
1 posts
🟠 CVE-2026-35230 - High (7.5)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:31:45
6 posts
🔴 CVE-2026-6887 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6887/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-6887 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6887/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL SQL Injection (CVE-2026-6887) in BorG SPM 2007: unauthenticated remote attackers can manipulate databases. No patch, product EOL. Isolate or discontinue use ASAP. Details: https://radar.offseq.com/threat/cve-2026-6887-cwe-89-improper-neutralization-of-sp-f0a62364 #OffSeq #SQLInjection #Vuln #InfoSec
##🔴 CVE-2026-6887 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6887/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-6887 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6887/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL SQL Injection (CVE-2026-6887) in BorG SPM 2007: unauthenticated remote attackers can manipulate databases. No patch, product EOL. Isolate or discontinue use ASAP. Details: https://radar.offseq.com/threat/cve-2026-6887-cwe-89-improper-neutralization-of-sp-f0a62364 #OffSeq #SQLInjection #Vuln #InfoSec
##updated 2026-04-23T12:31:45
2 posts
🟠 CVE-2026-6903 - High (7.5)
The LabOne Web Server, backing the LabOne User Interface, contains insufficient input validation in its file access functionality. An unauthenticated attacker could exploit this vulnerability to read arbitrary files on the host system that are acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6903 - High (7.5)
The LabOne Web Server, backing the LabOne User Interface, contains insufficient input validation in its file access functionality. An unauthenticated attacker could exploit this vulnerability to read arbitrary files on the host system that are acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:31:45
2 posts
🔴 CVE-2026-6886 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a Authentication Bypass vulnerability, allowing unauthenticated remote attackers to log into the system as any user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-6886 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has a Authentication Bypass vulnerability, allowing unauthenticated remote attackers to log into the system as any user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:31:45
2 posts
🔴 CVE-2026-6885 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6885/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-6885 - Critical (9.8)
Borg SPM 2007 (Sales Ended in 2008) developed by BorG Technology Corporation has an Arbitrary File Upload vulnerability, allowing unauthenticated remote attackers to upload and execute web shell backdoors, thereby enabling arbitrary code execution...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6885/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:08:08.803000
1 posts
🔴 CVE-2026-34285 - Critical (9.1)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34285/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T12:07:28.307000
1 posts
🔴 CVE-2026-34287 - Critical (9.1)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T09:33:05
4 posts
🟠 CVE-2026-41040 - High (7.5)
GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41040/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41040 - High (7.5)
GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41040/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41040 - High (7.5)
GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41040/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41040 - High (7.5)
GROWI provided by GROWI, Inc. is vulnerable to a regular expression denial of service (ReDoS) via a crafted input string.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41040/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T04:00:28
3 posts
🔴 CVE-2026-3844 - Critical (9.8)
The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fetch_gravatar_from_remote' function in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3844/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-3844 - Critical (9.8)
The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fetch_gravatar_from_remote' function in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3844/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚩 CVE-2026-3844 (CRITICAL): Breeze Cache ≤2.4.4 lets unauthenticated attackers upload arbitrary files via 'fetch_gravatar_from_remote' if "Host Files Locally - Gravatars" is enabled. RCE possible. Check settings & update! https://radar.offseq.com/threat/cve-2026-3844-cwe-434-unrestricted-upload-of-file--8e6074b3 #OffSeq #WordPress #infosec
##updated 2026-04-23T02:16:17.900000
1 posts
🔴 CVE-2026-41196: luanti 5.0.0 – 5.15.1 has a CRITICAL code injection vuln (CVSS 9.0). Malicious mods can break Lua sandbox with LuaJIT, gaining full filesystem access. Patch: upgrade to 5.15.2 or mitigate via getfenv = nil. https://radar.offseq.com/threat/cve-2026-41196-cwe-94-improper-control-of-generati-70ec6155 #OffSeq #CVE202641196 #vuln
##updated 2026-04-23T00:31:19
1 posts
🟠 CVE-2026-41455 - High (8.5)
WeKan before 8.35 contains a server-side request forgery vulnerability in webhook integration URL handling where the url schema field accepts any string without protocol restriction or destination validation. Attackers who can create or modify in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41455/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-23T00:31:19
1 posts
🟠 CVE-2026-41454 - High (8.3)
WeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints that allows authenticated board members to perform administrative actions without proper privilege verification. Attackers can enumerate integr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41454/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T22:16:31.820000
1 posts
🟠 CVE-2026-41175 - High (8.1)
Statamic is a Laravel and Git powered content management system (CMS). Prior to versions 5.73.20 and 6.13.0, manipulating query parameters on Control Panel and REST API endpoints, or arguments in GraphQL queries, could result in the loss of conten...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T22:16:31.183000
1 posts
🟠 CVE-2026-40517 - High (7.8)
radare2 prior to 6.1.4 contains a command injection vulnerability in the PDB parser's print_gvars() function that allows attackers to execute arbitrary commands by crafting a malicious PDB file with newline characters in symbol names. Attackers ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40517/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:32:18
3 posts
🛑 CVE-2026-41468: Beghelli SicuroWeb (Sicuro24) uses unmaintained AngularJS 1.5.2, allowing network-adjacent attackers to hijack sessions via MITM and template injection. Enforce HTTPS, monitor activity. No patch yet. More: https://radar.offseq.com/threat/cve-2026-41468-cwe-1104-use-of-unmaintained-third--1563ff90 #OffSeq #CVE202641468 #infosec
##🛑 CVE-2026-41468: Beghelli SicuroWeb (Sicuro24) uses unmaintained AngularJS 1.5.2, allowing network-adjacent attackers to hijack sessions via MITM and template injection. Enforce HTTPS, monitor activity. No patch yet. More: https://radar.offseq.com/threat/cve-2026-41468-cwe-1104-use-of-unmaintained-third--1563ff90 #OffSeq #CVE202641468 #infosec
##🟠 CVE-2026-41468 - High (8.7)
Beghelli Sicuro24 SicuroWeb embeds AngularJS 1.5.2, an end-of-life component containing known sandbox escape primitives. When combined with template injection present in the same application, these primitives allow attackers to escape the AngularJ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:32:18
3 posts
⚠️ CRITICAL: xerteonlinetoolkits ≤3.15 has incomplete input validation in elFinder — .php4 files can be uploaded & executed, enabling unauth RCE. Restrict endpoint, monitor uploads, apply custom filters. Patch status unknown. CVE-2026-34415 https://radar.offseq.com/threat/cve-2026-34415-cwe-184-incomplete-list-of-disallow-f774ae94 #OffSeq #Vuln #RCE
##⚠️ CRITICAL: xerteonlinetoolkits ≤3.15 has incomplete input validation in elFinder — .php4 files can be uploaded & executed, enabling unauth RCE. Restrict endpoint, monitor uploads, apply custom filters. Patch status unknown. CVE-2026-34415 https://radar.offseq.com/threat/cve-2026-34415-cwe-184-incomplete-list-of-disallow-f774ae94 #OffSeq #Vuln #RCE
##🔴 CVE-2026-34415 - Critical (9.8)
Xerte Online Toolkits versions 3.15 and earlier contain an incomplete input validation vulnerability in the elFinder connector endpoint that fails to block PHP-executable extensions .php4 due to an incorrect regex pattern. Unauthenticated attacker...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34415/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:32:11
1 posts
🟠 CVE-2026-26354 - High (8.1)
Dell PowerProtect Data Domain with Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.6, LTS2025 release version 8.3.1.0 through 8.3.1.10, LTS2024 release versions 7.13.1.0 through 7.13.1.60, contain a stack-based Buffer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-26354/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:24:26.997000
1 posts
🔴 New security advisory:
CVE-2026-34275 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-34275-oracle-e-biz-unauth-takeover
updated 2026-04-22T21:24:26.997000
2 posts
🚨 CVE-2026-40911: WWBN AVideo <=29.0 CRITICAL code injection via YPTSocket plugin. Unauthenticated attacker can execute JS on all connected clients, risking account takeover. Patch with commit c08694bf ASAP. https://radar.offseq.com/threat/cve-2026-40911-cwe-94-improper-control-of-generati-3a34b5ff #OffSeq #CVE202640911 #infosec #security
##🔴 CVE-2026-40911 - Critical (10)
WWBN AVideo is an open source video platform. In versions 29.0 and prior, the YPTSocket plugin's WebSocket server relays attacker-supplied JSON message bodies to every connected client without sanitizing the `msg` or `callback` fields. On the clie...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40911/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:24:26.997000
3 posts
⚠️ CRITICAL: ElectricSQL (v1.1.12 - <1.5.0) has a CVE-2026-40906 SQL injection in /v1/shape API. Authenticated users can fully compromise PostgreSQL DB. Upgrade to 1.5.0+ now! https://radar.offseq.com/threat/cve-2026-40906-cwe-89-improper-neutralization-of-s-06dc3129 #OffSeq #SQLInjection #ElectricSQL #InfoSec
##🔴 CVE-2026-40906 - Critical (9.9)
Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by parameter in the ElectricSQL /v1/shape API is vulnerable to error-based SQL injection, allowing any authenticated user to read, write, and destroy the full contents of t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40906 - Critical (9.9)
Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by parameter in the ElectricSQL /v1/shape API is vulnerable to error-based SQL injection, allowing any authenticated user to read, write, and destroy the full contents of t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:24:26.997000
1 posts
🟠 CVE-2026-35229 - High (7.5)
Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.30 and 21.3-21.21. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:24:26.997000
1 posts
🔴 CVE-2026-40884 - Critical (9.8)
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accept...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40884/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:24:26.997000
1 posts
🟠 CVE-2026-24189 - High (8.2)
NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticated attacker could cause an out-of-bounds read by sending a maliciously crafted request. A successful exploit of this vulnerability might lead to denial of service and inf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24189/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:24:26.997000
1 posts
🟠 CVE-2026-24177 - High (7.7)
NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API endpoints without authorization. A successful exploit of this vulnerability might lead to information disclosure.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:24:26.997000
1 posts
🟠 CVE-2026-40868 - High (8.1)
Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to 1.16.4, kyverno’s apiCall servicecall helper implicitly injects Authorization: Bearer ... using the kyverno controller serviceaccount token when a policy d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40868/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
9 posts
2 repos
Here's a harmless little #PoC for the #PackageKit LPE vulnerability (CVE-2026-41651), by @brezel@infosec.exchange and myself: https://codeberg.org/hillu/cve-2026-41651-poc
It was a lot of fun to piece together.
📢 CVE-2026-41651 : Élévation de privilèges locale cross-distro via PackageKit (Pack2TheRoot)
📝 ## 🔍 Contexte
Publié le 22 avril 2026 par l'équipe Red Team de Deutsche Telekom sur leur blog séc...
📖 cyberveille : https://cyberveille.ch/posts/2026-04-23-cve-2026-41651-elevation-de-privileges-locale-cross-distro-via-packagekit-pack2theroot/
🌐 source : https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
#CVE_2026_41651 #IOC #Cyberveille
Here's a harmless little #PoC for the #PackageKit LPE vulnerability (CVE-2026-41651), by @brezel@infosec.exchange and myself: https://codeberg.org/hillu/cve-2026-41651-poc
It was a lot of fun to piece together.
📢 CVE-2026-41651 : Élévation de privilèges locale cross-distro via PackageKit (Pack2TheRoot)
📝 ## 🔍 Contexte
Publié le 22 avril 2026 par l'équipe Red Team de Deutsche Telekom sur leur blog séc...
📖 cyberveille : https://cyberveille.ch/posts/2026-04-23-cve-2026-41651-elevation-de-privileges-locale-cross-distro-via-packagekit-pack2theroot/
🌐 source : https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
#CVE_2026_41651 #IOC #Cyberveille
Pack2TheRoot (CVE-2026-41651): Cross-Distro Local Privilege Escalation Vulnerability https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
##🟠 CVE-2026-41651 - High (8.8)
PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41651/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Forgot your root password? No problem! With #PackageKit <= 1.3.4 you can do all the fun root action on any Linux system you have local access to, no privileges required!
Don't like that? Then PLEASE UPDATE your system ASAP to PackageKit >= 1.3.5 or any fixed distro package. Fixes for this vulnerability should already be available everywhere since today.
You can read more about CVE-2026-41651 on the security researcher's blog:
https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
There is a great report out there by @dtcert
Telekom Red Team (great work guys) found a high severity LPE vulnerability in PackageKit daemon. In the report the distros of Ubuntu, Debian and Fedora and some more are mentioned as affected. Some left traces to hunt for the exploitation comes with the report, which is helpful.
edit: now known as CVE-2026-41651
https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
##Pack2TheRoot: Cross-Distro LPE in PackageKit
CVE: CVE-2026-41651
CVSS3: 8.8
https://github.security.telekom.com/2026/04/pack2theroot-linux-local-privilege-escalation.html
##updated 2026-04-22T21:23:52.620000
2 posts
🔥 CRITICAL vuln in nimiq-block (<1.3.0): Flawed input validation in SkipBlockProof::verify lets attackers bypass PoS quorum using crafted indices. Patch in v1.3.0 — upgrade ASAP! CVE-2026-33471 https://radar.offseq.com/threat/cve-2026-33471-cwe-20-improper-input-validation-in-2bd8708b #OffSeq #Rust #Security #Blockchain
##🔴 CVE-2026-33471 - Critical (9.6)
nimiq-block contains block primitives to be used in Nimiq's Rust implementation. `SkipBlockProof::verify` computes its quorum check using `BitSet.len()`, then iterates `BitSet` indices and casts each `usize` index to `u16` (`slot as u16`) for slot...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33471/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-41059 - High (8.2)
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions 7.5.0 through 7.15.1 have a configuration-dependent authentication bypass. Deployments are affected when all of the following are true: Use of `skip_auth...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41059/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🔴 CVE-2026-40575 - Critical (9.1)
OAuth2 Proxy is a reverse proxy that provides authentication using OAuth2 providers. Versions 7.5.0 through 7.15.1 may trust a client-supplied `X-Forwarded-Uri` header when `--reverse-proxy` is enabled and `--skip-auth-regex` or `--skip-auth-route...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40575/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-41133 - High (8.8)
pyLoad is a free and open-source download manager written in Python. Versions up to and including 0.5.0b3.dev97 cache `role` and `permission` in the session at login and continues to authorize requests using these cached values, even after an admi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41133/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-22754 - High (7.5)
Vulnerability in Spring Spring Security. If an application uses to define the servlet path for computing a path matcher, then the servlet path is not included and the related authorization rules are not exercised. This can lead to an authorizat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22754/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-22753 - High (7.5)
Vulnerability in Spring Spring Security. If an application is using securityMatchers(String) and a PathPatternRequestMatcher.Builder bean to prepend a servlet path, matching requests to that filter chain may fail and its related security compo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22753/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-6023 - High (8.1)
In Progress® Telerik® UI for AJAX versions 2024.4.1114 through 2026.1.421, the RadFilter control is vulnerable to insecure deserialization when restoring filter state if the state is exposed to the client. If an attacker tampers with this state,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6023/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-34065 - High (7.5)
nimiq-primitives contains primitives (e.g., block, account, transaction) to be used in Nimiq's Rust implementation. Prior to version 1.3.0, an untrusted p2p peer can cause a node to panic by announcing an election macro block whose `validators` se...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34065/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-6846 - High (7.8)
A flaw was found in binutils. A heap-buffer-overflow vulnerability exists when processing a specially crafted XCOFF (Extended Common Object File Format) object file during linking. A local attacker could trick a user into processing this malicious...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6846/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-6859 - High (8.8)
A flaw was found in InstructLab. The `linux_train.py` script hardcodes `trust_remote_code=True` when loading models from HuggingFace. This allows a remote attacker to achieve arbitrary Python code execution by convincing a user to run `ilab train/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6859/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-35548 - High (8.5)
An issue was discovered in guardsix (formerly Logpoint) ODBC Enrichment Plugins before 5.2.1 (5.2.1 is used in guardsix 7.9.0.0). A logic flaw allowed stored database credentials to be reused after modification of the target Host, IP address, or P...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-41060 - High (7.7)
WWBN AVideo is an open source video platform. In versions 29.0 and below, the `isSSRFSafeURL()` function in `objects/functions.php` contains a same-domain shortcircuit (lines 4290-4296) that allows any URL whose hostname matches `webSiteRootURL` t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41060/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-6832 - High (8.1)
Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the ses...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6832/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-40925 - High (8.3)
WWBN AVideo is an open source video platform. In versions 29.0 and prior, `objects/configurationUpdate.json.php` (also routed via `/updateConfig`) persists dozens of global site settings from `$_POST` but protects the endpoint only with `User::isA...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40925/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:23:52.620000
1 posts
🟠 CVE-2026-6823 - High (8.2)
HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the conf...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6823/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:18:45.917000
1 posts
🟠 CVE-2026-34413 - High (8.6)
Xerte Online Toolkits versions 3.15 and earlier contain a missing authentication vulnerability in the elFinder connector endpoint at /editor/elfinder/php/connector.php where an HTTP redirect to unauthenticated callers does not call exit() or die()...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34413/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:10:14.290000
1 posts
🟠 CVE-2026-40568 - High (8.5)
FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to 1.8.213 have a stored cross-site scripting (XSS) vulnerability in the mailbox signature feature. The sanitization function `Helper::stripDangerousTags()` (`app/Misc/He...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40568/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:08:48.550000
1 posts
🟠 CVE-2026-40870 - High (7.5)
Decidim is a participatory democracy framework. Starting in version 0.0.1 and prior to versions 0.30.5 and 0.31.1, the root level `commentable` field in the API allows access to all commentable resources within the platform, without any permission...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40870/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T21:08:48.550000
1 posts
🔴 CVE-2026-40887 - Critical (9.1)
Vendure is an open-source headless commerce platform. Starting in version 1.7.4 and prior to versions 2.3.4, 3.5.7, and 3.6.2, an unauthenticated SQL injection vulnerability exists in the Vendure Shop API. A user-controlled query string parameter ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40887/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T20:28:12.780000
1 posts
🔒 CVE-2026-40946 (CRITICAL, CVSS 9.2): oxia-db oxia < 0.16.2 improperly authenticates OIDC tokens, accepting tokens from other services. Upgrade to 0.16.2+ ASAP. No exploits seen. https://radar.offseq.com/threat/cve-2026-40946-cwe-287-improper-authentication-in--d724c488 #OffSeq #oxia #infosec #OIDC
##updated 2026-04-22T19:49:46
1 posts
🟠 CVE-2026-41135 - High (7.5)
free5GC UDR is the Policy Control Function (PCF) for free5GC, an an open-source project for 5th generation (5G) mobile core networks. A memory leak vulnerability in versions prior to 1.4.3 allows any unauthenticated attacker with network access to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41135/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T19:24:54
1 posts
🟠 CVE-2026-40937 - High (8.3)
RustFS is a distributed object storage system built in Rust. Prior to 1.0.0-alpha.94, all four notification target admin API endpoints in `rustfs/src/admin/handlers/event.rs` use a `check_permissions` helper that validates authentication only (acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:58
1 posts
🟠 CVE-2026-5262 - High (8)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.1.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 that under certain conditions could have allowed an unauthenticated user to access tokens in the Storyb...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5262/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:58
1 posts
🟠 CVE-2026-4922 - High (8.1)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.0 before 18.9.6, 18.10 before 18.10.4, and 18.11 before 18.11.1 that could have allowed an unauthenticated user to execute GraphQL mutations on behalf of authenticated u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4922/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:54
2 posts
updated 2026-04-22T18:31:52
1 posts
⛔ New security advisory:
CVE-2018-25270 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2018-25270-thinkphp-5-0-23-unauthenticated-remote-code-execution
updated 2026-04-22T18:31:46
1 posts
🟠 CVE-2026-35368 - High (7.8)
A vulnerability exists in the chroot utility of uutils coreutils when using the --userspec option. The utility resolves the user specification via getpwnam() after entering the chroot but before dropping root privileges. On glibc-based systems, th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35368/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:43
1 posts
🟠 CVE-2026-35246 - High (7.5)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35246/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:43
1 posts
🟠 CVE-2026-35245 - High (7.5)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via RDP to compro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35245/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:43
2 posts
🟠 CVE-2026-35242 - High (7.5)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35242 - High (7.5)
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:43
1 posts
🟠 CVE-2026-35243 - High (7.8)
Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows low privi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35243/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:42
1 posts
🟠 CVE-2026-34309 - High (8.1)
Vulnerability in the PeopleSoft Enterprise PeopleTools product of Oracle PeopleSoft (component: Security). Supported versions that are affected are 8.61-8.62. Easily exploitable vulnerability allows low privileged attacker with network access via...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34309/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:42
1 posts
🟠 CVE-2026-35231 - High (7.5)
Vulnerability in the Oracle Financial Services Transaction Filtering product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.1.2.8.0. Easily exploitable vulnerability allows unau...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35231/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T18:31:41
1 posts
🟠 CVE-2026-34310 - High (7.5)
Vulnerability in the Oracle Financial Services Analytical Applications Infrastructure product of Oracle Financial Services Applications (component: Platform). Supported versions that are affected are 8.0.7.9, 8.0.8.7 and 8.1.2.5. Easily exploita...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34310/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:32:43
1 posts
🟠 CVE-2026-34320 - High (7.5)
Vulnerability in the Oracle Financial Services Customer Screening product of Oracle Financial Services Applications (component: User Interface). The supported version that is affected is 8.1.2.8.0. Easily exploitable vulnerability allows unauthe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34320/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:32:43
1 posts
🟠 CVE-2026-5398 - High (8.4)
The implementation of TIOCNOTTY failed to clear a back-pointer from the structure representing the controlling terminal to the calling process' session. If the invoking process then exits, the terminal structure may end up containing a pointer to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5398/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:32:42
1 posts
🟠 CVE-2026-34290 - High (7.5)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34290/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:31:57
1 posts
1 repos
🔴 CVE-2026-6356 - Critical (9.6)
A vulnerability in the web application allows standard users to escalate their privileges to those of a super administrator through parameter manipulation, enabling them to access and modify sensitive information.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6356/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:31:56
1 posts
🟠 CVE-2026-33593 - High (7.5)
A client can trigger a divide by zero error leading to crash by sending a crafted DNSCrypt query.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33593/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:31:51
1 posts
🟠 CVE-2026-6857 - High (7.5)
A flaw was found in camel-infinispan. This vulnerability involves unsafe deserialization in the ProtoStream remote aggregation repository. A remote attacker with low privileges could exploit this by sending specially crafted data, leading to arbit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:31:41
2 posts
🟠 CVE-2026-34305 - High (7.5)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 and 15.1.1.0.0. Easily exploitable vulnerability allows unauth...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34305/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34305 - High (7.5)
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Web Services). Supported versions that are affected are 12.2.1.4.0, 14.1.1.0.0, 14.1.2.0.0 and 15.1.1.0.0. Easily exploitable vulnerability allows unauth...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34305/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:31:40
1 posts
🔴 CVE-2026-34279 - Critical (9.1)
Vulnerability in the Oracle Enterprise Manager Base Platform product of Oracle Enterprise Manager (component: Event Management). Supported versions that are affected are 13.5 and 24.1. Easily exploitable vulnerability allows high privileged atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34279/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:31:39
2 posts
🔴 CVE-2026-34286 - Critical (9.1)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34286/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-34286 - Critical (9.1)
Vulnerability in the Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core). The supported version that is affected is 12.2.1.4.0. Easily exploitable vulnerability allows unauthenticated attacker with network acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34286/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T11:38:56
1 posts
🟠 CVE-2026-40161 - High (7.7)
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to 1.10.0, the Tekton Pipelines git resolver in API mode sends the system-configured Git API token to a user-controlled serverURL when the user o...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40161/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T09:31:41
2 posts
🔴 CVE-2026-4119 - Critical (9.1)
The Create DB Tables plugin for WordPress is vulnerable to authorization bypass in all versions up to and including 1.2.1. The plugin registers admin_post action hooks for creating tables (admin_post_add_table) and deleting tables (admin_post_dele...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4119/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-4119: CRITICAL vuln in WordPress Create DB Tables plugin (≤1.2.1). Any authenticated user can create/delete DB tables, risking total site loss. Disable or restrict roles until patched. https://radar.offseq.com/threat/cve-2026-4119-cwe-862-missing-authorization-in-jpp-12851972 #OffSeq #WordPress #Vuln #CVE20264119
##updated 2026-04-22T09:31:40
1 posts
🟠 CVE-2026-6022 - High (7.5)
In Progress® Telerik® UI for AJAX prior to 2026.1.421, RadAsyncUpload contains an uncontrolled resource consumption vulnerability that allows file uploads to exceed the configured maximum size due to missing cumulative size enforcement during ch...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6022/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T09:31:40
1 posts
🔴 CVE-2026-6235 - Critical (9.8)
The Sendmachine for WordPress plugin for WordPress is vulnerable to authorization bypass via the 'manage_admin_requests' function in all versions up to, and including, 1.0.20. This is due to the plugin not properly verifying that a user is authori...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6235/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T06:30:35
1 posts
🔒 HIGH severity: aEnrich a+HRD (CVE-2026-6834) missing authorization flaw lets authenticated users read any database content via API. No patch yet — restrict API access & monitor for abuse. https://radar.offseq.com/threat/cve-2026-6834-cwe-862-missing-authorization-in-aen-34aab48f #OffSeq #Vulnerability #InfoSec #aEnrich
##updated 2026-04-22T00:32:48
2 posts
I just asked Mozilla about this. Someone responded that internally found bugs like the 271 go into “roll-up” advisories with, each rollup providing a link to the bug list covered.
The 3 rollups are:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6784
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6785
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6786
When you look at these rollups they say that "Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code."
With no way of knowing how many vulnerabilities were truly severe and exploitable, I think Mozilla, like others gushing ab out LLM-assisted vuln finding, is denying us the data to assess the true value of Mythos.
##🟠 CVE-2026-6784 - High (7.5)
Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fix...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6784/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T00:32:44
1 posts
🟠 CVE-2026-6772 - High (7.5)
Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6772/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T00:32:43
1 posts
🚨 New security advisory:
CVE-2026-6748 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-6748-firefox-thunderbird-unauth-rce-via-web-codecs
updated 2026-04-22T00:32:43
1 posts
🔴 New security advisory:
CVE-2026-6771 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-6771-firefox-mitigation-bypass-unauthenticated
updated 2026-04-21T21:32:31
1 posts
🟠 CVE-2026-31019 - High (8.8)
In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can byp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31019/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-21T21:31:34
1 posts
🟠 CVE-2026-6819 - High (8.8)
HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6819/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-21T20:28:37
1 posts
🟠 CVE-2026-40938 - High (7.5)
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to before 1.11.0, the git resolver's revision parameter is passed directly as a positional argument to git fetch without any validation that it d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-21T20:16:10
1 posts
🚩 CRITICAL: CVE-2026-41197 in noir-lang noir (<1.0.0-beta.19). Incorrect buffer allocation for nested arrays can corrupt Brillig VM heap. Memory safety risk! Upgrade to 1.0.0-beta.19+ ASAP. https://radar.offseq.com/threat/cve-2026-41197-cwe-131-incorrect-calculation-of-bu-282b810c #OffSeq #NoirLang #CVE202641197 #AppSec
##updated 2026-04-21T18:32:04
2 posts
@reverseics I went to the Crowdstrike site to see if there was a new advisory and found this instead. Obviously better than any advisory. Even a ../ in CVE-2026-40050.
##🔴 CVE-2026-40050 - Critical (9.8)
CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does no...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40050/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-21T18:32:04
1 posts
🔴 CVE-2025-15638 - Critical (10)
Net::Dropbear versions before 0.14 for Perl contains a vulnerable version of libtomcrypt.
Net::Dropbear versions before 0.14 includes versions of Dropbear 2019.78 or earlier. These include versions of libtomcrypt v1.18.1 or earlier, which is affe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15638/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-21T16:20:24.180000
1 posts
Critical Privilege Escalation Vulnerability in OpenClaw AI Agent Platform
OpenClaw patched a critical privilege escalation vulnerability (CVE-2026-41329) that allows remote attackers to bypass sandbox restrictions and gain full control over AI agent workflows.
**If you use OpenClaw for AI automation, update to version 2026.3.31 ASAP to prevent unauthorized system access. Ensure your AI agents are isolated from sensitive internal networks to limit the impact of potential sandbox escapes.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-privilege-escalation-vulnerability-in-openclaw-ai-agent-platform-3-0-v-8-v/gD2P6Ple2L
updated 2026-04-21T15:16:37.563000
3 posts
Projekt Terrarium, który miał uruchamiać kod generowany przez modele AI w bezpiecznej piaskownicy, okazał się śmiertelną pułapką. Luka CVE-2026-5752 pozwala napastnikom na przejęcie pełnej kontroli nad systemem, a najgorsze jest to, że projekt nie jest już rozwijany.
#si #ai #sztucznainteligencja #wiadomości #informacje #technologia
##Projekt Terrarium, który miał uruchamiać kod generowany przez modele AI w bezpiecznej piaskownicy, okazał się śmiertelną pułapką. Luka CVE-2026-5752 pozwala napastnikom na przejęcie pełnej kontroli nad systemem, a najgorsze jest to, że projekt nie jest już rozwijany.
#si #ai #sztucznainteligencja #wiadomości #informacje #technologia
##Critical Unpatched Sandbox Escape in Cohere AI Terrarium Allows Root Code Execution
Cohere AI's Terrarium sandbox contains a critical unpatched vulnerability (CVE-2026-5752) that allows attackers to escape the environment and execute commands as root on the host system.
**Stop using Cohere Terrarium immediately because it is unmaintained and the root-level escape vulnerability will not be patched. If you can't migrate, isolate the service in a dedicated virtual machine and block all outbound network access from the container.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-unpatched-sandbox-escape-in-cohere-ai-terrarium-allows-root-code-execution-i-g-r-b-w/gD2P6Ple2L
updated 2026-04-21T15:04:13
3 posts
An SSRF bug in an LLM deployment server got exploited 12 hours after it was patched
##An SSRF bug in an LLM deployment server got exploited 12 hours after it was patched
##updated 2026-04-21T13:00:03.373000
2 posts
Broadcom has three critical listings today: https://support.broadcom.com/web/ecx/security-advisory
- Datacom Health Check Analyzer 1.1 Vulnerability
- IDMS Server: OpenSSL Vulnerability CVE-2026-28386
- MICS REST API SERVER - 14.5 Vulnerability in Spring Security
Also:
Cisco has a critical advisory:
- CVE-2026-20122; CVE-2026-20126 and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
Cisco has also tagged 7Zip and Adobe for zero-day reports https://talosintelligence.com/vulnerability_info @TalosSecurity #infoec #Broadcom #vulnerability #zeroday #Adobe
##CISA Confirms Active Exploitation of Three Cisco Networking Vulnerabilities
CISA has confirmed the active exploitation of three Cisco Catalyst SD-WAN Manager vulnerabilities (CVE-2026-20122, CVE-2026-20128, and CVE-2026-20133) that allow attackers to overwrite system files, steal credentials, and access sensitive data. Federal agencies are required to patch these flaws by April 23, 2026, to mitigate risks of unauthorized system takeover.
**If you use Cisco Catalyst SD-WAN Manager check your versions against the February advisory. CISA has confirmed these flaws are exploited, so start patching.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-confirms-active-exploitation-of-three-cisco-networking-vulnerabilities-z-r-8-k-j/gD2P6Ple2L
updated 2026-04-20T21:32:43
1 posts
CISA Confirms Active Exploitation of Three Cisco Networking Vulnerabilities
CISA has confirmed the active exploitation of three Cisco Catalyst SD-WAN Manager vulnerabilities (CVE-2026-20122, CVE-2026-20128, and CVE-2026-20133) that allow attackers to overwrite system files, steal credentials, and access sensitive data. Federal agencies are required to patch these flaws by April 23, 2026, to mitigate risks of unauthorized system takeover.
**If you use Cisco Catalyst SD-WAN Manager check your versions against the February advisory. CISA has confirmed these flaws are exploited, so start patching.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-confirms-active-exploitation-of-three-cisco-networking-vulnerabilities-z-r-8-k-j/gD2P6Ple2L
updated 2026-04-20T21:31:38
2 posts
Broadcom has three critical listings today: https://support.broadcom.com/web/ecx/security-advisory
- Datacom Health Check Analyzer 1.1 Vulnerability
- IDMS Server: OpenSSL Vulnerability CVE-2026-28386
- MICS REST API SERVER - 14.5 Vulnerability in Spring Security
Also:
Cisco has a critical advisory:
- CVE-2026-20122; CVE-2026-20126 and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
Cisco has also tagged 7Zip and Adobe for zero-day reports https://talosintelligence.com/vulnerability_info @TalosSecurity #infoec #Broadcom #vulnerability #zeroday #Adobe
##CISA Confirms Active Exploitation of Three Cisco Networking Vulnerabilities
CISA has confirmed the active exploitation of three Cisco Catalyst SD-WAN Manager vulnerabilities (CVE-2026-20122, CVE-2026-20128, and CVE-2026-20133) that allow attackers to overwrite system files, steal credentials, and access sensitive data. Federal agencies are required to patch these flaws by April 23, 2026, to mitigate risks of unauthorized system takeover.
**If you use Cisco Catalyst SD-WAN Manager check your versions against the February advisory. CISA has confirmed these flaws are exploited, so start patching.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-confirms-active-exploitation-of-three-cisco-networking-vulnerabilities-z-r-8-k-j/gD2P6Ple2L
updated 2026-04-17T19:21:23.993000
3 posts
2 repos
CVE-2026-33824: Remote Code Execution in Windows IKEv2 https://www.thezdi.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
##CVE-2026-33824: Remote Code Execution in Windows IKEv2 - the folks from TrendAI Research break down this wormable bug that was patched last week. The show root cause & offer detection guidance. Read the details as https://www.zerodayinitiative.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
##CVE-2026-33824: Remote Code Execution in Windows IKEv2 - the folks from TrendAI Research break down this wormable bug that was patched last week. The show root cause & offer detection guidance. Read the details as https://www.zerodayinitiative.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
##updated 2026-04-16T21:18:18
2 posts
🚨 CRITICAL: CVE-2026-40933 in FlowiseAI Flowise (< 3.1.0) allows authenticated OS command injection via unsafe MCP adapter serialization. Upgrade to 3.1.0+ to fully mitigate. CVSS 10 — patch now! https://radar.offseq.com/threat/cve-2026-40933-cwe-78-improper-neutralization-of-s-3bdaeff3 #OffSeq #Vulnerability #FlowiseAI #Cybersecurity
##🔴 CVE-2026-40933 - Critical (9.9)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, due to unsafe serialization of stdio commands in the MCP adapter, an authenticated attacker can add an MCP stdio server with an arbitrary comm...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40933/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:18:41
1 posts
🟠 CVE-2026-40890 - High (7.5)
The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Processing a malformed input containing a < character that is not followed by a > character anywhere in the remaining text with a Smartyp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:14:55
1 posts
🟠 CVE-2026-40879 - High (7.5)
Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.19, when an attacker sends many small, valid JSON messages in one TCP frame, handleData() recurses once per message; the buffer shrinks each call. maxBufferS...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40879/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:06:59
1 posts
🔴 CVE-2026-40576 - Critical (9.4)
excel-mcp-server is a Model Context Protocol server for Excel file manipulation. A path traversal vulnerability exists in excel-mcp-server versions up to and including 0.1.7. When running in SSE or Streamable-HTTP transport mode (the documented wa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40576/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T14:53:58.147000
2 posts
#OT #Advisory VDE-2026-019
Pilz: Vulnerability affecting PASvisu Runtime
The PASvisu Runtime is affected by a vulnerability in a third-party component which can be exploited by malicious web requests.
#CVE CVE-2018-25193
https://certvde.com/en/advisories/vde-2026-019/
#CSAF https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-002.json
###OT #Advisory VDE-2026-019
Pilz: Vulnerability affecting PASvisu Runtime
The PASvisu Runtime is affected by a vulnerability in a third-party component which can be exploited by malicious web requests.
#CVE CVE-2018-25193
https://certvde.com/en/advisories/vde-2026-019/
#CSAF https://pilz.csaf-tp.certvde.com/.well-known/csaf/white/2026/ppsa-2026-002.json
##updated 2026-04-13T21:23:27
2 posts
5 repos
https://github.com/ercihan/CVE-2026-34621
https://github.com/eduardorossi84/CVE-2026-34621-POC
https://github.com/ercihan/CVE-2026-34621_PDF_SAMPLE
https://github.com/KeulenR01/Remediate-AdobeAcrobat-CVE-2026-34621
CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE https://nefariousplan.com/posts/adobe-acrobat-cve-2026-34621-detection-lie
##CVE-2026-34621: Adobe Acrobat Reader zero-day was on VirusTotal for 136 days before Adobe named it a CVE https://nefariousplan.com/posts/adobe-acrobat-cve-2026-34621-detection-lie
##updated 2026-04-09T19:06:18
5 posts
5 repos
https://github.com/keraattin/CVE-2026-39987
https://github.com/fevar54/marimo_CVE-2026-39987_RCE_PoC
https://github.com/Nxploited/CVE-2026-39987
🚨 [CISA-2026:0423] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0423)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-39987 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- Name: Marimo Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Marimo
- Product: Marimo
- Notes: https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc ; https://nvd.nist.gov/vuln/detail/CVE-2026-39987
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260423 #cisa20260423 #cve_2026_39987 #cve202639987
##CVE ID: CVE-2026-39987
Vendor: Marimo
Product: Marimo
Date Added: 2026-04-23
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-39987
Five critical self-hosted flaws landed April 20-22. Marimo pre-auth remote takeover (CVE-2026-39987, CVSS 9.3), exploited in 10 hours. Apache Airflow XCom. Spinnaker Echo. Jellystat SQL injection to takeover (CVE-2026-41167, 9.1). OpenVPN 2.7.2 fixed two. Three trace to injection. Across 14 compliant platforms I have architected, the audit finding is patch cadence, not availability. A 10-hour window makes quarterly cadence a breach timeline.
##🚨 [CISA-2026:0423] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0423)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-39987 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- Name: Marimo Remote Code Execution Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Marimo
- Product: Marimo
- Notes: https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc ; https://nvd.nist.gov/vuln/detail/CVE-2026-39987
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260423 #cisa20260423 #cve_2026_39987 #cve202639987
##CVE ID: CVE-2026-39987
Vendor: Marimo
Product: Marimo
Date Added: 2026-04-23
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-39987
updated 2026-04-01T15:30:57
1 posts
2 repos
@pgl Related article from the same person: https://www.flyingpenguin.com/freebsd-cve-2026-4747-log-suggests-mythos-is-a-marketing-trick/
##updated 2026-03-19T19:16:19.230000
3 posts
6 repos
https://github.com/x-stp/cves-2025-11187_15467_69418
https://github.com/materaj2/cve-2025-15467
https://github.com/guiimoraes/CVE-2025-15467
https://github.com/WostGit/cve-2025-15467-crash
#OT #Advisory VDE-2026-029
METTLER TOLEDO: OpenSSL vulnerability in MX and MR balances
MX/MR firmware V2.0.0 or earlier is affected by the OpenSSL vulnerability CVE-2025-15467.
#CVE CVE-2025-15467
https://certvde.com/en/advisories/vde-2026-029/
#oCSAF
#CSAF https://mettler-toledo.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-029.json
#OT #Advisory VDE-2026-029
METTLER TOLEDO: OpenSSL vulnerability in MX and MR balances
MX/MR firmware V2.0.0 or earlier is affected by the OpenSSL vulnerability CVE-2025-15467.
#CVE CVE-2025-15467
https://certvde.com/en/advisories/vde-2026-029/
#oCSAF
#CSAF https://mettler-toledo.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-029.json
#OT #Advisory VDE-2026-023
Phoenix Contact: Several products are affected by vulnerabilities found in OpenSSL
Attacks are possible when installing key files and digitally signed objects. These attacks can only be carried out if these files are uploaded and installed by a logged-in user with high privileges.
#CVE CVE-2025-15467, CVE-2025-69419
https://certvde.com/en/advisories/vde-2026-023/
#CSAF https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-023.json
##updated 2026-03-04T21:21:49.053000
1 posts
Broadcom has three critical listings today: https://support.broadcom.com/web/ecx/security-advisory
- Datacom Health Check Analyzer 1.1 Vulnerability
- IDMS Server: OpenSSL Vulnerability CVE-2026-28386
- MICS REST API SERVER - 14.5 Vulnerability in Spring Security
Also:
Cisco has a critical advisory:
- CVE-2026-20122; CVE-2026-20126 and CVE-2026-20128: Cisco Catalyst SD-WAN Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v
Cisco has also tagged 7Zip and Adobe for zero-day reports https://talosintelligence.com/vulnerability_info @TalosSecurity #infoec #Broadcom #vulnerability #zeroday #Adobe
##updated 2026-02-27T20:27:32.587000
1 posts
🟠 CVE-2026-40931 - High (8.4)
Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and 1.10.5, the patch for CVE-2026-24884 relies on a purely logical string validation within the isPathWithinParent utility. This check verifies if a resolved path string ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40931/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-01-29T18:32:43
1 posts
#OT #Advisory VDE-2026-023
Phoenix Contact: Several products are affected by vulnerabilities found in OpenSSL
Attacks are possible when installing key files and digitally signed objects. These attacks can only be carried out if these files are uploaded and installed by a logged-in user with high privileges.
#CVE CVE-2025-15467, CVE-2025-69419
https://certvde.com/en/advisories/vde-2026-023/
#CSAF https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-023.json
##updated 2026-01-05T01:10:11
1 posts
1 repos
📢 CVE-2026-21445 : Exploitation active d'un bypass d'authentification critique dans Langflow
📝 ...
📖 cyberveille : https://cyberveille.ch/posts/2026-04-23-cve-2026-21445-exploitation-active-d-un-bypass-d-authentification-critique-dans-langflow/
🌐 source : https://www.crowdsec.net/vulntracking-report/cve-2026-21445-langflow-authentication-bypass-exploitation?_hsenc=p2ANqtz-8fi8jP4d1H8aWB_uJ6Ww_87D_KkIXx5ovUbCpday58aR6bIscTW-Jn0FlCtn3C7HhZAxQzf5orwE-aXIYrTKuNCHzkvg&_hsmi=414639806
#AI_framework #CVE_2026_21445 #Cyberveille
updated 2025-10-31T21:59:38.500000
2 posts
9 repos
https://github.com/rxwx/pulse-meter
https://github.com/yoryio/CVE-2023-46805
https://github.com/cbeek-r7/CVE-2023-46805
https://github.com/w2xim3/CVE-2023-46805
https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887
https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser
https://github.com/Chocapikk/CVE-2023-46805
CVE-2023-46805 is actively exploited in Ivanti Connect Secure and Policy Secure gateways. When chained with CVE-2024-21887, attackers gain unauthenticated RCE and full VPN appliance compromise, posing critical enterprise perimeter risk.
Read the full threat brief:
https://thecybermind.co/i1n8
CVE-2023-46805 is actively exploited in Ivanti Connect Secure and Policy Secure gateways. When chained with CVE-2024-21887, attackers gain unauthenticated RCE and full VPN appliance compromise, posing critical enterprise perimeter risk.
Read the full threat brief:
https://thecybermind.co/i1n8
updated 2025-10-31T21:56:55.430000
2 posts
12 repos
https://github.com/Chocapikk/CVE-2024-21887
https://github.com/rxwx/pulse-meter
https://github.com/pwniel/ivanti_shell
https://github.com/yoryio/CVE-2023-46805
https://github.com/oways/ivanti-CVE-2024-21887
https://github.com/Chocapikk/CVE-2024-21893-to-CVE-2024-21887
https://github.com/gobysec/Goby
https://github.com/raminkarimkhani1996/CVE-2023-46805_CVE-2024-21887
https://github.com/Hexastrike/Ivanti-Connect-Secure-Logs-Parser
https://github.com/gobysec/GobyVuls
CVE-2023-46805 is actively exploited in Ivanti Connect Secure and Policy Secure gateways. When chained with CVE-2024-21887, attackers gain unauthenticated RCE and full VPN appliance compromise, posing critical enterprise perimeter risk.
Read the full threat brief:
https://thecybermind.co/i1n8
CVE-2023-46805 is actively exploited in Ivanti Connect Secure and Policy Secure gateways. When chained with CVE-2024-21887, attackers gain unauthenticated RCE and full VPN appliance compromise, posing critical enterprise perimeter risk.
Read the full threat brief:
https://thecybermind.co/i1n8
updated 2025-10-22T00:33:51
2 posts
2 repos
CVE-2023-33538 under attack for a year, but exploitation still unsuccessful https://securityaffairs.com/191040/hacking/cve-2023-33538-under-attack-for-a-year-but-exploitation-still-unsuccessful.html
##TP-Link router owners beware | A Deep Dive Into Attempted Exploitation of CVE-2023-33538 #devopsish https://unit42.paloaltonetworks.com/exploitation-of-cve-2023-33538/
##🟠 CVE-2026-41267 - High (8.1)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, an improper mass assignment (JSON injection) vulnerability in the account registration endpoint of Flowise Cloud allows unauthenticated attack...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41267/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41267 - High (8.1)
Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, an improper mass assignment (JSON injection) vulnerability in the account registration endpoint of Flowise Cloud allows unauthenticated attack...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41267/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41230 - High (8.5)
Froxlor is open source server administration software. Prior to version 2.3.6, `DomainZones::add()` accepts arbitrary DNS record types without a whitelist and does not sanitize newline characters in the `content` field. When a DNS type not covered...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41230 - High (8.5)
Froxlor is open source server administration software. Prior to version 2.3.6, `DomainZones::add()` accepts arbitrary DNS record types without a whitelist and does not sanitize newline characters in the `content` field. When a DNS type not covered...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41229 - Critical (9.1)
Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP string literals without escaping single quotes. When an admin with `change_serversettings`...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41229 - Critical (9.1)
Froxlor is open source server administration software. Prior to version 2.3.6, `PhpHelper::parseArrayToString()` writes string values into single-quoted PHP string literals without escaping single quotes. When an admin with `change_serversettings`...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41228 - Critical (9.9)
Froxlor is open source server administration software. Prior to version 2.3.6, the Froxlor API endpoint `Customers.update` (and `Admins.update`) does not validate the `def_language` parameter against the list of available language files. An authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41228/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 New security advisory:
CVE-2026-41228 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-41228-froxlor-rce-via-path-traversal
🔴 CVE-2026-41228 - Critical (9.9)
Froxlor is open source server administration software. Prior to version 2.3.6, the Froxlor API endpoint `Customers.update` (and `Admins.update`) does not validate the `def_language` parameter against the list of available language files. An authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41228/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41564 - High (7.5)
CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking.
The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41564/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41564 - High (7.5)
CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking.
The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41564/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41564 - High (7.5)
CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking.
The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41564/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41564 - High (7.5)
CryptX versions before 0.088 for Perl do not reseed the Crypt::PK PRNG state after forking.
The Crypt::PK::RSA, Crypt::PK::DSA, Crypt::PK::DH, Crypt::PK::ECC, Crypt::PK::Ed25519 and Crypt::PK::X25519 modules seed a per-object PRNG state in their ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41564/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41241 - High (8.7)
pretalx is a conference planning tool. Prior to 2026.1.0, The organiser search in the pretalx backend rendered submission titles, speaker display names, and user names/emails into the result dropdown using innerHTML string interpolation. Any user ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41241/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41241 - High (8.7)
pretalx is a conference planning tool. Prior to 2026.1.0, The organiser search in the pretalx backend rendered submission titles, speaker display names, and user names/emails into the result dropdown using innerHTML string interpolation. Any user ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41241/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##I just asked Mozilla about this. Someone responded that internally found bugs like the 271 go into “roll-up” advisories with, each rollup providing a link to the bug list covered.
The 3 rollups are:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6784
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6785
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6786
When you look at these rollups they say that "Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code."
With no way of knowing how many vulnerabilities were truly severe and exploitable, I think Mozilla, like others gushing ab out LLM-assisted vuln finding, is denying us the data to assess the true value of Mythos.
##I just asked Mozilla about this. Someone responded that internally found bugs like the 271 go into “roll-up” advisories with, each rollup providing a link to the bug list covered.
The 3 rollups are:
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6784
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6785
https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/#CVE-2026-6786
When you look at these rollups they say that "Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code."
With no way of knowing how many vulnerabilities were truly severe and exploitable, I think Mozilla, like others gushing ab out LLM-assisted vuln finding, is denying us the data to assess the true value of Mythos.
##1 posts
1 repos
https://github.com/JivaSecurity/ESPOCRM-RCE-POC-CVE-2026-33656
🔴 CVE-2026-33656 - Critical (9.1)
EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, EspoCRM's built-in formula scripting engine allowing updating attachment's sourceId thus allowing an authenticated admin to overwrite the `sourceId` fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33656/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41064 - Critical (9.3)
WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg` for wget but leaves the `file_get_contents` and `curl` code paths unsanitized, and the URL validati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41064/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛑 CRITICAL: WWBN AVideo <=29.0 vulnerable to OS command injection (CVE-2026-41064, CVSS 9.3). Unauthenticated attackers can exploit weak URL validation to run arbitrary commands. No official patch — see commit for fix details. https://radar.offseq.com/threat/cve-2026-41064-cwe-78-improper-neutralization-of-s-446caa6f #OffSeq #CVE202641064 #infosec
##🟠 CVE-2026-34063 - High (7.5)
Nimiq's network-libp2p is a Nimiq network implementation based on libp2p. Prior to version 1.3.0, `network-libp2p` discovery uses a libp2p `ConnectionHandler` state machine. the handler assumes there is at most one inbound and one outbound discove...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34063/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
###OT #Advisory VDE-2026-016
VEGA: Unsecured Configuration Interface Allows Unauthorized Access Leading to Privilege Escalation
Vulnerable components expose sensitive information to unauthorized actors through an unsecured configuration interface. Vulnerable firmware releases contain an unsecured configuration interface that allows retrieval of sensitive information such as hashed credentials.
#CVE CVE-2026-3323
https://certvde.com/en/advisories/vde-2026-016/
#CSAF https://vega.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-016.json
##🟠 CVE-2026-41056 - High (8.1)
WWBN AVideo is an open source video platform. In versions 29.0 and below, the `allowOrigin($allowAll=true)` function in `objects/functions.php` reflects any arbitrary `Origin` header back in `Access-Control-Allow-Origin` along with `Access-Control...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41056/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41055 - High (8.6)
WWBN AVideo is an open source video platform. In versions 29.0 and below, an incomplete SSRF fix in AVideo's LiveLinks proxy adds `isSSRFSafeURL()` validation but leaves DNS TOCTOU vulnerabilities where DNS rebinding between validation and the act...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41055/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41058 - High (8.1)
WWBN AVideo is an open source video platform. In versions 29.0 and below, the incomplete fix for AVideo's CloneSite `deleteDump` parameter does not apply path traversal filtering, allowing `unlink()` of arbitrary files via `../../` sequences in th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41058/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40706 - High (8.4)
In NTFS-3G 2022.10.3 before 2026.2.25, a heap buffer overflow exists in ntfs_build_permissions_posix() in acls.c that allows an attacker to corrupt heap memory in the SUID-root ntfs-3g binary by crafting a malicious NTFS image. The overflow is tri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40706/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40905 - High (8.1)
LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, a password reset poisoning vulnerability was identified in the application due to improper trust of user-controlled HTTP headers. The application uses the X-Forwarded-Host ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40905 - High (8.1)
LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, a password reset poisoning vulnerability was identified in the application due to improper trust of user-controlled HTTP headers. The application uses the X-Forwarded-Host ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40903 - Critical (9.1)
goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs has an ArtiPACKED vulnerability. ArtiPACKED can lead to leakage of the GITHUB_TOKEN through workflow artifacts, even though the token is not present in the repository source c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40909 - High (8.7)
WWBN AVideo is an open source video platform. In versions 29.0 and prior, the locale save endpoint (`locale/save.php`) constructs a file path by directly concatenating `$_POST['flag']` into the path at line 30 without any sanitization. The `$_POST...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40909/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40569 - Critical (9)
FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to 1.8.213 have a mass assignment vulnerability in the mailbox connection settings endpoints of FreeScout (`connectionIncomingSave()` at `app/Http/Controllers/MailboxesCo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40613 - High (7.5)
Coturn is a free open source implementation of TURN and STUN Server. Prior to 4.10.0, the STUN/TURN attribute parsing functions in coturn perform unsafe pointer casts from uint8_t * to uint16_t * without alignment checks. When processing a crafted...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##