## Updated at UTC 2026-04-17T23:31:11.333665

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-40258 9.1 0.00% 2 0 2026-04-17T22:16:32.067000 The Gramps Web API is a Python REST API for the genealogical research software G
CVE-2026-40525 9.1 0.00% 2 0 2026-04-17T21:31:53 OpenViking prior to commit c7bb167 contains an authentication bypass vulnerabili
CVE-2026-35546 9.8 0.00% 2 0 2026-04-17T20:16:35.380000 Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This
CVE-2026-32105 0 0.00% 2 0 2026-04-17T20:16:33.517000 xrdp is an open source RDP server. In versions through 0.10.5, xrdp does not imp
CVE-2026-28224 8.2 0.00% 2 0 2026-04-17T20:16:32.460000 Firebird is an open-source relational database management system. In versions pr
CVE-2026-6359 8.8 0.07% 1 0 2026-04-17T19:21:14.907000 Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allo
CVE-2026-6363 8.8 0.07% 1 0 2026-04-17T19:19:48.317000 Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote a
CVE-2026-40170 7.5 0.04% 2 0 2026-04-17T19:16:37.763000 ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.2
CVE-2026-33337 7.5 0.00% 2 0 2026-04-17T19:16:36.223000 Firebird is an open-source relational database management system. In versions pr
CVE-2026-28212 7.5 0.00% 2 0 2026-04-17T19:16:35.180000 Firebird is an open-source relational database management system. In versions pr
CVE-2026-27890 8.2 0.00% 2 0 2026-04-17T19:16:34.993000 Firebird is an open-source relational database management system. In versions pr
CVE-2026-6316 8.8 0.08% 1 0 2026-04-17T19:08:02.587000 Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remot
CVE-2026-37749 9.8 0.00% 4 1 2026-04-17T18:32:56 A SQL injection vulnerability in CodeAstro Simple Attendance Management System v
CVE-2026-6305 8.8 0.03% 1 0 2026-04-17T18:32:55 Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed
CVE-2026-5718 8.1 0.00% 2 0 2026-04-17T18:32:05 The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress i
CVE-2026-5710 7.5 0.00% 2 0 2026-04-17T18:31:54 The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress i
CVE-2026-3464 8.8 0.00% 2 0 2026-04-17T18:31:53 The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read a
CVE-2026-40516 8.3 0.00% 2 0 2026-04-17T18:31:53 OpenHarness before commit bd4df81 contains a server-side request forgery vulnera
CVE-2026-40515 7.5 0.00% 2 0 2026-04-17T18:31:53 OpenHarness before commit bd4df81 contains a permission bypass vulnerability tha
CVE-2026-6284 9.1 0.00% 4 0 2026-04-17T18:31:52 An attacker with network access to the PLC is able to brute force discover passw
CVE-2026-6309 8.3 0.02% 1 0 2026-04-17T17:26:50.993000 Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote
CVE-2026-6296 9.6 0.02% 2 0 2026-04-17T15:42:44.730000 Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a
CVE-2026-6301 8.8 0.03% 1 0 2026-04-17T15:41:01.207000 Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a re
CVE-2026-33435 8.0 0.33% 2 0 2026-04-17T15:38:09.243000 Weblate is a web based localization tool. In versions prior to 5.17, the project
CVE-2026-40322 9.0 0.05% 2 0 2026-04-17T15:38:09.243000 SiYuan is an open-source personal knowledge management system. In versions 3.6.3
CVE-2026-31843 9.8 0.89% 2 0 2026-04-17T15:38:09.243000 The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerabili
CVE-2026-33555 4.0 0.01% 1 1 2026-04-17T15:38:09.243000 An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not chec
CVE-2026-30656 7.5 0.06% 1 0 2026-04-17T15:38:09.243000 A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.
CVE-2026-40176 7.8 0.01% 1 3 2026-04-17T15:38:09.243000 Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 th
CVE-2026-40193 8.2 0.06% 1 0 2026-04-17T15:38:09.243000 maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain a
CVE-2026-40504 9.8 0.07% 2 0 2026-04-17T15:38:09.243000 Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in t
CVE-2026-6349 0 0.95% 1 0 2026-04-17T15:38:09.243000 The  iSherlock developed by HGiga  has an OS Command Injection vulnerability, al
CVE-2026-6351 7.5 0.02% 1 0 2026-04-17T15:38:09.243000 MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, al
CVE-2026-6507 7.5 0.00% 2 0 2026-04-17T15:31:27 A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds wr
CVE-2026-40262 8.7 0.03% 2 0 2026-04-17T15:29:25.583000 Note Mark is an open-source note-taking application. In versions 0.19.1 and prio
CVE-2026-6270 9.1 0.03% 1 0 2026-04-17T15:17:00.957000 @fastify/middie versions 9.3.1 and earlier do not register inherited middleware
CVE-2026-23772 7.3 0.01% 1 0 2026-04-17T15:17:00.957000 Dell Storage Manager - Replay Manager for Microsoft Servers, version(s) 8.0, con
CVE-2026-37338 9.4 0.03% 1 0 2026-04-17T15:15:09.790000 SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Inj
CVE-2026-39808 9.8 0.29% 1 2 2026-04-17T15:11:35.840000 A improper neutralization of special elements used in an os command ('os command
CVE-2026-32163 7.8 0.04% 1 0 2026-04-17T15:10:35.607000 Concurrent execution using shared resource with improper synchronization ('race
CVE-2026-32168 7.8 0.07% 1 0 2026-04-17T15:10:35.607000 Improper input validation in Azure Monitor Agent allows an authorized attacker t
CVE-2026-32183 7.8 0.05% 1 0 2026-04-17T15:10:35.607000 Improper neutralization of special elements used in a command ('command injectio
CVE-2026-20186 9.9 0.23% 3 0 2026-04-17T15:09:46.880000 A vulnerability in Cisco Identity Services Engine (ISE) could allow an authentic
CVE-2026-20184 9.8 0.05% 5 0 2026-04-17T15:09:46.880000 A vulnerability in the integration of single sign-on (SSO) with Control Hub in C
CVE-2026-20180 9.9 0.21% 4 0 2026-04-17T15:09:46.880000 A vulnerability in Cisco Identity Services Engine (ISE) could allow an authentic
CVE-2026-4857 8.4 0.03% 2 0 2026-04-17T15:08:01.337000 IdentityIQ 8.5, all IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4,
CVE-2026-35569 8.7 0.03% 2 0 2026-04-17T15:08:01.337000 ApostropheCMS is an open-source Node.js content management system. Versions 4.28
CVE-2026-23775 7.6 0.01% 2 0 2026-04-17T15:07:18.050000 Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD O
CVE-2026-23853 8.4 0.01% 2 0 2026-04-17T09:31:26 Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Featu
CVE-2025-36568 7.9 0.01% 2 0 2026-04-17T09:31:25 Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7
CVE-2026-33392 7.2 0.00% 2 0 2026-04-17T09:31:19 In JetBrains YouTrack before 2025.3.131383 high privileged user can achieve RCE
CVE-2026-6443 9.8 0.04% 6 0 2026-04-17T09:31:18 The Accordion and Accordion Slider plugin for WordPress is vulnerable to an inje
CVE-2026-4659 7.5 0.03% 2 0 2026-04-17T09:31:18 The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbit
CVE-2026-21719 7.2 0.18% 2 0 2026-04-17T06:31:14 An OS command injection vulnerability exists in CubeCart prior to 6.6.0, which m
CVE-2026-3605 8.1 0.01% 2 0 2026-04-17T06:31:14 An authenticated user with access to a kvv2 path through a policy containing a g
CVE-2026-5807 7.5 0.01% 2 0 2026-04-17T06:31:08 Vault is vulnerable to a denial-of-service condition where an unauthenticated at
CVE-2026-4525 7.5 0.01% 2 0 2026-04-17T06:31:08 If a Vault auth mount is configured to pass through the "Authorization" header,
CVE-2026-22734 8.6 0.01% 2 0 2026-04-17T03:30:52 Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a
CVE-2026-41113 8.1 0.08% 2 0 2026-04-17T00:31:10 sagredo qmail before 2026.04.07 allows tls_quit remote code execution because of
CVE-2026-33032 9.8 4.97% 8 2 template 2026-04-16T22:16:37.433000 Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and
CVE-2026-40245 7.5 0.10% 1 0 2026-04-16T21:57:38 ### Summary An information disclosure vulnerability in the UDR service allows an
CVE-2026-40261 8.8 0.03% 1 2 2026-04-16T21:55:08 ### Impact The `Perforce::syncCodeBase()` method appended the `$sourceReference`
CVE-2026-34197 8.8 46.64% 16 7 template 2026-04-16T21:49:17 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2025-41118 9.1 0.03% 2 0 2026-04-16T21:41:16 Pyroscope is an open-source continuous profiling database. The database supports
CVE-2026-6290 8.1 0.03% 2 0 2026-04-16T21:33:30 Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plu
CVE-2026-32282 6.4 0.01% 1 0 2026-04-16T21:32:15 On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod
CVE-2026-4424 7.5 0.20% 1 0 2026-04-16T21:32:14 A flaw was found in libarchive. This heap out-of-bounds read vulnerability exist
CVE-2026-6442 8.4 0.07% 1 0 2026-04-16T21:31:19 Improper validation of bash commands in Snowflake Cortex Code CLI versions prior
CVE-2026-5194 9.1 0.03% 2 0 2026-04-16T21:31:11 Missing hash/digest size and OID checks allow digests smaller than allowed when
CVE-2026-40173 9.4 0.10% 1 0 2026-04-16T21:08:08 ### Summary An unauthenticated debug endpoint in Dgraph Alpha exposes the full p
CVE-2026-34393 8.8 0.04% 2 0 2026-04-16T20:43:50 ### Impact The user patching API endpoint didn't properly limit the scope of ed
CVE-2026-34242 7.7 0.01% 2 0 2026-04-16T20:43:12 ### Impact The ZIP download feature didn't verify downloaded file and it could
CVE-2026-30459 7.1 0.04% 1 0 2026-04-16T18:32:28 An issue in the Forgot Password feature of Daylight Studio FuelCMS v1.5.2 allows
CVE-2026-5426 None 0.08% 1 0 2026-04-16T18:31:28 Hard-coded ASP.NET/IIS machineKey value in Digital Knowledge KnowledgeDeliver de
CVE-2026-30993 9.8 0.29% 2 0 2026-04-16T15:32:35 Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE
CVE-2026-3324 8.2 0.14% 1 0 2026-04-16T15:31:44 Zohocorp ManageEngine Log360 versions 13000 through 13013 are vulnerable to auth
CVE-2026-5785 8.1 0.02% 1 0 2026-04-16T15:31:44 Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Mana
CVE-2026-22619 7.9 0.01% 1 0 2026-04-16T15:31:33 Eaton Intelligent Power Protector (IPP) is affected by insecure library loading
CVE-2026-6319 7.5 0.08% 1 0 2026-04-16T12:32:42 Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 a
CVE-2026-3489 7.5 0.02% 1 0 2026-04-16T12:31:47 The DirectoryPress – Business Directory And Classified Ad Listing plugin for Wor
CVE-2026-6308 7.5 0.08% 1 0 2026-04-16T12:31:41 Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a r
CVE-2026-6318 8.8 0.08% 1 0 2026-04-16T12:31:41 Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remo
CVE-2026-6306 8.8 0.07% 1 0 2026-04-16T12:31:40 Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed
CVE-2026-6303 8.8 0.08% 1 0 2026-04-16T12:31:40 Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remo
CVE-2025-14868 8.8 0.02% 1 0 2026-04-16T09:31:50 The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forg
CVE-2026-1620 8.8 0.07% 1 0 2026-04-16T07:16:29.787000 The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local Fi
CVE-2026-3596 9.8 0.04% 2 0 2026-04-16T06:31:29 The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Esc
CVE-2026-3614 8.8 0.02% 1 0 2026-04-16T06:31:29 The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all
CVE-2026-5050 7.5 0.01% 1 0 2026-04-16T06:31:29 The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulner
CVE-2026-3599 7.5 0.04% 1 0 2026-04-16T06:16:17.063000 The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection
CVE-2026-6350 9.8 0.06% 2 0 2026-04-16T03:31:15 MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vuln
CVE-2026-1880 None 0.01% 1 1 2026-04-16T03:31:14 An Incorrect Permission Assignment for Critical Resource vulnerability in the AS
CVE-2026-40960 8.2 0.00% 1 0 2026-04-16T03:31:13 Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environ
CVE-2026-40959 9.4 0.00% 1 0 2026-04-16T03:31:13 Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a c
CVE-2026-3428 None 0.00% 1 0 2026-04-16T03:31:12 A Download of Code Without Integrity Check vulnerability in the update modules i
CVE-2026-6348 8.8 0.01% 2 0 2026-04-16T03:31:12 WinMatrix agent developed by Simopro Technology has a Missing Authentication vul
CVE-2026-40502 8.8 0.19% 1 0 2026-04-16T03:31:12 OpenHarness prior to commit dd1d235 contains a command injection vulnerability t
CVE-2026-33807 9.1 0.05% 1 0 2026-04-16T01:03:26 ### Summary `@fastify/express` v4.0.4 contains a path handling bug in the `onRe
CVE-2026-6388 9.1 0.03% 2 0 2026-04-16T00:54:15 A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker,
CVE-2026-4880 9.8 0.12% 2 0 2026-04-16T00:54:15 The Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system,
CVE-2026-30996 7.5 0.29% 2 0 2026-04-15T21:31:21 An issue in the file handling logic of the component download.php of SAC-NFe v2.
CVE-2026-30994 7.5 0.04% 2 0 2026-04-15T21:31:21 Incorrect access control in the config.php component of Slah v1.5.0 and below al
CVE-2026-22676 7.8 0.01% 1 0 2026-04-15T21:30:30 Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerab
CVE-2026-6315 8.8 0.07% 1 0 2026-04-15T21:30:26 Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.10
CVE-2026-34632 8.3 0.01% 2 0 2026-04-15T21:30:25 Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vu
CVE-2026-6300 8.8 0.03% 2 0 2026-04-15T21:30:25 Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote
CVE-2026-6299 8.8 0.03% 2 0 2026-04-15T21:30:25 Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a r
CVE-2026-6297 8.4 0.01% 2 0 2026-04-15T21:30:25 Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an atta
CVE-2026-6311 8.4 0.02% 1 0 2026-04-15T21:30:25 Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.77
CVE-2026-6310 8.4 0.02% 1 0 2026-04-15T21:30:25 Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote
CVE-2026-6317 8.8 0.08% 1 0 2026-04-15T21:30:20 Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote
CVE-2026-6360 8.8 0.03% 1 0 2026-04-15T21:30:20 Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a
CVE-2026-6358 8.8 0.07% 1 0 2026-04-15T21:30:20 Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed
CVE-2026-6307 8.8 0.03% 2 0 2026-04-15T21:30:19 Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a re
CVE-2026-6304 8.4 0.02% 1 0 2026-04-15T21:30:19 Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a re
CVE-2026-6302 8.8 0.03% 1 0 2026-04-15T21:30:19 Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remot
CVE-2026-6314 8.4 0.02% 1 0 2026-04-15T21:30:19 Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a re
CVE-2026-40318 8.5 0.06% 2 0 2026-04-15T20:40:26 ## Summary The endpoint `/api/av/removeUnusedAttributeView` is vulnerable to a
CVE-2026-30995 8.6 0.03% 2 0 2026-04-15T18:32:04 Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerabilit
CVE-2026-6372 7.5 0.03% 2 0 2026-04-15T18:32:04 Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisi
CVE-2026-20152 5.3 0.07% 1 0 2026-04-15T18:32:04 A vulnerability in the authentication service feature of Cisco AsyncOS Software
CVE-2026-20147 10.0 0.23% 1 0 2026-04-15T18:32:04 A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, rem
CVE-2026-20148 4.9 0.05% 1 0 2026-04-15T18:32:03 A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, rem
CVE-2026-25554 6.5 0.09% 2 0 2026-04-15T00:35:42.020000 OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to comm
CVE-2025-0520 0 2.03% 2 0 2026-04-15T00:35:42.020000 An unrestricted file upload vulnerability in ShowDoc caused by improper validati
CVE-2026-32178 None 0.05% 1 0 2026-04-14T23:27:56 ## Executive Summary: Microsoft is releasing this security advisory to provide
CVE-2026-33155 None 0.05% 2 0 2026-04-14T21:59:48 ### Summary The pickle unpickler `_RestrictedUnpickler` validates which classes
CVE-2026-32201 6.5 0.81% 1 0 2026-04-14T18:30:55 Improper input validation in Microsoft Office SharePoint allows an unauthorized
CVE-2026-33825 7.8 0.04% 4 1 2026-04-14T18:30:52 Insufficient granularity of access control in Microsoft Defender allows an autho
CVE-2026-33824 9.8 0.07% 1 1 2026-04-14T18:30:52 Double free in Windows IKE Extension allows an unauthorized attacker to execute
CVE-2026-33829 4.3 0.06% 2 0 2026-04-14T18:30:51 Exposure of sensitive information to an unauthorized actor in Windows Snipping T
CVE-2026-32164 7.9 0.04% 1 0 2026-04-14T18:30:51 Concurrent execution using shared resource with improper synchronization ('race
CVE-2026-32171 8.8 0.06% 1 0 2026-04-14T18:30:51 Insufficiently protected credentials in Azure Logic Apps allows an authorized at
CVE-2026-27245 9.3 0.10% 1 0 2026-04-14T18:30:49 Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cro
CVE-2026-32162 8.4 0.03% 1 0 2026-04-14T18:30:43 Acceptance of extraneous untrusted data with trusted data in Windows COM allows
CVE-2026-32158 7.9 0.04% 1 0 2026-04-14T18:30:42 Concurrent execution using shared resource with improper synchronization ('race
CVE-2026-32157 8.8 0.12% 1 0 2026-04-14T18:30:42 Use after free in Remote Desktop Client allows an unauthorized attacker to execu
CVE-2026-32165 7.9 0.04% 1 0 2026-04-14T18:30:42 Use after free in Windows User Interface Core allows an authorized attacker to e
CVE-2026-39813 9.8 0.06% 1 0 2026-04-14T18:30:41 A path traversal: '../filedir' vulnerability in Fortinet FortiSandbox 5.0.0 thro
CVE-2025-60710 7.8 17.97% 1 2 2026-04-14T14:44:19.867000 Improper link resolution before file access ('link following') in Host Process f
CVE-2026-21643 9.8 33.91% 1 2 template 2026-04-14T14:21:18.670000 An improper neutralization of special elements used in an sql command ('sql inje
CVE-2026-34621 9.7 4.56% 1 5 2026-04-13T18:31:44 Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by a
CVE-2026-40259 8.1 0.08% 2 0 2026-04-10T21:32:47 ## Summary An authenticated publish-service reader can invoke `/api/av/removeUn
CVE-2026-39987 None 3.20% 5 4 template 2026-04-09T19:06:18 ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal
CVE-2026-34073 5.3 0.02% 1 0 2026-04-06T15:30:27.887000 cryptography is a package designed to expose cryptographic primitives and recipe
CVE-2026-25645 4.4 0.00% 1 0 2026-03-27T22:07:43 ### Impact The `requests.utils.extract_zipped_paths()` utility function uses a p
CVE-2026-32746 9.8 0.03% 4 5 2026-03-23T15:31:40 telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO
CVE-2026-22730 8.8 0.02% 2 1 2026-03-18T20:20:40 A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionCon
CVE-2026-22729 8.6 0.07% 2 0 2026-03-18T20:20:27 A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConver
CVE-2026-3888 7.8 0.01% 2 6 2026-03-18T04:17:30.720000 Local privilege escalation in snapd on Linux allows local attackers to get root
CVE-2026-27205 None 0.01% 1 0 2026-02-23T22:28:06 When the `session` object is accessed, Flask should set the `Vary: Cookie` heade
CVE-2026-24061 9.8 88.02% 2 68 template 2026-02-10T18:30:34 telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "
CVE-2025-55182 10.0 86.90% 1 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-59284 3.3 0.03% 2 1 2025-10-14T18:30:47 Exposure of sensitive information to an unauthorized actor in Windows NTLM allow
CVE-2024-32114 8.8 2.02% 2 0 2025-02-11T19:03:09 In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web con
CVE-2025-65104 0 0.00% 2 0 N/A
CVE-2026-33058 0 0.03% 2 0 N/A
CVE-2026-40316 0 0.06% 1 0 N/A
CVE-2026-33438 0 0.05% 1 0 N/A

CVE-2026-40258
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-17T22:16:32.067000

2 posts

The Gramps Web API is a Python REST API for the genealogical research software Gramps. Versions 1.6.0 through 3.11.0 have a path traversal vulnerability (Zip Slip) in the media archive import feature. An authenticated user with owner-level privileges can craft a malicious ZIP file with directory-traversal filenames to write arbitrary files outside the intended temporary extraction directory on the

offseq at 2026-04-17T23:00:11.506Z ##

🚨 CVE-2026-40258: CRITICAL path traversal in gramps-web-api (1.6.0-3.11.0). Owner-level users can write files outside intended dirs via crafted ZIPs. Upgrade to 3.11.1+ to mitigate! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-17T23:00:11.000Z ##

🚨 CVE-2026-40258: CRITICAL path traversal in gramps-web-api (1.6.0-3.11.0). Owner-level users can write files outside intended dirs via crafted ZIPs. Upgrade to 3.11.1+ to mitigate! radar.offseq.com/threat/cve-20 #OffSeq #CVE202640258 #PathTraversal #Infosec

##

CVE-2026-40525
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-17T21:31:53

2 posts

OpenViking prior to commit c7bb167 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with network access to the exposed service can invoke privileged bot-control functionality without providing a valid X-API-Key header, including submitting at

thehackerwire@mastodon.social at 2026-04-17T19:20:10.000Z ##

🔴 CVE-2026-40525 - Critical (9.1)

OpenViking prior to commit c7bb167 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T19:20:10.000Z ##

🔴 CVE-2026-40525 - Critical (9.1)

OpenViking prior to commit c7bb167 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35546
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-17T20:16:35.380000

2 posts

Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted archives to be accepted, enabling attackers to plant and execute code and obtain a reverse shell.

offseq at 2026-04-17T20:00:13.468Z ##

⚠️ CRITICAL: Anviz CX7 & CX2 Lite firmware vuln (CVE-2026-35546) allows unauthenticated uploads — attackers can execute code & gain reverse shell. All versions affected. No mitigation yet. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-17T20:00:13.000Z ##

⚠️ CRITICAL: Anviz CX7 & CX2 Lite firmware vuln (CVE-2026-35546) allows unauthenticated uploads — attackers can execute code & gain reverse shell. All versions affected. No mitigation yet. radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #vulnerability

##

CVE-2026-32105
(0 None)

EPSS: 0.00%

updated 2026-04-17T20:16:33.517000

2 posts

xrdp is an open source RDP server. In versions through 0.10.5, xrdp does not implement verification for the Message Authentication Code (MAC) signature of encrypted RDP packets when using the "Classic RDP Security" layer. While the sender correctly generates signatures, the receiving logic lacks the necessary implementation to validate the 8-byte integrity signature, causing it to be silently igno

offseq at 2026-04-17T21:30:11.511Z ##

🚨 CVE-2026-32105 (CRITICAL): neutrinolabs xrdp <0.10.6 does not validate MAC on Classic RDP Security layer, allowing MITM attackers to modify encrypted traffic. Upgrade to 0.10.6 or enforce TLS in xrdp.ini! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-17T21:30:11.000Z ##

🚨 CVE-2026-32105 (CRITICAL): neutrinolabs xrdp <0.10.6 does not validate MAC on Classic RDP Security layer, allowing MITM attackers to modify encrypted traffic. Upgrade to 0.10.6 or enforce TLS in xrdp.ini! radar.offseq.com/threat/cve-20 #OffSeq #xrdp #infosec #RDP

##

CVE-2026-28224
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-17T20:16:32.460000

2 posts

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not initialized, resulting in a null pointer dereference and server crash. An unauthenticated attacker who knows only the server's IP and port can exploit this

thehackerwire@mastodon.social at 2026-04-17T20:00:04.000Z ##

🟠 CVE-2026-28224 - High (8.2)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T20:00:04.000Z ##

🟠 CVE-2026-28224 - High (8.2)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6359
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-17T19:21:14.907000

1 posts

Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T14:00:30.000Z ##

🟠 CVE-2026-6359 - High (8.8)

Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6363
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-17T19:19:48.317000

1 posts

Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-04-16T13:47:50.000Z ##

🟠 CVE-2026-6363 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40170
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-17T19:16:37.763000

2 posts

ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.22.1, ngtcp2_qlog_parameters_set_transport_params() serializes peer transport parameters into a fixed 1024-byte stack buffer without bounds checking. When qlog is enabled, a remote peer can send sufficiently large transport parameters during the QUIC handshake to cause writes beyond the buffer boundary, resulting in a s

thehackerwire@mastodon.social at 2026-04-17T05:23:02.000Z ##

🟠 CVE-2026-40170 - High (7.5)

ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.22.1, ngtcp2_qlog_parameters_set_transport_params() serializes peer transport parameters into a fixed 1024-byte stack buffer without bounds checking. When qlog is enabl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T05:23:02.000Z ##

🟠 CVE-2026-40170 - High (7.5)

ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.22.1, ngtcp2_qlog_parameters_set_transport_params() serializes peer transport parameters into a fixed 1024-byte stack buffer without bounds checking. When qlog is enabl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33337
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-17T19:16:36.223000

2 posts

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bounds, allowing a cstring longer than the allocated buffer to overflow it. An unauthenticated attacker can exploit this by sending a crafted packet to the

thehackerwire@mastodon.social at 2026-04-17T19:20:21.000Z ##

🟠 CVE-2026-33337 - High (7.5)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T19:20:21.000Z ##

🟠 CVE-2026-33337 - High (7.5)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28212
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-17T19:16:35.180000

2 posts

Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info() function, resulting in a null pointer dereference and server crash. An unauthenticated attacker can trigger this by sending a crafted packet to the ser

thehackerwire@mastodon.social at 2026-04-17T19:20:30.000Z ##

🟠 CVE-2026-28212 - High (7.5)

Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info(...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T19:20:30.000Z ##

🟠 CVE-2026-28212 - High (7.5)

Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info(...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27890
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-17T19:16:34.993000

2 posts

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If segments arrive out of order, the Array class's grow() method computes a negative size value, causing a SIGSEGV crash. An unauthenticated attacker who kno

thehackerwire@mastodon.social at 2026-04-17T20:00:16.000Z ##

🟠 CVE-2026-27890 - High (8.2)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T20:00:16.000Z ##

🟠 CVE-2026-27890 - High (8.2)

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6316
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-17T19:08:02.587000

1 posts

Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T14:07:59.000Z ##

🟠 CVE-2026-6316 - High (8.8)

Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37749
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-17T18:32:56

4 posts

A SQL injection vulnerability in CodeAstro Simple Attendance Management System v1.0 allows remote unauthenticated attackers to bypass authentication via the username parameter in index.php.

1 repos

https://github.com/menevarad007/CVE-2026-37749

offseq at 2026-04-17T18:30:12.774Z ##

🚨 CRITICAL SQL injection (CVE-2026-37749) in CodeAstro Simple Attendance Management System v1.0: Remote unauthenticated attackers can bypass authentication via index.php. Restrict access & deploy WAFs until a patch arrives. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-17T16:25:15.000Z ##

🔴 CVE-2026-37749 - Critical (9.8)

A SQL injection vulnerability in CodeAstro Simple Attendance Management System v1.0 allows remote unauthenticated attackers to bypass authentication via the username parameter in index.php.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-17T18:30:12.000Z ##

🚨 CRITICAL SQL injection (CVE-2026-37749) in CodeAstro Simple Attendance Management System v1.0: Remote unauthenticated attackers can bypass authentication via index.php. Restrict access & deploy WAFs until a patch arrives. radar.offseq.com/threat/cve-20 #OffSeq #SQLi #Infosec

##

thehackerwire@mastodon.social at 2026-04-17T16:25:15.000Z ##

🔴 CVE-2026-37749 - Critical (9.8)

A SQL injection vulnerability in CodeAstro Simple Attendance Management System v1.0 allows remote unauthenticated attackers to bypass authentication via the username parameter in index.php.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6305
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-17T18:32:55

1 posts

Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T19:09:02.000Z ##

🟠 CVE-2026-6305 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5718
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-17T18:32:05

2 posts

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.3.9.6. This is due to insufficient file type validation that occurs when custom blacklist types are configured, which replaces the default dangerous extension denylist instead of merging with it, and the wpcf7_antiscript_file_name() sanitization

thehackerwire@mastodon.social at 2026-04-17T18:20:35.000Z ##

🟠 CVE-2026-5718 - High (8.1)

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.3.9.6. This is due to insufficient file type validation that occurs when custom blacklist typ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T18:20:35.000Z ##

🟠 CVE-2026-5718 - High (8.1)

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.3.9.6. This is due to insufficient file type validation that occurs when custom blacklist typ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5710
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-17T18:31:54

2 posts

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary File Read in versions up to and including 1.3.9.6. This is due to the plugin using client-supplied mfile[] POST values as the source of truth for email attachment selection without performing any server-side upload provenance check, path canonicalization, or directory

thehackerwire@mastodon.social at 2026-04-17T18:20:25.000Z ##

🟠 CVE-2026-5710 - High (7.5)

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary File Read in versions up to and including 1.3.9.6. This is due to the plugin using client-supplied mfile[] POST val...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T18:20:25.000Z ##

🟠 CVE-2026-5710 - High (7.5)

The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary File Read in versions up to and including 1.3.9.6. This is due to the plugin using client-supplied mfile[] POST val...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3464
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-17T18:31:53

2 posts

The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in the 'ajax_attach_file' function in all versions up to, and including, 8.3.4. This makes it possible for authenticated attackers with a role that an administrator grants access to (e.g., Subscriber) to to read the contents of arbitrary files on the server, which ca

thehackerwire@mastodon.social at 2026-04-17T17:20:33.000Z ##

🟠 CVE-2026-3464 - High (8.8)

The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in the 'ajax_attach_file' function in all versions up to, and including, 8.3.4. This makes it possible for authent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T17:20:33.000Z ##

🟠 CVE-2026-3464 - High (8.8)

The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in the 'ajax_attach_file' function in all versions up to, and including, 8.3.4. This makes it possible for authent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40516
(8.3 HIGH)

EPSS: 0.00%

updated 2026-04-17T18:31:53

2 posts

OpenHarness before commit bd4df81 contains a server-side request forgery vulnerability in the web_fetch and web_search tools that allows attackers to access private and localhost HTTP services by manipulating tool parameters without proper validation of target addresses. Attackers can influence an agent session to invoke these tools against loopback, RFC1918, link-local, or other non-public addres

thehackerwire@mastodon.social at 2026-04-17T17:20:23.000Z ##

🟠 CVE-2026-40516 - High (8.3)

OpenHarness before commit bd4df81 contains a server-side request forgery vulnerability in the web_fetch and web_search tools that allows attackers to access private and localhost HTTP services by manipulating tool parameters without proper valida...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T17:20:23.000Z ##

🟠 CVE-2026-40516 - High (8.3)

OpenHarness before commit bd4df81 contains a server-side request forgery vulnerability in the web_fetch and web_search tools that allows attackers to access private and localhost HTTP services by manipulating tool parameters without proper valida...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40515
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-17T18:31:53

2 posts

OpenHarness before commit bd4df81 contains a permission bypass vulnerability that allows attackers to read sensitive files by exploiting incomplete path normalization in the permission checker. Attackers can invoke the built-in grep and glob tools with sensitive root directories that are not properly evaluated against configured path rules, allowing disclosure of sensitive local file content, key

thehackerwire@mastodon.social at 2026-04-17T17:20:12.000Z ##

🟠 CVE-2026-40515 - High (7.5)

OpenHarness before commit bd4df81 contains a permission bypass vulnerability that allows attackers to read sensitive files by exploiting incomplete path normalization in the permission checker. Attackers can invoke the built-in grep and glob tool...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T17:20:12.000Z ##

🟠 CVE-2026-40515 - High (7.5)

OpenHarness before commit bd4df81 contains a permission bypass vulnerability that allows attackers to read sensitive files by exploiting incomplete path normalization in the permission checker. Attackers can invoke the built-in grep and glob tool...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6284
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-17T18:31:52

4 posts

An attacker with network access to the PLC is able to brute force discover passwords to gain unauthorized access to systems and services. The limited password complexity and no password input limiters makes brute force password enumeration possible.

offseq at 2026-04-17T17:00:11.592Z ##

⚠️ CRITICAL: CVE-2026-6284 hits Horner Automation Cscape v10.0 PLCs. Weak passwords & no input limits allow attackers to brute force access remotely. No patch yet — restrict access, monitor logins, & harden networks. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-17T16:20:43.000Z ##

🔴 CVE-2026-6284 - Critical (9.1)

An attacker with network access to the PLC is able to brute force discover passwords to gain unauthorized access to systems and services. The limited password complexity and no password input limiters makes brute force password enumeration possible.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-17T17:00:11.000Z ##

⚠️ CRITICAL: CVE-2026-6284 hits Horner Automation Cscape v10.0 PLCs. Weak passwords & no input limits allow attackers to brute force access remotely. No patch yet — restrict access, monitor logins, & harden networks. radar.offseq.com/threat/cve-20 #OffSeq #ICS #OTSecurity #Infosec

##

thehackerwire@mastodon.social at 2026-04-17T16:20:43.000Z ##

🔴 CVE-2026-6284 - Critical (9.1)

An attacker with network access to the PLC is able to brute force discover passwords to gain unauthorized access to systems and services. The limited password complexity and no password input limiters makes brute force password enumeration possible.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6309
(8.3 HIGH)

EPSS: 0.02%

updated 2026-04-17T17:26:50.993000

1 posts

Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T16:40:40.000Z ##

🟠 CVE-2026-6309 - High (8.3)

Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6296
(9.6 CRITICAL)

EPSS: 0.02%

updated 2026-04-17T15:42:44.730000

2 posts

Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-04-17T08:00:08.000Z ##

🔴 CVE-2026-6296 - Critical (9.6)

Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T08:00:08.000Z ##

🔴 CVE-2026-6296 - Critical (9.6)

Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6301
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-17T15:41:01.207000

1 posts

Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T17:49:42.000Z ##

🟠 CVE-2026-6301 - High (8.8)

Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33435
(8.0 HIGH)

EPSS: 0.33%

updated 2026-04-17T15:38:09.243000

2 posts

Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version 5.17. If developers are unable to update immediately, they can limit the scope of the vulnerability by restricting access to the project backup, as it i

thehackerwire@mastodon.social at 2026-04-17T16:00:09.000Z ##

🟠 CVE-2026-33435 - High (8)

Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T16:00:09.000Z ##

🟠 CVE-2026-33435 - High (8)

Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40322
(9.0 CRITICAL)

EPSS: 0.05%

updated 2026-04-17T15:38:09.243000

2 posts

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the DOM via innerHTML. This allows attacker-controlled javascript: URLs in Mermaid code blocks to survive into the rendered output. On desktop builds using Electron, windows are created with nodeIntegrati

thehackerwire@mastodon.social at 2026-04-17T05:13:55.000Z ##

🔴 CVE-2026-40322 - Critical (9)

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the DOM via innerHTML. This allows attacker-control...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T05:13:55.000Z ##

🔴 CVE-2026-40322 - Critical (9)

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the DOM via innerHTML. This allows attacker-control...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31843
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-17T15:38:09.243000

2 posts

The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment hook files. The endpoint is exposed via Route::any() without authentication middleware, enabling remote access without credentials. User-controlled input is directly written into executable PHP files

offseq@infosec.exchange at 2026-04-17T01:30:29.000Z ##

⚠️ CVE-2026-31843: CRITICAL improper access control in goodoneuz/pay-uz <=2.2.24 allows unauthenticated PHP file overwrite & RCE via /payment/api/editable/update. No patch yet — restrict endpoint access! radar.offseq.com/threat/cve-20 #OffSeq #CVE202631843 #Laravel #RCE

##

thehackerwire@mastodon.social at 2026-04-16T13:22:17.000Z ##

🔴 CVE-2026-31843 - Critical (9.8)

The goodoneuz/pay-uz Laravel package (&lt;= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment hook files. The endpoint is exposed via Rout...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33555
(4.0 MEDIUM)

EPSS: 0.01%

updated 2026-04-17T15:38:09.243000

1 posts

An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not check that the received body length matches a previously announced content-length when the stream is closed via a frame with an empty payload. This can cause desynchronization issues with the backend server and could be used for request smuggling. The earliest affected version is 2.6.

1 repos

https://github.com/r3verii/CVE-2026-33555

_r_netsec@infosec.exchange at 2026-04-16T20:13:05.000Z ##

HAProxy HTTP/3 -> HTTP/1 Desync: Cross-Protocol Smuggling via a Standalone QUIC FIN (CVE-2026-33555) r3verii.github.io/cve/2026/04/

##

CVE-2026-30656
(7.5 HIGH)

EPSS: 0.06%

updated 2026-04-17T15:38:09.243000

1 posts

A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.41 when parsing job files containing the fdp_pli option. The callback function str_fdp_pli_cb() does not validate the input pointer and calls strdup() on a NULL value when the option is specified without an argument. This results in a segmentation fault and process crash.

thehackerwire@mastodon.social at 2026-04-16T19:08:43.000Z ##

🟠 CVE-2026-30656 - High (7.5)

A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.41 when parsing job files containing the fdp_pli option. The callback function str_fdp_pli_cb() does not validate the input pointer and calls strdup() on a NULL value ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40176
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-17T15:38:09.243000

1 posts

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs shell commands by interpolating user-supplied Perforce connection parameters (port, user, client) without proper escaping. An attacker can inject arbitrary commands through these values in a malicious com

3 repos

https://github.com/terminat0r7031/composer-CVE-2026-40261-CVE-2026-40176-PoC

https://github.com/daptheHuman/cve-2026-40176-cve-2026-40261

https://github.com/Saku0512/CVE-2026-40176-poc

thehackerwire@mastodon.social at 2026-04-16T13:24:18.000Z ##

🟠 CVE-2026-40176 - High (7.8)

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs shell commands by interpolating user-supplied Perfo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40193
(8.2 HIGH)

EPSS: 0.06%

updated 2026-04-17T15:38:09.243000

1 posts

maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain an LDAP injection vulnerability in the auth.ldap module where user-supplied usernames are interpolated into LDAP search filters and DN strings via strings.ReplaceAll() without any LDAP filter escaping, despite the go-ldap/ldap/v3 library's ldap.EscapeFilter() function being available in the same import. This affects thr

thehackerwire@mastodon.social at 2026-04-16T13:15:13.000Z ##

🟠 CVE-2026-40193 - High (8.2)

maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain an LDAP injection vulnerability in the auth.ldap module where user-supplied usernames are interpolated into LDAP search filters and DN strings via strings.ReplaceAll() ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40504
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-17T15:38:09.243000

2 posts

Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec function that allows attackers to write out-of-bounds memory by crafting scripts with many string literals at global scope. Attackers can exploit insufficient bounds checking in gravity_fiber_reassign() to corrupt heap metadata and achieve arbitrary code execution in applications that evaluate untrus

offseq@infosec.exchange at 2026-04-16T09:00:42.000Z ##

🚨 CVE-2026-40504: Critical heap-based buffer overflow in Creolabs Gravity (<0.9.6). Attackers could achieve RCE via malicious scripts. No patch yet — avoid untrusted input & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #CVE202640504 #infosec

##

thehackerwire@mastodon.social at 2026-04-16T04:25:52.000Z ##

🔴 CVE-2026-40504 - Critical (9.8)

Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec function that allows attackers to write out-of-bounds memory by crafting scripts with many string literals at global scope. Attackers can exploit in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6349
(0 None)

EPSS: 0.95%

updated 2026-04-17T15:38:09.243000

1 posts

The  iSherlock developed by HGiga  has an OS Command Injection vulnerability, allowing unauthenticated local attackers to inject arbitrary OS commands and execute them on the server.

offseq@infosec.exchange at 2026-04-16T04:30:28.000Z ##

⚠️ CVE-2026-6349: CRITICAL OS command injection in HGiga iSherlock-base-4.5 (CVSS 10). Unauthenticated attackers can execute commands — full system compromise possible. No patch confirmed. Restrict access & monitor! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Infosec

##

CVE-2026-6351
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-17T15:38:09.243000

1 posts

MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read system files.

thehackerwire@mastodon.social at 2026-04-16T04:21:28.000Z ##

🟠 CVE-2026-6351 - High (7.5)

MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read system files.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6507
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-17T15:31:27

2 posts

A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability by sending a specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet to a dnsmasq server configured with the `--dhcp-split-relay` option. This can lead to memory corruption, causing the dnsmasq daemon to crash and resulting in a denial of service (DoS).

thehackerwire@mastodon.social at 2026-04-17T13:17:46.000Z ##

🟠 CVE-2026-6507 - High (7.5)

A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability by sending a specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet to a dnsmasq server configured with the `--dhcp-split-relay` option. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T13:17:46.000Z ##

🟠 CVE-2026-6507 - High (7.5)

A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability by sending a specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet to a dnsmasq server configured with the `--dhcp-split-relay` option. This ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40262
(8.7 HIGH)

EPSS: 0.03%

updated 2026-04-17T15:29:25.583000

2 posts

Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which does not identify text-based formats such as HTML, SVG, or XHTML. These files are served with an empty Content-Type, no X-Content-Type-Options: nosniff header, and inline disposition, allowing browsers

thehackerwire@mastodon.social at 2026-04-17T04:56:01.000Z ##

🟠 CVE-2026-40262 - High (8.7)

Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which does not identify text-based formats such as HTML...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T04:56:01.000Z ##

🟠 CVE-2026-40262 - High (8.7)

Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which does not identify text-based formats such as HTML...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6270
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-17T15:17:00.957000

1 posts

@fastify/middie versions 9.3.1 and earlier do not register inherited middleware directly on child plugin engine instances. When a Fastify application registers authentication middleware in a parent scope and then registers child plugins with @fastify/middie, the child scope does not inherit the parent middleware. This allows unauthenticated requests to reach routes defined in child plugin scopes,

thehackerwire@mastodon.social at 2026-04-16T14:19:04.000Z ##

🔴 CVE-2026-6270 - Critical (9.1)

@fastify/middie versions 9.3.1 and earlier do not register inherited middleware directly on child plugin engine instances. When a Fastify application registers authentication middleware in a parent scope and then registers child plugins with @FAST...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23772
(7.3 HIGH)

EPSS: 0.01%

updated 2026-04-17T15:17:00.957000

1 posts

Dell Storage Manager - Replay Manager for Microsoft Servers, version(s) 8.0, contain(s) an Improper Privilege Management vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.

AAKL@infosec.exchange at 2026-04-15T17:14:00.000Z ##

Dell has three high-severity advisories today:

- CVE-2026-23772: Security Update for Dell Storage Manager - Replay Manager for Microsoft Servers Vulnerabilities dell.com/support/kbdoc/en-us/0

- Several CVEs: Security Update for Dell Connectrix B-Series SANnav Vulnerabilities dell.com/support/kbdoc/en-us/0

- Several CVEs: Security Update for Dell Secure Connect Gateway Policy Manager Multiple Third-Party Component Vulnerabilities dell.com/support/kbdoc/en-us/0 #Dell #infosec #vulnerability

##

CVE-2026-37338
(9.4 CRITICAL)

EPSS: 0.03%

updated 2026-04-17T15:15:09.790000

1 posts

SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Injection in the file /music/view_user.php.

Matchbook3469@mastodon.social at 2026-04-17T14:23:11.000Z ##

⛔ New security advisory:

CVE-2026-37338 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

CVE-2026-39808
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-04-17T15:11:35.840000

1 posts

A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

2 repos

https://github.com/Lechansky/CVE-2026-39808

https://github.com/samu-delucas/CVE-2026-39808

beyondmachines1@infosec.exchange at 2026-04-15T10:01:09.000Z ##

Fortinet Reports Critical Unauthenticated Vulnerabilities in FortiSandbox Platform

Fortinet reports two critical vulnerabilities in FortiSandbox (CVE-2026-39808 and CVE-2026-39813) that allow unauthenticated remote attackers to execute commands or bypass authentication via crafted HTTP requests.

**If you run FortiSandbox, make sure it is isolated from the internet and accessible from trusted networks only, then update immediately to version 4.4.9+ or 5.0.6+ depending on your branch. Until you update, restrict API access to trusted IP addresses only. It's a Fortinet product, it will be actively attacked.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-32163
(7.8 HIGH)

EPSS: 0.04%

updated 2026-04-17T15:10:35.607000

1 posts

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-04-15T11:00:10.000Z ##

🟠 CVE-2026-32163 - High (7.8)

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32168
(7.8 HIGH)

EPSS: 0.07%

updated 2026-04-17T15:10:35.607000

1 posts

Improper input validation in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-04-15T09:17:09.000Z ##

🟠 CVE-2026-32168 - High (7.8)

Improper input validation in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32183
(7.8 HIGH)

EPSS: 0.05%

updated 2026-04-17T15:10:35.607000

1 posts

Improper neutralization of special elements used in a command ('command injection') in Windows Snipping Tool allows an unauthorized attacker to execute code locally.

thehackerwire@mastodon.social at 2026-04-15T09:00:15.000Z ##

🟠 CVE-2026-32183 - High (7.8)

Improper neutralization of special elements used in a command ('command injection') in Windows Snipping Tool allows an unauthorized attacker to execute code locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20186
(9.9 CRITICAL)

EPSS: 0.23%

updated 2026-04-17T15:09:46.880000

3 posts

A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at least Read Only Admin credentials. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnera

thehackerwire@mastodon.social at 2026-04-17T20:12:22.000Z ##

🔴 CVE-2026-20186 - Critical (9.9)

A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T20:12:22.000Z ##

🔴 CVE-2026-20186 - Critical (9.9)

A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-15T16:21:37.000Z ##

New.

Cisco has a number of listings today, three of them critical.

- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

More: sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

@cR0w

##

CVE-2026-20184
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-17T15:09:46.880000

5 posts

A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service. This vulnerability existed because of improper certificate validation. Prior to this vulnerability being addressed, an attacker could have exploited this vulnerability by connecting to a service end

thehackerwire@mastodon.social at 2026-04-17T20:12:13.000Z ##

🔴 CVE-2026-20184 - Critical (9.8)

A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service.

This vulnerability existed because of imprope...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

571906@ap.podcastindex.org at 2026-04-17T02:00:02.000Z ##

New Episode: SANS Stormcast Friday, April 17th, 2026: DVRs Again; Cisco Again; Windows Defender Again; Sonatype

Shownotes:

Compromised DVRs and Finding Them in the Wild
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild/32886
Cisco ISE RCE Vulnerability and WebEx Auth Bypass CVE-2026-20184 CVE-2026-20180

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

thehackerwire@mastodon.social at 2026-04-17T20:12:13.000Z ##

🔴 CVE-2026-20184 - Critical (9.8)

A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service.

This vulnerability existed because of imprope...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

benzogaga33@mamot.fr at 2026-04-16T15:40:04.000Z ##

Cisco Webex – CVE-2026-20184 : cette faille critique nécessite une action de l’admin it-connect.fr/cisco-webex-cve- #ActuCybersécurité #Vulnérabilités #Cybersécurité #Cisco

##

AAKL@infosec.exchange at 2026-04-15T16:21:37.000Z ##

New.

Cisco has a number of listings today, three of them critical.

- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

More: sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

@cR0w

##

CVE-2026-20180
(9.9 CRITICAL)

EPSS: 0.21%

updated 2026-04-17T15:09:46.880000

4 posts

A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at least Read Only Admin credentials. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnera

thehackerwire@mastodon.social at 2026-04-17T20:12:03.000Z ##

🔴 CVE-2026-20180 - Critical (9.9)

A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

571906@ap.podcastindex.org at 2026-04-17T02:00:02.000Z ##

New Episode: SANS Stormcast Friday, April 17th, 2026: DVRs Again; Cisco Again; Windows Defender Again; Sonatype

Shownotes:

Compromised DVRs and Finding Them in the Wild
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild/32886
Cisco ISE RCE Vulnerability and WebEx Auth Bypass CVE-2026-20184 CVE-2026-20180

Transcript

AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans

Or Listen right here.

##

thehackerwire@mastodon.social at 2026-04-17T20:12:03.000Z ##

🔴 CVE-2026-20180 - Critical (9.9)

A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-15T16:21:37.000Z ##

New.

Cisco has a number of listings today, three of them critical.

- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

More: sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

@cR0w

##

CVE-2026-4857
(8.4 HIGH)

EPSS: 0.03%

updated 2026-04-17T15:08:01.337000

2 posts

IdentityIQ 8.5, all IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ 8.4 patch levels prior to 8.4p4 allow authenticated users assigned the Debug Pages Read Only capability or any custom capability with the ViewAccessDebugPage SPRight to incorrectly create new IdentityIQ objects.  Until a remediating security fix or patches containing this security fix are installed,

thehackerwire@mastodon.social at 2026-04-17T13:00:10.000Z ##

🟠 CVE-2026-4857 - High (8.4)

IdentityIQ 8.5, all
IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ
8.4 patch levels prior to 8.4p4 allow authenticated users assigned the Debug
Pages Read Only capability or any custom capability with the ViewAccess...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T13:00:10.000Z ##

🟠 CVE-2026-4857 - High (8.4)

IdentityIQ 8.5, all
IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ
8.4 patch levels prior to 8.4p4 allow authenticated users assigned the Debug
Pages Read Only capability or any custom capability with the ViewAccess...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35569
(8.7 HIGH)

EPSS: 0.03%

updated 2026-04-17T15:08:01.337000

2 posts

ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in SEO-related fields (SEO Title and Meta Description), where user-controlled input is rendered without proper output encoding into HTML contexts including <title> tags, <meta> attributes, and JSON-LD structured data. An attacker can inject a payload such

thehackerwire@mastodon.social at 2026-04-17T10:00:21.000Z ##

🟠 CVE-2026-35569 - High (8.7)

ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in SEO-related fields (SEO Title and Meta Description), where user-controlled input is rendered withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T10:00:21.000Z ##

🟠 CVE-2026-35569 - High (8.7)

ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in SEO-related fields (SEO Title and Meta Description), where user-controlled input is rendered withou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23775
(7.6 HIGH)

EPSS: 0.01%

updated 2026-04-17T15:07:18.050000

2 posts

Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD OS) of Feature Release versions 8.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.10 contain an insertion of sensitive information into log file vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to credential exposures. Authentication attempts

thehackerwire@mastodon.social at 2026-04-17T09:26:10.000Z ##

🟠 CVE-2026-23775 - High (7.6)

Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD OS) of Feature Release versions 8.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.10 contain an insertion of sensitive information into log file vulnerabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T09:26:10.000Z ##

🟠 CVE-2026-23775 - High (7.6)

Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD OS) of Feature Release versions 8.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.10 contain an insertion of sensitive information into log file vulnerabil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23853
(8.4 HIGH)

EPSS: 0.01%

updated 2026-04-17T09:31:26

2 posts

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain a use of weak credentials vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to unauthorized access to t

thehackerwire@mastodon.social at 2026-04-17T09:07:17.000Z ##

🟠 CVE-2026-23853 - High (8.4)

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain a use of weak c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T09:07:17.000Z ##

🟠 CVE-2026-23853 - High (8.4)

Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain a use of weak c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-36568
(7.9 HIGH)

EPSS: 0.01%

updated 2026-04-17T09:31:25

2 posts

Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain an insufficiently protected credentials vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to credential exposure. The attacker m

thehackerwire@mastodon.social at 2026-04-17T09:26:00.000Z ##

🟠 CVE-2025-36568 - High (7.8)

Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain an insufficiently protected credential...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T09:26:00.000Z ##

🟠 CVE-2025-36568 - High (7.8)

Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain an insufficiently protected credential...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33392
(7.2 HIGH)

EPSS: 0.00%

updated 2026-04-17T09:31:19

2 posts

In JetBrains YouTrack before 2025.3.131383 high privileged user can achieve RCE via sandbox bypass

offseq at 2026-04-17T09:00:32.066Z ##

🚨 CVE-2026-33392: HIGH severity RCE in JetBrains YouTrack < 2025.3.131383. High privileged users can bypass sandbox for remote code execution. No patch yet — restrict admin rights & monitor advisories. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-17T09:00:32.000Z ##

🚨 CVE-2026-33392: HIGH severity RCE in JetBrains YouTrack < 2025.3.131383. High privileged users can bypass sandbox for remote code execution. No patch yet — restrict admin rights & monitor advisories. radar.offseq.com/threat/cve-20 #OffSeq #YouTrack #Infosec #Vuln

##

CVE-2026-6443
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-17T09:31:18

6 posts

The Accordion and Accordion Slider plugin for WordPress is vulnerable to an injected backdoor in version 1.4.6. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This makes it possible for the threat actor to maintain a persistent backdoor and inject spam into the affected sites.

offseq at 2026-04-17T15:30:29.052Z ##

⚠️ CRITICAL: CVE-2026-6443 in WordPress Accordion & Accordion Slider v1.4.6 — embedded backdoor enables persistent access & spam injection. Remove/disable the plugin ASAP. No patch yet. radar.offseq.com/threat/cve-20

##

offseq at 2026-04-17T07:30:32.171Z ##

🚨 CVE-2026-6443 (CRITICAL): WordPress Accordion & Accordion Slider v1.4.6 embeds a backdoor (CWE-506), enabling persistent unauthorized access & spam. No patch — remove or disable plugin now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-17T07:16:36.000Z ##

🔴 CVE-2026-6443 - Critical (9.8)

The Accordion and Accordion Slider plugin for WordPress is vulnerable to an injected backdoor in version 1.4.6. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-17T15:30:29.000Z ##

⚠️ CRITICAL: CVE-2026-6443 in WordPress Accordion & Accordion Slider v1.4.6 — embedded backdoor enables persistent access & spam injection. Remove/disable the plugin ASAP. No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20266443 #Infosec

##

offseq@infosec.exchange at 2026-04-17T07:30:32.000Z ##

🚨 CVE-2026-6443 (CRITICAL): WordPress Accordion & Accordion Slider v1.4.6 embeds a backdoor (CWE-506), enabling persistent unauthorized access & spam. No patch — remove or disable plugin now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #Vuln

##

thehackerwire@mastodon.social at 2026-04-17T07:16:36.000Z ##

🔴 CVE-2026-6443 - Critical (9.8)

The Accordion and Accordion Slider plugin for WordPress is vulnerable to an injected backdoor in version 1.4.6. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This ma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4659
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-17T09:31:18

2 posts

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRelative() and urlToPath() functions, combined with the ability to enable debug output in widget settings. The URLtoRelative() function only performs a simp

thehackerwire@mastodon.social at 2026-04-17T07:16:46.000Z ##

🟠 CVE-2026-4659 - High (7.5)

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T07:16:46.000Z ##

🟠 CVE-2026-4659 - High (7.5)

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21719
(7.2 HIGH)

EPSS: 0.18%

updated 2026-04-17T06:31:14

2 posts

An OS command injection vulnerability exists in CubeCart prior to 6.6.0, which may allow a user with an administrative privilege to execute an arbitrary OS command.

offseq at 2026-04-17T06:00:28.350Z ##

CVE-2026-21719: HIGH severity OS command injection in CubeCart <6.6.0. Authenticated admins can run arbitrary OS commands. No patch yet — restrict admin access & monitor logs. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-17T06:00:28.000Z ##

CVE-2026-21719: HIGH severity OS command injection in CubeCart <6.6.0. Authenticated admins can run arbitrary OS commands. No patch yet — restrict admin access & monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #CubeCart #Vuln #Infosec

##

CVE-2026-3605
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-17T06:31:14

2 posts

An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delete secrets across namespaces, nor read any secret data. Fxed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

thehackerwire@mastodon.social at 2026-04-17T04:55:51.000Z ##

🟠 CVE-2026-3605 - High (8.1)

An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T04:55:51.000Z ##

🟠 CVE-2026-3605 - High (8.1)

An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5807
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-17T06:31:08

2 posts

Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot. This prevents legitimate operators from completing these workflows. This vulnerability, CVE-2026-5807, is fixed in Vault Community Edition 2.0.0 and Vault Enterprise 2.0.0.

thehackerwire@mastodon.social at 2026-04-17T05:22:43.000Z ##

🟠 CVE-2026-5807 - High (7.5)

Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot. This prevents legitimate operators...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T05:22:43.000Z ##

🟠 CVE-2026-5807 - High (7.5)

Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot. This prevents legitimate operators...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4525
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-17T06:31:08

2 posts

If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

thehackerwire@mastodon.social at 2026-04-17T04:55:41.000Z ##

🟠 CVE-2026-4525 - High (7.5)

If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T04:55:41.000Z ##

🟠 CVE-2026-4525 - High (7.5)

If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22734
(8.6 HIGH)

EPSS: 0.01%

updated 2026-04-17T03:30:52

2 posts

Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected systems. This vulnerability exists when SAML 2.0 bearer assertions are enabled for a client, as the UAA accepts SAML 2.0 bearer assertions that are neither signed nor encrypted. This issue affects UUA from v77.30.0 to v78.7.0 (inclusive) and it affects CF Deployment f

thehackerwire@mastodon.social at 2026-04-17T04:59:57.000Z ##

🟠 CVE-2026-22734 - High (8.6)

Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected systems. This vulnerability exists when SAML 2.0 bearer assertions are enabled for a client, as the UAA accepts SA...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T04:59:57.000Z ##

🟠 CVE-2026-22734 - High (8.6)

Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected systems. This vulnerability exists when SAML 2.0 bearer assertions are enabled for a client, as the UAA accepts SA...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41113
(8.1 HIGH)

EPSS: 0.08%

updated 2026-04-17T00:31:10

2 posts

sagredo qmail before 2026.04.07 allows tls_quit remote code execution because of popen in notlshosts_auto in qmail-remote.c.

thehackerwire@mastodon.social at 2026-04-17T05:22:52.000Z ##

🟠 CVE-2026-41113 - High (8.1)

sagredo qmail before 2026.04.07 allows tls_quit remote code execution because of popen in notlshosts_auto in qmail-remote.c.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T05:22:52.000Z ##

🟠 CVE-2026-41113 - High (8.1)

sagredo qmail before 2026.04.07 allows tls_quit remote code execution because of popen in notlshosts_auto in qmail-remote.c.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33032
(9.8 CRITICAL)

EPSS: 4.97%

updated 2026-04-16T22:16:37.433000

8 posts

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware t

Nuclei template

2 repos

https://github.com/Shreda/CVE-2026-33032-nginx-ui-vuln-lab

https://github.com/Twinson333/cve-2026-33032-scanner

oversecurity@mastodon.social at 2026-04-17T08:50:36.000Z ##

Critical nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

A critical vulnerability identified as CVE-2026-33032 is drawing urgent attention from the cybersecurity community due to its role in enabling a...

🔗️ [Thecyberexpress] link.is.it/wkIJDC

##

vitobotta@mastodon.social at 2026-04-17T08:17:00.000Z ##

nginx-ui CVE-2026-33032: the /mcp endpoint had auth, /mcp_message didn't. One missing check = full server takeover. As tools rush to add MCP support, expect more of these gaps. - thehackernews.com/2026/04/crit

##

oversecurity@mastodon.social at 2026-04-17T08:50:36.000Z ##

Critical nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

A critical vulnerability identified as CVE-2026-33032 is drawing urgent attention from the cybersecurity community due to its role in enabling a...

🔗️ [Thecyberexpress] link.is.it/wkIJDC

##

vitobotta@mastodon.social at 2026-04-17T08:17:00.000Z ##

nginx-ui CVE-2026-33032: the /mcp endpoint had auth, /mcp_message didn't. One missing check = full server takeover. As tools rush to add MCP support, expect more of these gaps. - thehackernews.com/2026/04/crit

##

cyberveille@mastobot.ping.moi at 2026-04-17T02:30:24.000Z ##

📢 CVE-2026-33032 : Authentification manquante dans Nginx UI exploitée in the wild
📝 ## 🔍 Contexte

Rapid7 a publié le 16 avril 2026 une alerte de sécurité concernant **CVE-2026-33032**, une vulnérabilité crit...
📖 cyberveille : cyberveille.ch/posts/2026-04-1
🌐 source : rapid7.com/blog/post/etr-cve-2
#CVE_2026_33032 #IOC #Cyberveille

##

threatnoir@infosec.exchange at 2026-04-16T15:09:17.000Z ##

⚠️ CRITICAL: Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover

CVE-2026-33032 is a critical authentication bypass in nginx-ui that allows unauthenticated attackers to modify Nginx configurations and take over the service completely. An estimated 2,689 vulnerable instances remain exposed globally and active exploitation is confirmed in the wild. Any unpatched n…

threatnoir.com/focus

#infosec #cybersecurity

##

beyondmachines1@infosec.exchange at 2026-04-16T08:01:09.000Z ##

Critical nginx-ui Vulnerability CVE-2026-33032 Under Active Exploitation

nginx-ui patched a critical authentication bypass (CVE-2026-33032) in its MCP integration that allows unauthenticated attackers to take over Nginx services and intercept traffic. The flaw is actively exploited in the wild and affects over 2,600 internet-exposed instances.

**Make sure your nginx-ui instances are isolated from the internet and accessible from trusted networks only. Then update nginx-ui to version 2.3.4 or later to patch CVE-2026-33032, and change the IP whitelist default from allow-all to deny-all so only trusted addresses can reach the management interface.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

patrickcmiller@infosec.exchange at 2026-04-15T15:12:02.000Z ##

Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover thehackernews.com/2026/04/crit

##

CVE-2026-40245
(7.5 HIGH)

EPSS: 0.10%

updated 2026-04-16T21:57:38

1 posts

### Summary An information disclosure vulnerability in the UDR service allows any unauthenticated attacker with access to the 5G Service Based Interface (SBI) to retrieve stored subscriber identifiers (SUPI/IMSI) with a single HTTP GET request requiring no parameters or credentials. ### Details The endpoint `GET /nudr-dr/v2/application-data/influenceData/subs-to-notify` (defined in 3GPP TS 29.51

thehackerwire@mastodon.social at 2026-04-16T05:41:56.000Z ##

🟠 CVE-2026-40245 - High (7.5)

Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions 4.2.1 and below contain an information disclosure vulnerability in the UDR (Unified Data Repository) service. The handler for GET /nudr-dr/v2...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40261
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-16T21:55:08

1 posts

### Impact The `Perforce::syncCodeBase()` method appended the `$sourceReference` parameter to a shell command without proper escaping, allowing an attacker to inject arbitrary commands through a crafted source reference containing shell metacharacters. Further as in GHSA-wg36-wvj6-r67p / CVE-2026-40176 the `Perforce::generateP4Command()` method constructed shell commands by interpolating user-supp

2 repos

https://github.com/terminat0r7031/composer-CVE-2026-40261-CVE-2026-40176-PoC

https://github.com/daptheHuman/cve-2026-40176-cve-2026-40261

thehackerwire@mastodon.social at 2026-04-16T13:24:29.000Z ##

🟠 CVE-2026-40261 - High (8.8)

Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::syncCodeBase() method, which appends the $sourceReference parameter to a shell command without p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 46.64%

updated 2026-04-16T21:49:17

16 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

7 repos

https://github.com/hg0434hongzh0/CVE-2026-34197

https://github.com/keraattin/CVE-2026-34197

https://github.com/dinosn/CVE-2026-34197

https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197

https://github.com/0xBlackash/CVE-2026-34197

https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

https://github.com/DEVSECURITYSPRO/CVE-2026-34197

beyondmachines1 at 2026-04-17T18:01:09.463Z ##

CISA Warns of Active Exploitation in Apache ActiveMQ Jolokia API Vulnerability

CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.

**If you're running Apache ActiveMQ, upgrade to version 5.19.4 or 6.2.3 ASAP. Atackers are actively exploiting this right now. While you're at it, make sure your ActiveMQ console is not exposed to the internet, change any default admin:admin credentials, and disable the Jolokia endpoint entirely if you don't need it.**

beyondmachines.net/event_detai

##

offseq at 2026-04-17T14:00:30.854Z ##

CRITICAL: Apache ActiveMQ RCE vuln (CVE-2026-34197) disclosed. No patch yet — review your security posture & monitor vendor channels for updates. Remote attackers could fully compromise systems. radar.offseq.com/threat/recent

##

canartuc@mastodon.social at 2026-04-17T13:03:28.000Z ##

An Anthropic researcher used Claude to find Apache ActiveMQ flaw CVE-2026-34197. Maintainers shipped the fix in seven days. CISA added the CVE to its federal exploited-vulnerability list. The same week, Cal.com closed source citing AI scanners as the reason. I have run defender-side tooling rollouts for 20 years. Every wave gets framed as attacker-only for six months first. One team shipped the patch. The other shipped the excuse.

#InfoSec #OpenSource #AI #CyberSecurity

##

technadu at 2026-04-17T10:52:12.797Z ##

New KEV added 🚨
CVE-2026-34197 (Apache ActiveMQ)
• Active exploitation confirmed
• High-risk entry point
KEV = patch now, not later

Source: cisa.gov/news-events/alerts/20

💬 How fast is your patch cycle?
Follow @technadu

##

offseq at 2026-04-17T10:30:27.405Z ##

⚠️ CRITICAL: CVE-2026-34197 is a remote code execution vuln in Apache ActiveMQ. No patch or confirmed exploitation yet. Monitor vendor advisories & apply security best practices. Details: radar.offseq.com/threat/recent

##

posthole@social.posthole.net at 2026-04-17T09:03:21.000Z ##

https://posthole.net/

THE POSTHOLE
Friday, 17 April 2026  ·  Overnight Edition  ·  Vol. 1 No. 128
MJD 61147.37

SECURITY

NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
-- The Hacker News
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity...

Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
-- The Hacker News

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
-- The Hacker News

#infosec #cybersecurity #posthole

TECHNOLOGY

500 Lines or Less: A Python Interpreter Written in Python
-- Lobsters
Comments

Demystifying assemblers
-- Lobsters

A history of teapots and UNIX
-- Lobsters

#tech #technology #posthole

IN BRIEF

Microsoft: Some Windows servers enter reboot loops after April patches -- BleepingComputer
Man gets 30 months for selling thousands of hacked DraftKings accounts -- BleepingComputer
Recently leaked Windows zero-days now exploited in attacks -- BleepingComputer
AWS Launches Agent Registry in Preview to Govern AI Agent Sprawl Across Enterprises -- InfoQ
Operation PowerOFF identifies 75k DDoS users, takes down 53 domains -- BleepingComputer

#news #posthole

SECTIONS

Tech Talk: Capita won disastrous UK pensions gig after acing performance... #tech
Account Avoidance: My dog pops in to check up on me every two hours. #opensource
Politics Fightbox: Open Thread #politics
Gaming Greatness: Trails in the Sky 2nd Chapter launches September 17 #gaming
Music Hotline: Olivia Rodrigo – “Drop Dead” #music
Guns Galore: TFB Review: Blk Lbl - Quality You Can Feel #firearms
Science Showcase: Former deputy surgeon general Erica Schwartz nominated as new... #science
Delicious Dining: braised leeks and lentils with arugula and yogurt #food
Fascination Station: Chevelon Creek Bridge in Winslow, Arizona #culture
Podcast Pack: Rusty Fears 7 - Clunk by Nairis Santini #podcast

Full broadsheet: https://posthole.net/

#posthole #news

##

hackerworkspace at 2026-04-17T04:58:11.287Z ##

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

thehackernews.com/2026/04/apac

Read on HackerWorkspace: hackerworkspace.com/article/ap

##

beyondmachines1@infosec.exchange at 2026-04-17T18:01:09.000Z ##

CISA Warns of Active Exploitation in Apache ActiveMQ Jolokia API Vulnerability

CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.

**If you're running Apache ActiveMQ, upgrade to version 5.19.4 or 6.2.3 ASAP. Atackers are actively exploiting this right now. While you're at it, make sure your ActiveMQ console is not exposed to the internet, change any default admin:admin credentials, and disable the Jolokia endpoint entirely if you don't need it.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-04-17T14:00:30.000Z ##

CRITICAL: Apache ActiveMQ RCE vuln (CVE-2026-34197) disclosed. No patch yet — review your security posture & monitor vendor channels for updates. Remote attackers could fully compromise systems. radar.offseq.com/threat/recent #OffSeq #ActiveMQ #Vuln #InfoSec

##

canartuc@mastodon.social at 2026-04-17T13:03:28.000Z ##

An Anthropic researcher used Claude to find Apache ActiveMQ flaw CVE-2026-34197. Maintainers shipped the fix in seven days. CISA added the CVE to its federal exploited-vulnerability list. The same week, Cal.com closed source citing AI scanners as the reason. I have run defender-side tooling rollouts for 20 years. Every wave gets framed as attacker-only for six months first. One team shipped the patch. The other shipped the excuse.

#InfoSec #OpenSource #AI #CyberSecurity

##

technadu@infosec.exchange at 2026-04-17T10:52:12.000Z ##

New KEV added 🚨
CVE-2026-34197 (Apache ActiveMQ)
• Active exploitation confirmed
• High-risk entry point
KEV = patch now, not later

Source: cisa.gov/news-events/alerts/20

💬 How fast is your patch cycle?
Follow @technadu

#InfoSec #CyberSecurity #KEV

##

offseq@infosec.exchange at 2026-04-17T10:30:27.000Z ##

⚠️ CRITICAL: CVE-2026-34197 is a remote code execution vuln in Apache ActiveMQ. No patch or confirmed exploitation yet. Monitor vendor advisories & apply security best practices. Details: radar.offseq.com/threat/recent #OffSeq #ApacheActiveMQ #Vuln #Infosec

##

hackerworkspace@infosec.exchange at 2026-04-17T04:58:11.000Z ##

Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation

thehackernews.com/2026/04/apac

Read on HackerWorkspace: hackerworkspace.com/article/ap

#cybersecurity #vulnerability #exploit

##

secdb@infosec.exchange at 2026-04-16T20:00:13.000Z ##

🚨 [CISA-2026:0416] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-34197 (secdb.nttzen.cloud/cve/detail/)
- Name: Apache ActiveMQ Improper Input Validation Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apache
- Product: ActiveMQ
- Notes: activemq.apache.org/security-a ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260416 #cisa20260416 #cve_2026_34197 #cve202634197

##

cisakevtracker@mastodon.social at 2026-04-16T18:00:58.000Z ##

CVE ID: CVE-2026-34197
Vendor: Apache
Product: ActiveMQ
Date Added: 2026-04-16
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-04-16T17:19:56.000Z ##

New.

CISA has updated the KEV catalogue:

- CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #Apache

Cisco:

Cisco has updated a vulnerability that was listed yesterday:

- CVE-2026-20152: Cisco Secure Web Appliance Authentication Bypass Vulnerability (medium severity) sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

ASUS:

ASUS has posted two advisories for CVE-2026-3428 and CVE-2026-1880 asus.com/security-advisory/ #ASUS #infosec #vulnerability

##

CVE-2025-41118
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-16T21:41:16

2 posts

Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS). If the database is configured to use Tencent COS as the storage backend, an attacker could extract the secret_key configuration value from the Pyroscope API. To exploit this vulnerability, an attacker needs direct access to the Pyroscope API. We

thehackerwire@mastodon.social at 2026-04-17T13:00:00.000Z ##

🔴 CVE-2025-41118 - Critical (9.1)

Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS).

If the database is configured to use Tencent COS as the storage backend, an attacker could ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T13:00:00.000Z ##

🔴 CVE-2025-41118 - Critical (9.1)

Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS).

If the database is configured to use Tencent COS as the storage backend, an attacker could ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6290
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-16T21:33:30

2 posts

Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token. This allows an authenticated GUI user with access in one org, to use the query() plugin, in a notebook cell, to run VQL queries on other orgs which they may not have access to. The user's permissions in the other org are the same as the permissions

thehackerwire@mastodon.social at 2026-04-17T17:01:11.000Z ##

🟠 CVE-2026-6290 - High (8)

Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token. This allows an authenticated GUI user with access in one org, to use the query() plugin, in a no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T17:01:11.000Z ##

🟠 CVE-2026-6290 - High (8)

Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token. This allows an authenticated GUI user with access in one org, to use the query() plugin, in a no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32282
(6.4 MEDIUM)

EPSS: 0.01%

updated 2026-04-16T21:32:15

1 posts

On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod operation is in progress, Chmod can operate on the target of the symlink, even when the target lies outside the root. The Linux fchmodat syscall silently ignores the AT_SYMLINK_NOFOLLOW flag, which Root.Chmod uses to avoid symlink traversal. Root.Chmod checks its target before acting and returns an error if the target

linux@activitypub.awakari.com at 2026-04-15T08:48:20.000Z ## CVE-2026-32282 TOCTOU permits root escape on Linux via Root.Chmod in os in internal/syscall/unix Information published.

#CVE

Origin | Interest | Match ##

CVE-2026-4424
(7.5 HIGH)

EPSS: 0.20%

updated 2026-04-16T21:32:14

1 posts

A flaw was found in libarchive. This heap out-of-bounds read vulnerability exists in the RAR archive processing logic due to improper validation of the LZSS sliding window size after transitions between compression methods. A remote attacker can exploit this by providing a specially crafted RAR archive, leading to the disclosure of sensitive heap memory information without requiring authentication

linux@activitypub.awakari.com at 2026-04-16T20:01:01.000Z ## Oracle Linux 10 libarchive Important Fix ELSA-2026-8492 CVE-2026-4424 The following updated rpms for Oracle Linux 10 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-6442
(8.4 HIGH)

EPSS: 0.07%

updated 2026-04-16T21:31:19

1 posts

Improper validation of bash commands in Snowflake Cortex Code CLI versions prior to 1.0.25 allowed subsequent commands to execute outside the sandbox. An attacker could exploit this by embedding specially crafted commands in untrusted content, such as a malicious repository, causing the CLI agent to execute arbitrary code on the local device without user consent. Exploitation is non-deterministic

thehackerwire@mastodon.social at 2026-04-16T20:04:11.000Z ##

🟠 CVE-2026-6442 - High (8.3)

Improper validation of bash commands in Snowflake Cortex Code CLI versions prior to 1.0.25 allowed subsequent commands to execute outside the sandbox. An attacker could exploit this by embedding specially crafted commands in untrusted content, suc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5194
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-16T21:31:11

2 posts

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is a

threatnoir@infosec.exchange at 2026-04-16T15:09:20.000Z ##

⚠️ CRITICAL: wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update to 5.9.1 Now

Critical vulnerability CVE-2026-5194 in wolfSSL allows attackers to forge digital certificates by bypassing signature verification across ECDSA, DSA, ML-DSA, ED25519, and ED448 algorithms. Affects approximately 5 billion devices including IoT, routers, and military systems. Legacy devices unlikely…

threatnoir.com/focus

#infosec #cybersecurity

##

beyondmachines1@infosec.exchange at 2026-04-15T12:01:10.000Z ##

wolfSSL Patches Critical Certificate Forgery Vulnerability Affecting Billions of Devices

wolfSSL version 5.9.1 patched a critical flaw (CVE-2026-5194) that allows attackers to use forged certificates to impersonate trusted servers.

**If you use devices or software built on wolfSSL (common in IoT, routers, industrial controllers, and embedded systems), make sure they are isolated from the internet and accessible from trusted networks only, then check with your device vendor for firmware updates that include wolfSSL version 5.9.1 to patch CVE-2026-5194. Be aware that older or unsupported devices may never get this fix, so network isolation and monitoring are your only protection for those.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-40173
(9.4 CRITICAL)

EPSS: 0.10%

updated 2026-04-16T21:08:08

1 posts

### Summary An unauthenticated debug endpoint in Dgraph Alpha exposes the full process command line, including the configured admin token from `--security "token=..."`. This does not break token validation logic directly; instead, it discloses the credential and enables unauthorized admin-level access by reusing the leaked token in `X-Dgraph-AuthToken`. ### Details The behavior occurs entirely w

thehackerwire@mastodon.social at 2026-04-16T13:24:09.000Z ##

🔴 CVE-2026-40173 - Critical (9.4)

Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered on the default mux and reachable without authenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34393
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-16T20:43:50

2 posts

### Impact The user patching API endpoint didn't properly limit the scope of edits. ### Patches * https://github.com/WeblateOrg/weblate/pull/18687 ### References Thanks to @tikket1 and @DavidCarliez for reporting this via GitHub. We received two individual reports for this.

thehackerwire@mastodon.social at 2026-04-17T13:00:21.000Z ##

🟠 CVE-2026-34393 - High (8.8)

Weblate is a web based localization tool. In versions prior to 5.17, the user patching API endpoint didn't properly limit the scope of edits. This issue has been fixed in version 5.17.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T13:00:21.000Z ##

🟠 CVE-2026-34393 - High (8.8)

Weblate is a web based localization tool. In versions prior to 5.17, the user patching API endpoint didn't properly limit the scope of edits. This issue has been fixed in version 5.17.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34242
(7.7 HIGH)

EPSS: 0.01%

updated 2026-04-16T20:43:12

2 posts

### Impact The ZIP download feature didn't verify downloaded file and it could follow symlinks outside the repository. ### Patches * https://github.com/WeblateOrg/weblate/pull/18683 ### References Thanks to @DavidCarliez for reporting this vulnerability via GitHub.

thehackerwire@mastodon.social at 2026-04-17T16:00:20.000Z ##

🟠 CVE-2026-34242 - High (7.7)

Weblate is a web based localization tool. In versions prior to 5.17, the ZIP download feature didn't verify downloaded files, potentially following symlinks outside the repository. This issue has been fixed in version 5.17.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T16:00:20.000Z ##

🟠 CVE-2026-34242 - High (7.7)

Weblate is a web based localization tool. In versions prior to 5.17, the ZIP download feature didn't verify downloaded files, potentially following symlinks outside the repository. This issue has been fixed in version 5.17.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30459
(7.1 HIGH)

EPSS: 0.04%

updated 2026-04-16T18:32:28

1 posts

An issue in the Forgot Password feature of Daylight Studio FuelCMS v1.5.2 allows unauthenticated attackers to obtain the password reset token of a victim user via a crafted link placed in a valid e-mail message.

pentesttools@infosec.exchange at 2026-04-16T11:55:46.000Z ##

FuelCMS doesn't validate the Host header on password reset requests.

Spoof it, trigger a reset for a valid user, and the app sends them a legitimate-looking email with your server in the link. They click. You get the token.

PTT-2025-029 / CVE-2026-30459, CVSS 7.1 High. No fix coming (vendor's been quiet for ~4 years).
Full PoC: pentest-tools.com/research

#penetrationtesting #offensivesecurity

##

CVE-2026-5426(CVSS UNKNOWN)

EPSS: 0.08%

updated 2026-04-16T18:31:28

1 posts

Hard-coded ASP.NET/IIS machineKey value in Digital Knowledge KnowledgeDeliver deployments prior to February 24, 2026 allows adversaries to circumvent ViewState validation mechanisms and achieve remote code execution via malicious ViewState deserialization attacks

offseq@infosec.exchange at 2026-04-17T00:00:39.000Z ##

🚨 CRITICAL: CVE-2026-5426 in Digital Knowledge KnowledgeDeliver (pre-Feb 2026) allows RCE via hard-coded ASP.NET machineKey & ViewState. No patch yet. Restrict access & monitor for ViewState abuse. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #AppSec #InfoSec

##

CVE-2026-30993
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-04-16T15:32:35

2 posts

Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the session() function at config.php. This vulnerability is exploitable via a crafted input.

thehackerwire@mastodon.social at 2026-04-17T17:01:20.000Z ##

🔴 CVE-2026-30993 - Critical (9.8)

Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the session() function at config.php. This vulnerability is exploitable via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T17:01:20.000Z ##

🔴 CVE-2026-30993 - Critical (9.8)

Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the session() function at config.php. This vulnerability is exploitable via a crafted input.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3324
(8.2 HIGH)

EPSS: 0.14%

updated 2026-04-16T15:31:44

1 posts

Zohocorp ManageEngine Log360 versions 13000 through 13013 are vulnerable to authentication bypass on certain actions due to improper filter configuration.

thehackerwire@mastodon.social at 2026-04-16T16:39:11.000Z ##

🟠 CVE-2026-3324 - High (8.2)

Zohocorp ManageEngine Log360 versions 13000 through 13013 are vulnerable to authentication bypass on certain actions due to improper filter configuration.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5785
(8.1 HIGH)

EPSS: 0.02%

updated 2026-04-16T15:31:44

1 posts

Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 are vulnerable to Authenticated SQL injection in the query report module.

thehackerwire@mastodon.social at 2026-04-16T14:19:14.000Z ##

🟠 CVE-2026-5785 - High (8.1)

Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 are vulnerable to Authenticated SQL injection in the query report module.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22619
(7.9 HIGH)

EPSS: 0.01%

updated 2026-04-16T15:31:33

1 posts

Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, which could lead to arbitrary code execution by an attacker with access to the software package. This security issue has been fixed in the latest version of Eaton IPP software which is available on the Eaton download center.

thehackerwire@mastodon.social at 2026-04-16T06:29:00.000Z ##

🟠 CVE-2026-22619 - High (7.8)

Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, which could lead to arbitrary code execution by an attacker with access to the software package. This security issue has been fixed in the latest v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6319
(7.5 HIGH)

EPSS: 0.08%

updated 2026-04-16T12:32:42

1 posts

Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-04-16T14:00:10.000Z ##

🟠 CVE-2026-6319 - High (7.5)

Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3489
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-16T12:31:47

1 posts

The DirectoryPress – Business Directory And Classified Ad Listing plugin for WordPress is vulnerable to SQL Injection via the 'packages' parameter in versions up to, and including, 3.6.26 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into

thehackerwire@mastodon.social at 2026-04-16T13:04:53.000Z ##

🟠 CVE-2026-3489 - High (7.5)

The DirectoryPress – Business Directory And Classified Ad Listing plugin for WordPress is vulnerable to SQL Injection via the 'packages' parameter in versions up to, and including, 3.6.26 due to insufficient escaping on the user supplied paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6308
(7.5 HIGH)

EPSS: 0.08%

updated 2026-04-16T12:31:41

1 posts

Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T14:08:19.000Z ##

🟠 CVE-2026-6308 - High (7.5)

Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6318
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-16T12:31:41

1 posts

Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-04-16T13:48:00.000Z ##

🟠 CVE-2026-6318 - High (8.8)

Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6306
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-16T12:31:40

1 posts

Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T20:44:59.000Z ##

🟠 CVE-2026-6306 - High (8.8)

Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6303
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-16T12:31:40

1 posts

Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T17:50:02.000Z ##

🟠 CVE-2026-6303 - High (8.8)

Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-14868
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-16T09:31:50

1 posts

The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path Traversal and Arbitrary File Deletion in all versions up to, and including, 1.6. This is due to missing nonce validation and insufficient file path validation on the delete action in the 'appform_options_page_html' function. This makes it possible for unauthenticated attackers to delete arbitrary fi

thehackerwire@mastodon.social at 2026-04-16T11:08:42.000Z ##

🟠 CVE-2025-14868 - High (8.8)

The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path Traversal and Arbitrary File Deletion in all versions up to, and including, 1.6. This is due to missing nonce validation and insufficient file path...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1620
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-16T07:16:29.787000

1 posts

The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9.0. This is due to insufficient sanitization of the template name parameter in the `lae_get_template_part()` function, which uses an inadequate `str_replace()` approach that can be bypassed using recursive directory traversal patterns. This makes it possible for authe

thehackerwire@mastodon.social at 2026-04-16T07:18:52.000Z ##

🟠 CVE-2026-1620 - High (8.8)

The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9.0. This is due to insufficient sanitization of the template name parameter in the `lae_get_template_part()` functi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3596
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-16T06:31:29

2 posts

The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.2. The plugin registers an unauthenticated AJAX action ('wp_ajax_nopriv_install-imprint') that maps to the ink_pd_add_option() function. This function reads 'option' and 'opt_value' from $_POST, then calls delete_option() followed by add_option() using these attacker-co

thehackerwire@mastodon.social at 2026-04-16T06:28:51.000Z ##

🔴 CVE-2026-3596 - Critical (9.8)

The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.2. The plugin registers an unauthenticated AJAX action ('wp_ajax_nopriv_install-imprint') that maps to the ink_pd_add...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-16T06:00:29.000Z ##

🚨 CVE-2026-3596 (CRITICAL): imprintnext Riaxe Product Customizer ≤2.1.2 lets unauthenticated users update WordPress options, enabling privilege escalation (admin creation). Disable or update plugin ASAP! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #Vulnerability

##

CVE-2026-3614
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-16T06:31:29

1 posts

The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11.0 up to, and including, 10.8.1 due to a missing capability check on the `wp_ajax_acymailing_router` AJAX handler. This makes it possible for authenticated attackers, with Subscriber-level access and above, to access admin-only controllers (including configuration management), enable the autologin fe

thehackerwire@mastodon.social at 2026-04-16T06:28:02.000Z ##

🟠 CVE-2026-3614 - High (8.8)

The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11.0 up to, and including, 10.8.1 due to a missing capability check on the `wp_ajax_acymailing_router` AJAX handler. This makes it possible for authen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5050
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-16T06:31:29

1 posts

The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 7.0.0 due to successful_request() handlers calculating a local signature but not validating Ds_Signature from the request before accepting payment status across the Redsys, Bizum, and Google Pay gateway flows. This makes it possi

thehackerwire@mastodon.social at 2026-04-16T06:27:53.000Z ##

🟠 CVE-2026-5050 - High (7.5)

The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 7.0.0 due to successful_request() handlers calculating a local signature but...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3599
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-16T06:16:17.063000

1 posts

The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter keys within 'product_data' of the /wp-json/InkXEProductDesignerLite/add-item-to-cart REST API endpoint in all versions up to, and including, 2.1.2. This is due to insufficient escaping on the user-supplied parameter and insufficient preparation on the existing SQL query. This makes it possi

thehackerwire@mastodon.social at 2026-04-16T06:28:12.000Z ##

🟠 CVE-2026-3599 - High (7.5)

The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter keys within 'product_data' of the /wp-json/InkXEProductDesignerLite/add-item-to-cart REST API endpoint in all versions up to, and includin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6350
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-16T03:31:15

2 posts

MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.

thehackerwire@mastodon.social at 2026-04-16T04:25:41.000Z ##

🔴 CVE-2026-6350 - Critical (9.8)

MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-16T03:00:29.000Z ##

🚨 CRITICAL: CVE-2026-6350 in Openfind MailGates 6.0 & 5.0 — stack-based buffer overflow enables unauthenticated RCE. No mitigation yet. Restrict exposure & watch for updates. radar.offseq.com/threat/cve-20 #OffSeq #MailGates #CVE20266350 #infosec

##

CVE-2026-1880(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-04-16T03:31:14

1 posts

An Incorrect Permission Assignment for Critical Resource vulnerability in the ASUS DriverHub update process allows privilege escalation due to improper protection of required execution resources during the validation phase, permitting a local user to make unprivileged modifications. This allows the altered resource to pass system checks and be executed with elevated privileges upon a user-initiate

1 repos

https://github.com/seokjohn/CVE-2026-1880

AAKL@infosec.exchange at 2026-04-16T17:19:56.000Z ##

New.

CISA has updated the KEV catalogue:

- CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #Apache

Cisco:

Cisco has updated a vulnerability that was listed yesterday:

- CVE-2026-20152: Cisco Secure Web Appliance Authentication Bypass Vulnerability (medium severity) sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

ASUS:

ASUS has posted two advisories for CVE-2026-3428 and CVE-2026-1880 asus.com/security-advisory/ #ASUS #infosec #vulnerability

##

CVE-2026-40960
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-16T03:31:13

1 posts

Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environment. If at least one mod is listed as secure.trusted_mods or secure.http_mods, then a crafted mod can intercept the request for the insecure environment or HTTP API, and also receive access to it.

thehackerwire@mastodon.social at 2026-04-16T05:41:47.000Z ##

🟠 CVE-2026-40960 - High (8.1)

Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environment. If at least one mod is listed as secure.trusted_mods or secure.http_mods, then a crafted mod can intercept the request for the insecure environment or HTTP API, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40959
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-04-16T03:31:13

1 posts

Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod.

thehackerwire@mastodon.social at 2026-04-16T05:41:38.000Z ##

🔴 CVE-2026-40959 - Critical (9.3)

Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3428(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-04-16T03:31:12

1 posts

A Download of Code Without Integrity Check vulnerability in the update modules in ASUS Member Center(华硕大厅) allows a local user to achieve privilege escalation to Administrator via exploitation of a Time-of-check Time-of-use (TOC-TOU) during the update process, where an unexpected payload is substituted for a legitimate one immediately after download, and subsequently executed with administrative p

AAKL@infosec.exchange at 2026-04-16T17:19:56.000Z ##

New.

CISA has updated the KEV catalogue:

- CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #Apache

Cisco:

Cisco has updated a vulnerability that was listed yesterday:

- CVE-2026-20152: Cisco Secure Web Appliance Authentication Bypass Vulnerability (medium severity) sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

ASUS:

ASUS has posted two advisories for CVE-2026-3428 and CVE-2026-1880 asus.com/security-advisory/ #ASUS #infosec #vulnerability

##

CVE-2026-6348
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-16T03:31:12

2 posts

WinMatrix agent developed by Simopro Technology has a Missing Authentication vulnerability, allowing authenticated local attackers to execute arbitrary code with SYSTEM privileges on the local machine as well as on all hosts within the environment where the agent is installed.

offseq@infosec.exchange at 2026-04-16T07:30:37.000Z ##

🔴 CRITICAL: CVE-2026-6348 in Simopro WinMatrix 3.5.13 lets local authenticated users execute code as SYSTEM. No patch yet — restrict access & monitor usage. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20266348 #Infosec #Vulnerability

##

thehackerwire@mastodon.social at 2026-04-16T04:21:38.000Z ##

🟠 CVE-2026-6348 - High (8.8)

WinMatrix agent developed by Simopro Technology has a Missing Authentication vulnerability, allowing authenticated local attackers to execute arbitrary code with SYSTEM privileges on the local machine as well as on all hosts within the environment...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40502
(8.8 HIGH)

EPSS: 0.19%

updated 2026-04-16T03:31:12

1 posts

OpenHarness prior to commit dd1d235 contains a command injection vulnerability that allows remote gateway users with chat access to invoke sensitive administrative commands by exploiting insufficient distinction between local-only and remote-safe commands in the gateway handler. Attackers can execute administrative commands such as /permissions full_auto through remote chat sessions to change perm

thehackerwire@mastodon.social at 2026-04-16T04:26:02.000Z ##

🟠 CVE-2026-40502 - High (8.8)

OpenHarness prior to commit dd1d235 contains a command injection vulnerability that allows remote gateway users with chat access to invoke sensitive administrative commands by exploiting insufficient distinction between local-only and remote-safe ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33807
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-16T01:03:26

1 posts

### Summary `@fastify/express` v4.0.4 contains a path handling bug in the `onRegister` function that causes middleware paths to be doubled when inherited by child plugins. This results in complete bypass of Express middleware security controls for all routes defined within child plugin scopes that share a prefix with parent-scoped middleware. No special configuration is required — this affects th

offseq@infosec.exchange at 2026-04-15T10:30:28.000Z ##

🔥 CRITICAL vuln: @fastify/express ≤4.0.4 (CVE-2026-33807) lets attackers bypass Express middleware (auth, rate limiting, more) via path handling bug. Upgrade to 4.0.5+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202633807 #NodeJS #AppSec

##

CVE-2026-6388
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-16T00:54:15

2 posts

A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, with permissions to create or modify an ImageUpdater resource in a multi-tenant environment, to bypass namespace boundaries. By exploiting insufficient validation, the attacker can trigger unauthorized image updates on applications managed by other tenants. This leads to cross-namespace privilege escalation, impacting

thehackerwire@mastodon.social at 2026-04-16T13:15:32.000Z ##

🔴 CVE-2026-6388 - Critical (9.1)

A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, with permissions to create or modify an ImageUpdater resource in a multi-tenant environment, to bypass namespace boundaries. By exploiting insufficient validation, th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-16T01:30:30.000Z ##

🚨 CRITICAL: CVE-2026-6388 in Red Hat OpenShift GitOps (CVSS 9.1) lets attackers with ImageUpdater access bypass namespace boundaries in multi-tenant setups. Restrict permissions & monitor changes. No patch yet — see radar.offseq.com/threat/cve-20 #OffSeq #RedHat #GitOps #Vuln

##

CVE-2026-4880
(9.8 CRITICAL)

EPSS: 0.12%

updated 2026-04-16T00:54:15

2 posts

The Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) plugin for WordPress is vulnerable to privilege escalation via insecure token-based authentication in all versions up to, and including, 1.11.0. This is due to the plugin trusting a user-supplied Base64-encoded user ID in the token parameter to identify users, leaking valid authentication tokens th

thehackerwire@mastodon.social at 2026-04-16T06:29:09.000Z ##

🔴 CVE-2026-4880 - Critical (9.8)

The Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) plugin for WordPress is vulnerable to privilege escalation via insecure token-based authentication in all versions up to, and including, 1.11.0....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-16T00:00:38.000Z ##

🚨 CVE-2026-4880 (CRITICAL, CVSS 9.8): ukrsolution Barcode Scanner (+Mobile App) plugin for WordPress lets unauthenticated attackers gain admin access via insecure Base64 token handling. Remove or disable plugin until patched. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE2026_4880

##

CVE-2026-30996
(7.5 HIGH)

EPSS: 0.29%

updated 2026-04-15T21:31:21

2 posts

An issue in the file handling logic of the component download.php of SAC-NFe v2.0.02 allows attackers to execute a directory traversal and read arbitrary files from the system via a crafted GET request.

thehackerwire@mastodon.social at 2026-04-17T18:01:07.000Z ##

🟠 CVE-2026-30996 - High (7.5)

An issue in the file handling logic of the component download.php of SAC-NFe v2.0.02 allows attackers to execute a directory traversal and read arbitrary files from the system via a crafted GET request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T18:01:07.000Z ##

🟠 CVE-2026-30996 - High (7.5)

An issue in the file handling logic of the component download.php of SAC-NFe v2.0.02 allows attackers to execute a directory traversal and read arbitrary files from the system via a crafted GET request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30994
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-15T21:31:21

2 posts

Incorrect access control in the config.php component of Slah v1.5.0 and below allows unauthenticated attackers to access sensitive information, including active session credentials.

thehackerwire@mastodon.social at 2026-04-17T18:00:47.000Z ##

🟠 CVE-2026-30994 - High (7.5)

Incorrect access control in the config.php component of Slah v1.5.0 and below allows unauthenticated attackers to access sensitive information, including active session credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T18:00:47.000Z ##

🟠 CVE-2026-30994 - High (7.5)

Incorrect access control in the config.php component of Slah v1.5.0 and below allows unauthenticated attackers to access sensitive information, including active session credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22676
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-15T21:30:30

1 posts

Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory. Attackers can modify existing automation content or place attacker-controlled files in this directory, which are then executed under the NT AUTHORITY\SYSTEM account d

thehackerwire@mastodon.social at 2026-04-16T13:47:41.000Z ##

🟠 CVE-2026-22676 - High (7.8)

Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory. Attackers ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6315
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-15T21:30:26

1 posts

Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T14:04:42.000Z ##

🟠 CVE-2026-6315 - High (8.8)

Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34632
(8.3 HIGH)

EPSS: 0.01%

updated 2026-04-15T21:30:25

2 posts

Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in arbitrary code execution in the context of the current user. A low-privileged local attacker could have exploited this vulnerability by manipulating the search path used by the application to locate critical resources, potentially causing unauthorized code execution. Exploitation

thehackerwire@mastodon.social at 2026-04-17T15:59:56.000Z ##

🟠 CVE-2026-34632 - High (8.2)

Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in arbitrary code execution in the context of the current user. A low-privileged local attacker could have exploited this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T15:59:56.000Z ##

🟠 CVE-2026-34632 - High (8.2)

Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in arbitrary code execution in the context of the current user. A low-privileged local attacker could have exploited this vulnerab...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6300
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-15T21:30:25

2 posts

Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-17T10:00:12.000Z ##

🟠 CVE-2026-6300 - High (8.8)

Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T10:00:12.000Z ##

🟠 CVE-2026-6300 - High (8.8)

Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6299
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-15T21:30:25

2 posts

Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-04-17T10:00:02.000Z ##

🟠 CVE-2026-6299 - High (8.8)

Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T10:00:02.000Z ##

🟠 CVE-2026-6299 - High (8.8)

Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6297
(8.4 HIGH)

EPSS: 0.01%

updated 2026-04-15T21:30:25

2 posts

Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-04-17T08:00:18.000Z ##

🟠 CVE-2026-6297 - High (8.3)

Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T08:00:18.000Z ##

🟠 CVE-2026-6297 - High (8.3)

Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6311
(8.4 HIGH)

EPSS: 0.02%

updated 2026-04-15T21:30:25

1 posts

Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T16:40:58.000Z ##

🟠 CVE-2026-6311 - High (8.3)

Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity:...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6310
(8.4 HIGH)

EPSS: 0.02%

updated 2026-04-15T21:30:25

1 posts

Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T16:40:49.000Z ##

🟠 CVE-2026-6310 - High (8.3)

Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6317
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-15T21:30:20

1 posts

Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T14:08:09.000Z ##

🟠 CVE-2026-6317 - High (8.8)

Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6360
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-15T21:30:20

1 posts

Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T14:04:23.000Z ##

🟠 CVE-2026-6360 - High (8.8)

Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6358
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-15T21:30:20

1 posts

Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-04-16T14:00:21.000Z ##

🟠 CVE-2026-6358 - High (8.8)

Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6307
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-15T21:30:19

2 posts

Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-17T07:59:58.000Z ##

🟠 CVE-2026-6307 - High (8.8)

Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T07:59:58.000Z ##

🟠 CVE-2026-6307 - High (8.8)

Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6304
(8.4 HIGH)

EPSS: 0.02%

updated 2026-04-15T21:30:19

1 posts

Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T19:08:53.000Z ##

🟠 CVE-2026-6304 - High (8.3)

Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6302
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-15T21:30:19

1 posts

Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T17:49:52.000Z ##

🟠 CVE-2026-6302 - High (8.8)

Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6314
(8.4 HIGH)

EPSS: 0.02%

updated 2026-04-15T21:30:19

1 posts

Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-04-16T14:04:32.000Z ##

🟠 CVE-2026-6314 - High (8.3)

Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40318
(8.5 HIGH)

EPSS: 0.06%

updated 2026-04-15T20:40:26

2 posts

## Summary The endpoint `/api/av/removeUnusedAttributeView` is vulnerable to a **path traversal (CWE-22)** that allows an attacker to delete arbitrary `.json` files on the server. The issue arises because user-controlled input (`id`) is directly used in filesystem path construction without validation or restriction. > Access to this endpoint (e.g., via a Reader-role or publish context) is consi

thehackerwire@mastodon.social at 2026-04-17T05:00:18.000Z ##

🟠 CVE-2026-40318 - High (8.5)

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enfo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T05:00:18.000Z ##

🟠 CVE-2026-40318 - High (8.5)

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enfo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30995
(8.6 HIGH)

EPSS: 0.03%

updated 2026-04-15T18:32:04

2 posts

Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerability via the id parameter in the vereador_ver.php endpoint.

thehackerwire@mastodon.social at 2026-04-17T18:00:57.000Z ##

🟠 CVE-2026-30995 - High (8.6)

Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerability via the id parameter in the vereador_ver.php endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T18:00:57.000Z ##

🟠 CVE-2026-30995 - High (8.6)

Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerability via the id parameter in the vereador_ver.php endpoint.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6372
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-15T18:32:04

2 posts

Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept Cryptocurrencies with Plisio: from n/a through 2.0.5.

thehackerwire@mastodon.social at 2026-04-17T17:01:30.000Z ##

🟠 CVE-2026-6372 - High (7.5)

Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept Cryptocurrencies with Plisio: from n/a through 2.0.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T17:01:30.000Z ##

🟠 CVE-2026-6372 - High (7.5)

Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept Cryptocurrencies with Plisio: from n/a through 2.0.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20152
(5.3 MEDIUM)

EPSS: 0.07%

updated 2026-04-15T18:32:04

1 posts

A vulnerability in the authentication service feature of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to bypass authentication policy requirements. This vulnerability is due to improper validation of user-supplied authentication input in HTTP requests. An attacker could exploit this vulnerability by sending HTTP requests that contain specif

AAKL@infosec.exchange at 2026-04-16T17:19:56.000Z ##

New.

CISA has updated the KEV catalogue:

- CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #Apache

Cisco:

Cisco has updated a vulnerability that was listed yesterday:

- CVE-2026-20152: Cisco Secure Web Appliance Authentication Bypass Vulnerability (medium severity) sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

ASUS:

ASUS has posted two advisories for CVE-2026-3428 and CVE-2026-1880 asus.com/security-advisory/ #ASUS #infosec #vulnerability

##

CVE-2026-20147
(10.0 CRITICAL)

EPSS: 0.23%

updated 2026-04-15T18:32:04

1 posts

A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sendi

AAKL@infosec.exchange at 2026-04-15T16:21:37.000Z ##

New.

Cisco has a number of listings today, three of them critical.

- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

More: sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

@cR0w

##

CVE-2026-20148
(4.9 MEDIUM)

EPSS: 0.05%

updated 2026-04-15T18:32:03

1 posts

A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to perform path traversal attacks on the underlying operating system and read arbitrary files. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by se

AAKL@infosec.exchange at 2026-04-15T16:21:37.000Z ##

New.

Cisco has a number of listings today, three of them critical.

- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability sec.cloudapps.cisco.com/securi

- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi

- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities sec.cloudapps.cisco.com/securi

More: sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

@cR0w

##

CVE-2026-25554
(6.5 MEDIUM)

EPSS: 0.09%

updated 2026-04-15T00:35:42.020000

2 posts

OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to commit 3822d33) contain a SQL injection vulnerability in the jwt_db_authorize() function in modules/auth_jwt/authorize.c when db_mode is enabled and a SQL database backend is used. The function extracts the tag claim from a JWT without prior signature verification and incorporates the unescaped value directly into a SQL qu

CVE-2025-0520
(0 None)

EPSS: 2.03%

updated 2026-04-15T00:35:42.020000

2 posts

An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution.This issue affects ShowDoc: before 2.8.7.

patrickcmiller@infosec.exchange at 2026-04-16T05:42:00.000Z ##

Attackers target unpatched ShowDoc servers via CVE-2025-0520 securityaffairs.com/190790/hac

##

beyondmachines1@infosec.exchange at 2026-04-15T13:01:10.000Z ##

ShowDoc Document Management Platform Targeted by Active RCE Exploitation

ShowDoc is facing active exploitation of a critical unauthenticated remote code execution vulnerability (CVE-2025-0520) caused by improper file upload validation. Attackers are using this flaw to deploy web shells and gain full control over unpatched servers.

**If you're running ShowDoc, update it to version 2.8.7 or higher immediately. This flaw has been patched since 2020 but attackers are actively exploiting unpatched instances. Then check your image upload folders for any suspicious PHP files that shouldn't be there, and make sure ShowDoc is not exposed to the internet.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-32178(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-14T23:27:56

1 posts

## Executive Summary: Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in System.Net.Mail where specially crafted data allows an unauthorized attacker to perform a spoofing

thehackerwire@mastodon.social at 2026-04-15T09:00:05.000Z ##

🟠 CVE-2026-32178 - High (7.5)

Improper neutralization of special elements in .NET allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33155(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-14T21:59:48

2 posts

### Summary The pickle unpickler `_RestrictedUnpickler` validates which classes can be loaded but does not limit their constructor arguments. A few of the types in `SAFE_TO_IMPORT` have constructors that allocate memory proportional to their input (`builtins.bytes`, `builtins.list`, `builtins.range`). A 40-byte pickle payload can force 10+ GB of memory, which crashes applications that load delta

_r_netsec at 2026-04-17T08:43:12.277Z ##

we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius. periphery.security/blog/cve-20

##

_r_netsec@infosec.exchange at 2026-04-17T08:43:12.000Z ##

we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius. periphery.security/blog/cve-20

##

CVE-2026-32201
(6.5 MEDIUM)

EPSS: 0.81%

updated 2026-04-14T18:30:55

1 posts

Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

PC_Fluesterer@social.tchncs.de at 2026-04-15T15:58:16.000Z ##

Microsoft Flickentag 2026-04: Fast Rekord!

Mit 165 oder 167 (je nach Zählung) geflickten Sicherheitslücken in Microsofts (MS) eigenen Produkten ist dieser der zweitgrößte Flickentag aller Zeiten. Wenn man die von Chromium geerbten Sicherheitslücken im Browser Edge hinzurechnet, kommt man auf 243 Sicherheitslücken. Puh. Von den 165 eigenen Sicherheitslücken stuft MS 8 als kritisch ein und 154 als wichtig. Fehlen noch drei? Ja, die sind nur als mittleres Risiko (moderat) eingestuft. Auch ein Flicken gegen die vorab veröffentlichte Sicherheitslücke im MS Defender ist enthalten.
Eine Sicherheitslücke, CVE-2026-32201 in MS Groupware SharePoint, wird bereits aktiv für

pc-fluesterer.info/wordpress/2

#Hintergrund #Warnung #exploits #Microsoft #office #unplugMicrosoft #UnplugTrump #windows #word

##

CVE-2026-33825
(7.8 HIGH)

EPSS: 0.04%

updated 2026-04-14T18:30:52

4 posts

Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/Letlaka/redsun-bluehammer-undefend-detection-pack

_r_netsec at 2026-04-17T16:13:05.105Z ##

CVE-2026-33825 deep-dive: The researcher commented out the full credential dump. Here's what that means. nefariousplan.com/posts/bluham

##

cecallihelper.bsky.social@bsky.brid.gy at 2026-04-17T11:48:10.289Z ##

"Two zero-days still waiting for a patch" CVE-2026-33825 is patched www.bleepingcomputer.com/news/securit... "On Thursday, Huntress Labs security researchers reported seeing all three zero-day exploits deployed in the wild, with the BlueHammer vulnerability being exploited since April 10." #cybersec

Recently leaked Windows zero-d...

##

_r_netsec@infosec.exchange at 2026-04-17T16:13:05.000Z ##

CVE-2026-33825 deep-dive: The researcher commented out the full credential dump. Here's what that means. nefariousplan.com/posts/bluham

##

agowa338@chaos.social at 2026-04-16T11:43:21.000Z ##

Fully exploitable Windows Defender vulnerability with full source code public for >8 days no CVE assigned so far (BlueHammer).

Writeup: hackingpassion.com/bluehammer-

Full source code: github.com/Nightmare-Eclipse/B

/cc @bsi Was ist eigentlich der "Prozess" für vollständig öffentliche Lücken zu denen es seit über einer Woche noch nicht einmal eine CVE Nummer gibt?

Edit: Patch and CVE number CVE-2026-33825 available by now. Took 6 days though.

#infosec #itsec #Microsoft #WindowsDefender #BlueHammer

##

CVE-2026-33824
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-14T18:30:52

1 posts

Double free in Windows IKE Extension allows an unauthorized attacker to execute code over a network.

1 repos

https://github.com/z3r0h3ro/CVE-2026-33824

vitobotta@mastodon.social at 2026-04-16T08:31:11.000Z ##

Microsoft dropped two wormable bugs in this month's Patch Tuesday. CVE-2026-33824 is a double free in the Windows IKE extension that lets an unauthorised attacker execute code over the network.

No auth needed, no user interaction. ZDI gave it two "bugs of the month" labels in the same release because both the IKE and TCP/IP flaws are wormable.

1/2

##

CVE-2026-33829
(4.3 MEDIUM)

EPSS: 0.06%

updated 2026-04-14T18:30:51

2 posts

Exposure of sensitive information to an unauthorized actor in Windows Snipping Tool allows an unauthorized attacker to perform spoofing over a network.

CVE-2026-32164
(7.9 HIGH)

EPSS: 0.04%

updated 2026-04-14T18:30:51

1 posts

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-04-15T11:00:19.000Z ##

🟠 CVE-2026-32164 - High (7.8)

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32171
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-14T18:30:51

1 posts

Insufficiently protected credentials in Azure Logic Apps allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-04-15T09:17:18.000Z ##

🟠 CVE-2026-32171 - High (8.8)

Insufficiently protected credentials in Azure Logic Apps allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27245
(9.3 CRITICAL)

EPSS: 0.10%

updated 2026-04-14T18:30:49

1 posts

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser. Scope is changed.

offseq@infosec.exchange at 2026-04-15T09:00:29.000Z ##

⚠️ CVE-2026-27245: CRITICAL XSS in Adobe Connect (v2025.3, 12.10 & earlier). Allows malicious JS via crafted URLs — risk of session hijack. No patch yet. Monitor Adobe advisories, apply input filtering if possible. radar.offseq.com/threat/cve-20 #OffSeq #AdobeConnect #XSS

##

CVE-2026-32162
(8.4 HIGH)

EPSS: 0.03%

updated 2026-04-14T18:30:43

1 posts

Acceptance of extraneous untrusted data with trusted data in Windows COM allows an unauthorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-04-15T10:59:59.000Z ##

🟠 CVE-2026-32162 - High (8.4)

Acceptance of extraneous untrusted data with trusted data in Windows COM allows an unauthorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32158
(7.9 HIGH)

EPSS: 0.04%

updated 2026-04-14T18:30:42

1 posts

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-04-15T11:15:10.000Z ##

🟠 CVE-2026-32158 - High (7.8)

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32157
(8.8 HIGH)

EPSS: 0.12%

updated 2026-04-14T18:30:42

1 posts

Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.

thehackerwire@mastodon.social at 2026-04-15T11:15:00.000Z ##

🟠 CVE-2026-32157 - High (8.8)

Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32165
(7.9 HIGH)

EPSS: 0.04%

updated 2026-04-14T18:30:42

1 posts

Use after free in Windows User Interface Core allows an authorized attacker to elevate privileges locally.

thehackerwire@mastodon.social at 2026-04-15T09:16:59.000Z ##

🟠 CVE-2026-32165 - High (7.8)

Use after free in Windows User Interface Core allows an authorized attacker to elevate privileges locally.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39813
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-14T18:30:41

1 posts

A path traversal: '../filedir' vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.5, FortiSandbox 4.4.0 through 4.4.8 may allow attacker to escalation of privilege via <insert attack vector here>

beyondmachines1@infosec.exchange at 2026-04-15T10:01:09.000Z ##

Fortinet Reports Critical Unauthenticated Vulnerabilities in FortiSandbox Platform

Fortinet reports two critical vulnerabilities in FortiSandbox (CVE-2026-39808 and CVE-2026-39813) that allow unauthenticated remote attackers to execute commands or bypass authentication via crafted HTTP requests.

**If you run FortiSandbox, make sure it is isolated from the internet and accessible from trusted networks only, then update immediately to version 4.4.9+ or 5.0.6+ depending on your branch. Until you update, restrict API access to trusted IP addresses only. It's a Fortinet product, it will be actively attacked.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-60710
(7.8 HIGH)

EPSS: 17.97%

updated 2026-04-14T14:44:19.867000

1 posts

Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.

2 repos

https://github.com/Wh04m1001/CVE-2025-60710

https://github.com/redpack-kr/CVE-2025-60710

CVE-2026-21643
(9.8 CRITICAL)

EPSS: 33.91%

updated 2026-04-14T14:21:18.670000

1 posts

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Nuclei template

2 repos

https://github.com/alirezac0/CVE-2026-21643

https://github.com/0xBlackash/CVE-2026-21643

AAKL@infosec.exchange at 2026-04-16T16:57:46.000Z ##

New. There's more, but this is getting too long.

Zscaler: Payouts King Takes Aim at the Ransomware Throne zscaler.com/blogs/security-res

Picus: CVE-2026-21643: Critical SQL Injection in Fortinet FortiClient EMS Exploited in the Wild picussecurity.com/resource/blo

Microsoft: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise microsoft.com/en-us/security/b

Sohos: QEMU abused to evade detection and enable ransomware delivery sophos.com/en-us/blog/qemu-abu @SophosXOps

Sekoia: From APT28 to RePythonNET: automating .NET malware analysis blog.sekoia.io/apt28-to-repyth @sekoia_io

Proopoint: Beyond the breach: inside a cargo theft actor’s post-compromise playbook proofpoint.com/us/blog/threat-

Group-IB: W3LL Unmasked group-ib.com/blog/w3ll-phishin

Posted yesterday:

Halcyon: 44% and Rising: What the Automotive Industry's Ransomware Problem Tells Us About Where Attacks Are Heading halcyon.ai/blog/44-percent-and #infosec #threatresearch #ransomware #threatintel #threatintelligence #Python #Fortinet #SQL #Apple #macOS #Microsoft #cybercrime

##

CVE-2026-34621
(9.7 CRITICAL)

EPSS: 4.56%

updated 2026-04-13T18:31:44

1 posts

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5 repos

https://github.com/ercihan/CVE-2026-34621

https://github.com/KeulenR01/Remediate-AdobeAcrobat-CVE-2026-34621

https://github.com/NULL200OK/cve_2026_34621_advanced

https://github.com/eduardorossi84/CVE-2026-34621-POC

https://github.com/ercihan/CVE-2026-34621_PDF_SAMPLE

beyondmachines1@infosec.exchange at 2026-04-15T09:01:09.000Z ##

Adobe releases April 2026 patches for multiple products

Adobe's April 2026 security update patches critical and important vulnerabilities across 11 product families, including arbitrary code execution, privilege escalation, and file system read flaws. One Acrobat prototype pollution vulnerability (CVE-2026-34621) is confirmed as actively exploited in the wild. Affected products include Acrobat/Reader, ColdFusion, InDesign, Connect, FrameMaker, Bridge, Photoshop, InCopy, Illustrator, and others, and users are urged to update immediately.

**If you use any Adobe products, prioritize updating Adobe Acrobat and Reader immediately since one of the vulnerabilities (CVE-2026-34621) is already being exploited in the wild, then update the rest of your Adobe software. Start with ColdFusion and Connect, which have critical flaws scoring above 9.0. If you can't update right away, avoid opening untrusted PDF files and restrict access to ColdFusion and Connect servers until patches are applied.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-40259
(8.1 HIGH)

EPSS: 0.08%

updated 2026-04-10T21:32:47

2 posts

## Summary An authenticated publish-service reader can invoke `/api/av/removeUnusedAttributeView` and cause persistent deletion of arbitrary attribute view (`AV`) definition files from the workspace. The route is protected only by generic `CheckAuth`, which accepts publish `RoleReader` requests. The handler forwards a caller-controlled `id` directly into a model function that deletes `data/stora

thehackerwire@mastodon.social at 2026-04-17T05:00:08.000Z ##

🟠 CVE-2026-40259 - High (8.1)

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler pass...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T05:00:08.000Z ##

🟠 CVE-2026-40259 - High (8.1)

SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler pass...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39987(CVSS UNKNOWN)

EPSS: 3.20%

updated 2026-04-09T19:06:18

5 posts

## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint `/terminal/ws` lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., `/ws`) that correctly call `validate_auth()` for authentication, the `/terminal/ws` endpoint only checks the

Nuclei template

4 repos

https://github.com/0xBlackash/CVE-2026-39987

https://github.com/mki9/CVE-2026-39987_exploit

https://github.com/keraattin/CVE-2026-39987

https://github.com/fevar54/marimo_CVE-2026-39987_RCE_PoC

canartuc@mastodon.social at 2026-04-17T10:54:45.000Z ##

Marimo is a Python notebook used in AI toolchains. It was exploited 9 hours 41 minutes after CVE-2026-39987 disclosure. Sysdig published the telemetry. Full remote takeover, no login required. The patch shipped with the advisory. Most shops do not have weekend on-call for a Python notebook. By Sunday morning the command-and-control traffic was already 14 hours deep. Patch window is shorter than one night of sleep. On-call SLA is the new budget line.

#CyberSecurity #DevOps #Python #InfoSec

##

undercodenews@mastodon.social at 2026-04-17T08:22:28.000Z ##

Marimo RCE Exploited Within Days: Attackers Deploy NKAbuse Malware via Trusted AI Platforms

A Critical Flaw Ignites a Rapid Cyber Offensive In early April 2026, a severe security vulnerability shook the developer and AI community. Just three days after its public disclosure on April 8, attackers had already moved from awareness to active exploitation. The flaw, identified as CVE-2026-39987, targeted the Marimo Python notebook platform and allowed attackers to execute…

undercodenews.com/marimo-rce-e

##

hackerworkspace at 2026-04-17T04:56:17.363Z ##

CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace | Sysdig

sysdig.com/blog/cve-2026-39987

Read on HackerWorkspace: hackerworkspace.com/article/cv

##

canartuc@mastodon.social at 2026-04-17T10:54:45.000Z ##

Marimo is a Python notebook used in AI toolchains. It was exploited 9 hours 41 minutes after CVE-2026-39987 disclosure. Sysdig published the telemetry. Full remote takeover, no login required. The patch shipped with the advisory. Most shops do not have weekend on-call for a Python notebook. By Sunday morning the command-and-control traffic was already 14 hours deep. Patch window is shorter than one night of sleep. On-call SLA is the new budget line.

#CyberSecurity #DevOps #Python #InfoSec

##

hackerworkspace@infosec.exchange at 2026-04-17T04:56:17.000Z ##

CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace | Sysdig

sysdig.com/blog/cve-2026-39987

Read on HackerWorkspace: hackerworkspace.com/article/cv

#malware #cybersecurity #vulnerability

##

CVE-2026-34073
(5.3 MEDIUM)

EPSS: 0.02%

updated 2026-04-06T15:30:27.887000

1 posts

cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. Prior to version 46.0.6, DNS name constraints were only validated against SANs within child certificates, and not the "peer name" presented during each validation. Consequently, cryptography would allow a peer named bar.example.com to validate against a wildcard leaf certificate for *.example.co

mmguero@infosec.exchange at 2026-04-15T15:27:23.000Z ##

Malcolm v26.04.1 contains improvements, bug fixes, security updates, and component bumps.

If you are upgrading from an existing Malcolm installation, run ./scripts/status for Malcolm to migrate some settings prior to running ./scripts/configure, ./scripts/start, or other Malcolm control scripts.

v26.02.0...v26.04.1

Note that v26.04.1 is the same as v26.04.0 released last week, apart from the fix for bug #943. If you're already running v26.04.0 and don't use the encrypted install option in the installer ISO, you probably don't need to worry about updating to v26.04.1. The full release notes from v26.04.0 are also included here.

  • ✨ Features and enhancements
    • implemented easier way to enable/disable Strelka scanners #935
    • Handle nested file scanning (e.g., from ZIP files) with Strelka #922
    • index selected Strelka result fields #919
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Hedgehog Linux Breaking on Reboot after Encrypted Quick Install with Multiple Drives #943
    • Fix YAML syntax error in kubernetes/15-redis.yml due to missing end quote #926
    • Using remote elasticsearch data store uses deprecated ssl_certificate_verification setting [github.com/cisagov/Malcolm/iss]
    • fix Malcolm API loopback webhook to handle RBAC and non-JSON formatted events #916
    • fix issues in zeekdeploy.sh to handle long crypto handshakes and Zeek's state DB getting out of sync
  • 🧹 Code and project maintenance
    • swap redis out for valkey #882
    • pin all third-party GitHub CI actions at known good SHA sums to mitigate things like the Trivy supply chain attack #933
    • some minor tweaks to various Dockerfiles and ISO build scripts to address vulnerability scanner findings
    • some documentation updates
  • 📄 Configuration changes for Malcolm (in environment variables in ./config/). The Malcolm control script (e.g., ./scripts/status, ./scripts/start) automatically handles creation and migration of variables according to ./config/env-var-actions.yml.
    • Added ARKIME_PCAP_LIBPCAP to arkime.env should uses wish to revert to older libpcap mode for PCAP file processing rather than faster scheme processing (default false)
    • FILEBEAT_SCANNER_FINGERPRINT_LENGTH's default in filescan.env has been changed from 1024 to 512
    • redis.env has been renamed to valkey.env and its variables also have been renamed accordingly
    • STRELKA_SCANNERS has been added to pipeline.env for #935
    • ZEEK_DISABLE_SPICY_ZIP has been added to zeek.env for #922 (default true)

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

#Malcolm #HedgehogLinux #Zeek #Arkime #Strelka #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL

##

CVE-2026-25645
(4.4 MEDIUM)

EPSS: 0.00%

updated 2026-03-27T22:07:43

1 posts

### Impact The `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local attacker with write access to the temp directory could pre-create a malicious file that would be loaded in place of the legitimate one. ### Affect

mmguero@infosec.exchange at 2026-04-15T15:27:23.000Z ##

Malcolm v26.04.1 contains improvements, bug fixes, security updates, and component bumps.

If you are upgrading from an existing Malcolm installation, run ./scripts/status for Malcolm to migrate some settings prior to running ./scripts/configure, ./scripts/start, or other Malcolm control scripts.

v26.02.0...v26.04.1

Note that v26.04.1 is the same as v26.04.0 released last week, apart from the fix for bug #943. If you're already running v26.04.0 and don't use the encrypted install option in the installer ISO, you probably don't need to worry about updating to v26.04.1. The full release notes from v26.04.0 are also included here.

  • ✨ Features and enhancements
    • implemented easier way to enable/disable Strelka scanners #935
    • Handle nested file scanning (e.g., from ZIP files) with Strelka #922
    • index selected Strelka result fields #919
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Hedgehog Linux Breaking on Reboot after Encrypted Quick Install with Multiple Drives #943
    • Fix YAML syntax error in kubernetes/15-redis.yml due to missing end quote #926
    • Using remote elasticsearch data store uses deprecated ssl_certificate_verification setting [github.com/cisagov/Malcolm/iss]
    • fix Malcolm API loopback webhook to handle RBAC and non-JSON formatted events #916
    • fix issues in zeekdeploy.sh to handle long crypto handshakes and Zeek's state DB getting out of sync
  • 🧹 Code and project maintenance
    • swap redis out for valkey #882
    • pin all third-party GitHub CI actions at known good SHA sums to mitigate things like the Trivy supply chain attack #933
    • some minor tweaks to various Dockerfiles and ISO build scripts to address vulnerability scanner findings
    • some documentation updates
  • 📄 Configuration changes for Malcolm (in environment variables in ./config/). The Malcolm control script (e.g., ./scripts/status, ./scripts/start) automatically handles creation and migration of variables according to ./config/env-var-actions.yml.
    • Added ARKIME_PCAP_LIBPCAP to arkime.env should uses wish to revert to older libpcap mode for PCAP file processing rather than faster scheme processing (default false)
    • FILEBEAT_SCANNER_FINGERPRINT_LENGTH's default in filescan.env has been changed from 1024 to 512
    • redis.env has been renamed to valkey.env and its variables also have been renamed accordingly
    • STRELKA_SCANNERS has been added to pipeline.env for #935
    • ZEEK_DISABLE_SPICY_ZIP has been added to zeek.env for #922 (default true)

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

#Malcolm #HedgehogLinux #Zeek #Arkime #Strelka #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL

##

CVE-2026-32746
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-03-23T15:31:40

4 posts

telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.

5 repos

https://github.com/jeffaf/cve-2026-32746

https://github.com/chosenonehacks/CVE-2026-32746

https://github.com/danindiana/cve-2026-32746-mitigation

https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746

https://github.com/ekomsSavior/telnet_scan

_r_netsec at 2026-04-17T08:43:12.584Z ##

A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs labs.watchtowr.com/a-32-year-o

##

_r_netsec at 2026-04-17T08:43:08.842Z ##

CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8) pwn.guide/free/other/cve-2026-

##

_r_netsec@infosec.exchange at 2026-04-17T08:43:12.000Z ##

A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs labs.watchtowr.com/a-32-year-o

##

_r_netsec@infosec.exchange at 2026-04-17T08:43:08.000Z ##

CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8) pwn.guide/free/other/cve-2026-

##

CVE-2026-22730
(8.8 HIGH)

EPSS: 0.02%

updated 2026-03-18T20:20:40

2 posts

A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionConverter allows attackers to bypass metadata-based access controls and execute arbitrary SQL commands. The vulnerability exists due to missing input sanitization.

1 repos

https://github.com/NULL200OK/CVE-2026-22730-Scanner

CVE-2026-22729
(8.6 HIGH)

EPSS: 0.07%

updated 2026-03-18T20:20:27

2 posts

A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConverter allows authenticated users to bypass metadata-based access controls through crafted filter expressions. User-controlled input passed to FilterExpressionBuilder is concatenated into JSONPath queries without proper escaping, enabling attackers to inject arbitrary JSONPath logic and access unauthorized documents. Thi

CVE-2026-3888
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-18T04:17:30.720000

2 posts

Local privilege escalation in snapd on Linux allows local attackers to get root privilege by re-creating snap's private /tmp directory when systemd-tmpfiles is configured to automatically clean up this directory. This issue affects Ubuntu 16.04 LTS, 18.04 LTS, 20.04 LTS, 22.04 LTS, and 24.04 LTS.

6 repos

https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.

https://github.com/TheCyberGeek/CVE-2026-3888-snap-confine-systemd-tmpfiles-LPE

https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher

https://github.com/netw0rk7/CVE-2026-3888-PoC

https://github.com/nomaisthere/CVE-2026-3888

https://github.com/DanielTangnes/CVE-2026-3888

CVE-2026-27205(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-02-23T22:28:06

1 posts

When the `session` object is accessed, Flask should set the `Vary: Cookie` header. This instructs caches not to cache the response, as it may contain information specific to a logged in user. This is handled in most cases, but some forms of access such as the Python `in` operator were overlooked. The severity depends on the application's use of the session, and the cache's behavior regarding cook

mmguero@infosec.exchange at 2026-04-15T15:27:23.000Z ##

Malcolm v26.04.1 contains improvements, bug fixes, security updates, and component bumps.

If you are upgrading from an existing Malcolm installation, run ./scripts/status for Malcolm to migrate some settings prior to running ./scripts/configure, ./scripts/start, or other Malcolm control scripts.

v26.02.0...v26.04.1

Note that v26.04.1 is the same as v26.04.0 released last week, apart from the fix for bug #943. If you're already running v26.04.0 and don't use the encrypted install option in the installer ISO, you probably don't need to worry about updating to v26.04.1. The full release notes from v26.04.0 are also included here.

  • ✨ Features and enhancements
    • implemented easier way to enable/disable Strelka scanners #935
    • Handle nested file scanning (e.g., from ZIP files) with Strelka #922
    • index selected Strelka result fields #919
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Hedgehog Linux Breaking on Reboot after Encrypted Quick Install with Multiple Drives #943
    • Fix YAML syntax error in kubernetes/15-redis.yml due to missing end quote #926
    • Using remote elasticsearch data store uses deprecated ssl_certificate_verification setting [github.com/cisagov/Malcolm/iss]
    • fix Malcolm API loopback webhook to handle RBAC and non-JSON formatted events #916
    • fix issues in zeekdeploy.sh to handle long crypto handshakes and Zeek's state DB getting out of sync
  • 🧹 Code and project maintenance
    • swap redis out for valkey #882
    • pin all third-party GitHub CI actions at known good SHA sums to mitigate things like the Trivy supply chain attack #933
    • some minor tweaks to various Dockerfiles and ISO build scripts to address vulnerability scanner findings
    • some documentation updates
  • 📄 Configuration changes for Malcolm (in environment variables in ./config/). The Malcolm control script (e.g., ./scripts/status, ./scripts/start) automatically handles creation and migration of variables according to ./config/env-var-actions.yml.
    • Added ARKIME_PCAP_LIBPCAP to arkime.env should uses wish to revert to older libpcap mode for PCAP file processing rather than faster scheme processing (default false)
    • FILEBEAT_SCANNER_FINGERPRINT_LENGTH's default in filescan.env has been changed from 1024 to 512
    • redis.env has been renamed to valkey.env and its variables also have been renamed accordingly
    • STRELKA_SCANNERS has been added to pipeline.env for #935
    • ZEEK_DISABLE_SPICY_ZIP has been added to zeek.env for #922 (default true)

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

#Malcolm #HedgehogLinux #Zeek #Arkime #Strelka #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL

##

CVE-2026-24061
(9.8 CRITICAL)

EPSS: 88.02%

updated 2026-02-10T18:30:34

2 posts

telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a "-f root" value for the USER environment variable.

Nuclei template

68 repos

https://github.com/r00tuser111/CVE-2026-24061

https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root

https://github.com/SeptembersEND/CVE--2026-24061

https://github.com/Remnant-DB/CVE-2026-24061

https://github.com/Mr-Zapi/CVE-2026-24061

https://github.com/Alter-N0X/CVE-2026-24061-POC

https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061

https://github.com/0p5cur/CVE-2026-24061-POC

https://github.com/XsanFlip/CVE-2026-24061-Scanner

https://github.com/obrunolima1910/CVE-2026-24061

https://github.com/h3athen/CVE-2026-24061

https://github.com/HD0x01/CVE-2026-24061-NSE

https://github.com/hyu164/Terrminus-CVE-2026-2406

https://github.com/hackingyseguridad/root

https://github.com/leonjza/inetutils-telnetd-auth-bypass

https://github.com/cumakurt/tscan

https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-

https://github.com/Gabs-hub/CVE-2026-24061_Lab

https://github.com/duy-31/CVE-2026-24061---telnetd

https://github.com/JayGLXR/CVE-2026-24061-POC

https://github.com/Parad0x7e/CVE-2026-24061

https://github.com/z3n70/CVE-2026-24061

https://github.com/killsystema/scan-cve-2026-24061

https://github.com/parameciumzhang/Tell-Me-Root

https://github.com/X-croot/CVE-2026-24061_POC

https://github.com/lavabyte/telnet-CVE-2026-24061

https://github.com/punitdarji/telnetd-cve-2026-24061

https://github.com/Risma2025/CVE-2026-24061-GNU-InetUtils-telnetd-Authentication-Bypass-Vulnerability

https://github.com/LucasPDiniz/CVE-2026-24061

https://github.com/yanxinwu946/CVE-2026-24061--telnetd

https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd

https://github.com/SafeBreach-Labs/CVE-2026-24061

https://github.com/Mefhika120/Ashwesker-CVE-2026-24061

https://github.com/ekomsSavior/telnet_scan

https://github.com/przemytn/CVE-2026-24061

https://github.com/TryA9ain/CVE-2026-24061

https://github.com/madfxr/Twenty-Three-Scanner

https://github.com/infat0x/CVE-2026-24061

https://github.com/ibrahmsql/CVE-2026-24061-PoC

https://github.com/scumfrog/cve-2026-24061

https://github.com/monstertsl/CVE-2026-24061

https://github.com/typeconfused/CVE-2026-24061

https://github.com/midox008/CVE-2026-24061

https://github.com/Ali-brarou/telnest

https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester

https://github.com/shivam-bathla/CVE-2026-24061-setup

https://github.com/0xBlackash/CVE-2026-24061

https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061

https://github.com/ridpath/Terrminus-CVE-2026-2406

https://github.com/franckferman/CVE_2026_24061

https://github.com/m3ngx1ng/cve_2026_24061_cli

https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector

https://github.com/ilostmypassword/Melissae-Honeypot-Framework

https://github.com/athack-ctf/chall2026-telneted

https://github.com/BrainBob/CVE-2026-24061

https://github.com/buzz075/CVE-2026-24061

https://github.com/Chocapikk/CVE-2026-24061

https://github.com/balgan/CVE-2026-24061

https://github.com/tiborscholtz/CVE-2026-24061

https://github.com/ms0x08-dev/CVE-2026-24061-POC

https://github.com/Lingzesec/CVE-2026-24061-GUI

https://github.com/xuemian168/CVE-2026-24061

https://github.com/SystemVll/CVE-2026-24061

https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061

https://github.com/0x7556/CVE-2026-24061

https://github.com/mbanyamer/CVE-2026-24061-GNU-Inetutils-telnetd-Remote-Authentication-Bypass-Root-Shell-

https://github.com/setuju/telnetd

https://github.com/novitahk/Exploit-CVE-2026-24061

tobru@mstdn.social at 2026-04-17T12:04:27.000Z ##

2026-01-14: The Day the telnet Died

"On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation."

Link: labs.greynoise.io/grimoire/202

#linkdump #blogpost #filtering #internet #isp #security #telnet

##

tobru@mstdn.social at 2026-04-17T12:04:27.000Z ##

2026-01-14: The Day the telnet Died

"On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation."

Link: labs.greynoise.io/grimoire/202

#linkdump #blogpost #filtering #internet #isp #security #telnet

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 86.90%

updated 2025-12-09T16:53:25

1 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/LucasPDiniz/CVE-2025-55182

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/sumanrox/rschunter

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/shyambhanushali/React2Shell

https://github.com/emredavut/CVE-2025-55182

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/snipevx/React2Shell-POC

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/rix4uni/CVE-2025-55182

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/zr0n/react2shell

https://github.com/sickwell/CVE-2025-55182

https://github.com/gensecaihq/react2shell-scanner

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/alptexans/RSC-Detect-CVE-2025-55182

https://github.com/vulncheck-oss/cve-2025-55182

https://github.com/jctommasi/react2shellVulnApp

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/surajhacx/react2shellpoc

https://github.com/zzhorc/CVE-2025-55182

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/ynsmroztas/NextRce

https://github.com/nehkark/CVE-2025-55182

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/mrknow001/RSC_Detector

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/MemerGamer/CVE-2025-55182

https://github.com/Archerkong/CVE-2025-55182

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/hoosin/CVE-2025-55182

https://github.com/Updatelap/CVE-2025-55182

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/hualy13/CVE-2025-55182

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/shamo0/react2shell-PoC

https://github.com/xalgord/React2Shell

https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/assetnote/react2shell-scanner

https://github.com/msanft/CVE-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/kavienanj/CVE-2025-55182

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/theman001/CVE-2025-55182

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/BlackTechX011/React2Shell

https://github.com/alsaut1/react2shell-lab

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/hexsh1dow/CVE-2025-55182

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/freeqaz/react2shell

https://github.com/theori-io/reactguard

threatnoir@infosec.exchange at 2026-04-16T04:30:03.000Z ##

2026-W14 — Weekly Threat Roundup

🔥 Critical week for supply chain attacks with React2Shell (CVE-2025-55182) exploited to harvest credentials from 766+ Next.js hosts
🎯 North Korean UNC1069 compromised Axios npm maintainer via fake Teams call, injecting malware into packages with 100M weekly downloads
🚨 European Commission breach…

threatnoir.com/weekly/2026-w14

#infosec #cybersecurity #threatintel

##

CVE-2025-59284
(3.3 LOW)

EPSS: 0.03%

updated 2025-10-14T18:30:47

2 posts

Exposure of sensitive information to an unauthorized actor in Windows NTLM allows an unauthorized attacker to perform spoofing locally.

1 repos

https://github.com/lytnc/CVE-2025-59284-PoC

_r_netsec at 2026-04-17T08:43:07.113Z ##

CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit sec-fault.com/blog/cve-2025-59

##

_r_netsec@infosec.exchange at 2026-04-17T08:43:07.000Z ##

CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit sec-fault.com/blog/cve-2025-59

##

CVE-2024-32114
(8.8 HIGH)

EPSS: 2.02%

updated 2025-02-11T19:03:09

2 posts

In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purge/delete destinations (using the Message REST AP

beyondmachines1 at 2026-04-17T18:01:09.463Z ##

CISA Warns of Active Exploitation in Apache ActiveMQ Jolokia API Vulnerability

CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.

**If you're running Apache ActiveMQ, upgrade to version 5.19.4 or 6.2.3 ASAP. Atackers are actively exploiting this right now. While you're at it, make sure your ActiveMQ console is not exposed to the internet, change any default admin:admin credentials, and disable the Jolokia endpoint entirely if you don't need it.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-04-17T18:01:09.000Z ##

CISA Warns of Active Exploitation in Apache ActiveMQ Jolokia API Vulnerability

CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.

**If you're running Apache ActiveMQ, upgrade to version 5.19.4 or 6.2.3 ASAP. Atackers are actively exploiting this right now. While you're at it, make sure your ActiveMQ console is not exposed to the internet, change any default admin:admin credentials, and disable the Jolokia endpoint entirely if you don't need it.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2025-65104
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-17T18:20:45.000Z ##

🟠 CVE-2025-65104 - High (7.9)

Firebird is an open-source relational database management system. In versions FB3 of the client library placed incorrect data length values into XSQLDA fields when communicating with FB4 or higher servers, resulting in an information leak. This is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-17T18:20:45.000Z ##

🟠 CVE-2025-65104 - High (7.9)

Firebird is an open-source relational database management system. In versions FB3 of the client library placed incorrect data length values into XSQLDA fields when communicating with FB4 or higher servers, resulting in an information leak. This is...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33058
(0 None)

EPSS: 0.03%

2 posts

N/A

_r_netsec at 2026-04-17T08:43:10.266Z ##

Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup 0dave.ch/posts/cve-2026-33058/

##

_r_netsec@infosec.exchange at 2026-04-17T08:43:10.000Z ##

Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup 0dave.ch/posts/cve-2026-33058/

##

CVE-2026-40316
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-16T13:15:23.000Z ##

🟠 CVE-2026-40316 - High (8.8)

OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Versions prior to 2.1.1 contain an RCE vulnerability in the .github/workflows/regenerate-migrations.yml workflow. The work...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33438
(0 None)

EPSS: 0.05%

1 posts

N/A

bearstech@mamot.fr at 2026-04-15T20:45:46.000Z ##

Gabriel Diyan, un étudiant de 2eme année découvre une faille de sécurité dans Stirling PDF (CVE-2026-33438).

"Après avoir découvert la vulnérabilité, je souhaitais expérimenter concrètement le processus de signalement…"

✅ 20/20 excellent travail 👍

👉 factuel.univ-lorraine.fr/artic

##

Visit counter For Websites