## Updated at UTC 2026-04-22T04:16:40.453197

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-6784 7.5 0.00% 2 0 2026-04-22T00:32:48 Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bug
CVE-2026-6772 7.5 0.00% 2 0 2026-04-22T00:32:44 Incorrect boundary conditions in the Libraries component in NSS. This vulnerabil
CVE-2026-41064 9.3 0.00% 2 0 2026-04-22T00:16:28.187000 WWBN AVideo is an open source video platform. In versions up to and including 29
CVE-2026-41060 7.7 0.00% 2 0 2026-04-21T23:16:21.250000 WWBN AVideo is an open source video platform. In versions 29.0 and below, the `i
CVE-2026-41058 8.1 0.00% 2 0 2026-04-21T23:16:21.117000 WWBN AVideo is an open source video platform. In versions 29.0 and below, the in
CVE-2026-41056 8.1 0.00% 2 0 2026-04-21T23:16:20.850000 WWBN AVideo is an open source video platform. In versions 29.0 and below, the `a
CVE-2026-41055 8.6 0.00% 2 0 2026-04-21T23:16:20.707000 WWBN AVideo is an open source video platform. In versions 29.0 and below, an inc
CVE-2026-25917 9.8 0.07% 1 0 2026-04-21T22:50:36 Dag Authors, who normally should not be able to execute code in the webserver co
CVE-2026-6832 8.1 0.00% 2 0 2026-04-21T22:16:21.040000 Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/sessi
CVE-2026-40946 0 0.00% 2 0 2026-04-21T22:16:20.230000 Oxia is a metadata store and coordination system. Prior to 0.16.2, the OIDC auth
CVE-2026-40933 9.9 0.00% 4 0 2026-04-21T22:16:19.383000 Flowise is a drag & drop user interface to build a customized large language mod
CVE-2026-40931 8.4 0.00% 2 0 2026-04-21T22:16:19.247000 Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and
CVE-2026-31019 8.8 0.00% 2 0 2026-04-21T21:32:31 In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application us
CVE-2026-35251 7.6 0.00% 2 0 2026-04-21T21:31:36 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-6823 8.2 0.00% 2 0 2026-04-21T21:31:36 HKUDS OpenHarness prior to PR #147 remediation contains an insecure default conf
CVE-2026-35243 7.8 0.00% 2 0 2026-04-21T21:31:35 Vulnerability in the Oracle Application Development Framework (ADF) product of O
CVE-2026-41193 9.1 0.00% 1 0 2026-04-21T21:16:46.603000 FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1
CVE-2026-40909 8.7 0.00% 2 0 2026-04-21T21:16:45.007000 WWBN AVideo is an open source video platform. In versions 29.0 and prior, the lo
CVE-2026-40906 9.9 0.00% 4 0 2026-04-21T21:16:44.697000 Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by pa
CVE-2026-40613 7.5 0.00% 1 0 2026-04-21T21:16:42.843000 Coturn is a free open source implementation of TURN and STUN Server. Prior to 4.
CVE-2026-40589 7.6 0.00% 1 0 2026-04-21T21:16:42.640000 FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1
CVE-2026-35246 7.5 0.00% 2 0 2026-04-21T21:16:40.677000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-35245 7.5 0.00% 2 0 2026-04-21T21:16:40.537000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-35242 7.5 0.00% 4 0 2026-04-21T21:16:40.120000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-35230 7.5 0.00% 2 0 2026-04-21T21:16:38.583000 Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (comp
CVE-2026-35229 7.5 0.00% 2 0 2026-04-21T21:16:38.440000 Vulnerability in the Java VM component of Oracle Database Server. Supported ver
CVE-2026-40938 7.5 0.00% 2 0 2026-04-21T20:28:37 ## Summary The git resolver's `revision` parameter is passed directly as a posi
CVE-2026-6819 8.8 0.00% 2 0 2026-04-21T20:17:05.780000 HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands
CVE-2026-33626 7.5 0.03% 1 0 2026-04-21T20:16:56.173000 LMDeploy is a toolkit for compressing, deploying, and serving large language mod
CVE-2026-40161 7.7 0.00% 2 0 2026-04-21T18:52:21 ### Summary The Tekton Pipelines git resolver in API mode sends the system-conf
CVE-2026-31018 8.8 0.00% 2 0 2026-04-21T18:33:00 In Dolibarr ERP & CRM <= 22.0.4, PHP code detection and editing permission enfor
CVE-2025-15638 10.0 0.00% 2 0 2026-04-21T18:32:04 Net::Dropbear versions before 0.14 for Perl contains a vulnerable version of lib
CVE-2026-24189 8.2 0.00% 3 0 2026-04-21T18:32:04 NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticated
CVE-2026-40050 9.8 0.00% 2 0 2026-04-21T18:32:04 CrowdStrike has released security updates to address a critical unauthenticated
CVE-2026-5652 9.0 0.00% 1 0 2026-04-21T18:16:53.633000 An insecure direct object reference vulnerability in the Users API component of
CVE-2026-40569 9.0 0.00% 1 0 2026-04-21T18:16:50.813000 FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to
CVE-2026-40576 9.4 0.00% 2 0 2026-04-21T17:16:55.870000 excel-mcp-server is a Model Context Protocol server for Excel file manipulation.
CVE-2026-24177 7.7 0.00% 3 0 2026-04-21T17:16:23.787000 NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API
CVE-2026-24176 4.3 0.00% 1 0 2026-04-21T17:16:23.603000 NVIDIA KAI Scheduler contains a vulnerability where an attacker could cause impr
CVE-2026-41285 4.3 0.01% 1 0 2026-04-21T16:20:24.180000 In OpenBSD through 7.8, the slaacd and rad daemons have an infinite loop when th
CVE-2026-41036 0 0.40% 1 0 2026-04-21T16:20:24.180000 This vulnerability exists in Quantum Networks router due to inadequate sanitizat
CVE-2026-31368 7.8 0.01% 1 0 2026-04-21T16:20:24.180000 AiAssistant is affected by type privilege bypass, successful exploitation of thi
CVE-2026-32604 9.9 0.18% 1 1 2026-04-21T16:20:24.180000 Spinnaker is an open source, multi-cloud continuous delivery platform. In versio
CVE-2026-6257 9.1 0.24% 2 0 2026-04-21T16:19:21.183000 Vvveb CMS v1.0.8 contains a remote code execution vulnerability in its media man
CVE-2026-30912 7.5 0.03% 1 0 2026-04-21T14:42:49.920000 In case of SQL errors, exception/stack trace of errors was exposed in API even i
CVE-2026-25524 8.1 0.07% 2 0 2026-04-21T14:32:50 PHP functions such as `getimagesize()`, `file_exists()`, and `is_readable()` can
CVE-2026-33829 4.3 0.03% 2 0 2026-04-21T14:16:04.630000 Exposure of sensitive information to an unauthorized actor in Windows Snipping T
CVE-2025-32975 10.0 75.31% 2 0 2026-04-21T14:09:39.213000 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef
CVE-2026-32228 7.5 0.03% 1 0 2026-04-21T12:54:57.653000 UI / API User with asset materialize permission could trigger dags they had no a
CVE-2026-20133 6.5 1.97% 2 0 2026-04-21T12:48:33.263000 A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated,
CVE-2023-27351 7.5 87.73% 3 0 template 2026-04-21T12:48:26.657000 This vulnerability allows remote attackers to bypass authentication on affected
CVE-2026-20122 5.4 1.12% 2 0 2026-04-21T11:59:56.777000 A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authe
CVE-2026-5965 9.8 6.34% 1 0 2026-04-21T06:30:32 NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, allowi
CVE-2025-2749 7.2 13.66% 2 0 2026-04-20T21:32:42 An authenticated remote code execution in Kentico Xperience allows authenticated
CVE-2025-48700 6.1 34.51% 2 0 2026-04-20T21:32:42 An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 an
CVE-2026-6249 8.8 0.10% 1 0 2026-04-20T21:31:52 Vvveb CMS 1.0.8 contains a remote code execution vulnerability in its media uplo
CVE-2026-39110 8.2 0.12% 1 0 2026-04-20T21:31:45 SQL Injection vulnerability in Apartment Visitors Management System Apartment Vi
CVE-2026-30269 9.9 0.04% 1 0 2026-04-20T21:31:44 Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated us
CVE-2024-27199 7.3 92.02% 3 3 template 2026-04-20T21:31:38 In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limite
CVE-2026-20128 7.6 0.06% 2 0 2026-04-20T21:31:38 A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-
CVE-2026-5478 8.1 0.02% 1 0 2026-04-20T20:16:48.800000 The Everest Forms plugin for WordPress is vulnerable to Arbitrary File Read and
CVE-2026-6248 8.1 0.39% 1 0 2026-04-20T19:16:11.230000 The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion i
CVE-2026-39109 9.4 0.17% 1 0 2026-04-20T19:16:10.733000 SQL Injection vulnerability in Apartment Visitors Management System Apartment Vi
CVE-2026-32956 9.8 0.04% 2 0 2026-04-20T19:05:30.750000 SD-330AC and AMC Manager provided by silex technology, Inc. contain a heap-based
CVE-2026-32965 7.5 0.03% 1 0 2026-04-20T19:05:30.750000 Initialization of a resource with an insecure default vulnerability exists in SD
CVE-2026-5966 8.1 0.31% 1 0 2026-04-20T19:05:30.750000 ThreatSonar Anti-Ransomware developed by TeamT5 has an Arbitrary File Deletion v
CVE-2026-39454 7.8 0.01% 1 0 2026-04-20T19:05:30.750000 SKYSEA Client View and SKYMEC IT Manager provided by Sky Co.,LTD. configure the
CVE-2026-33557 9.1 0.04% 1 0 2026-04-20T19:05:30.750000 A possible security vulnerability has been identified in Apache Kafka. By defau
CVE-2026-3517 8.4 0.14% 1 0 2026-04-20T19:05:30.750000 OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC
CVE-2026-4048 8.4 0.14% 1 1 2026-04-20T19:05:30.750000 OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC P
CVE-2026-41445 8.8 0.04% 1 0 2026-04-20T19:05:30.750000 KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the
CVE-2026-24467 9.0 0.18% 5 0 2026-04-20T19:03:07.607000 OpenAEV is an open source platform allowing organizations to plan, schedule and
CVE-2026-40321 8.0 0.04% 1 0 2026-04-20T19:03:07.607000 DNN (formerly DotNetNuke) is an open-source web content management platform (CMS
CVE-2026-25058 7.5 0.05% 1 0 2026-04-20T19:03:07.607000 Vexa is an open-source, self-hostable meeting bot API and meeting transcription
CVE-2026-41242 0 0.05% 2 0 2026-04-20T19:03:07.607000 protobufjs compiles protobuf definitions into JavaScript (JS) functions. In vers
CVE-2026-40342 9.9 0.08% 1 0 2026-04-20T19:03:07.607000 Firebird is an open-source relational database management system. In versions pr
CVE-2026-40324 9.1 0.03% 1 0 2026-04-20T19:03:07.607000 Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.
CVE-2026-40582 0 0.11% 1 0 2026-04-20T18:59:46.333000 ChurchCRM is an open-source church management system. In versions prior to 7.2.0
CVE-2026-39111 7.5 0.07% 1 0 2026-04-20T18:51:43.663000 SQL Injection vulnerability in Apartment Visitors Management System Apartment Vi
CVE-2026-30898 8.8 0.06% 1 0 2026-04-20T18:32:51 An example of BashOperator in Airflow documentation suggested a way of passing d
CVE-2026-34427 8.8 0.30% 2 0 2026-04-20T18:31:55 Vvveb prior to 1.0.8.1 contains a privilege escalation vulnerability in the admi
CVE-2026-26944 8.8 0.14% 1 0 2026-04-20T18:31:55 Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.6, LTS2025 release ver
CVE-2026-34428 7.7 0.03% 1 0 2026-04-20T18:31:55 Vvveb prior to 1.0.8.1 contains a server-side request forgery vulnerability in t
CVE-2026-30266 7.8 0.02% 1 0 2026-04-20T18:31:55 Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.7 and before a
CVE-2026-5760 9.8 0.29% 4 1 2026-04-20T18:31:48 SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) wh
CVE-2026-39918 9.8 0.22% 3 0 2026-04-20T18:31:48 Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installati
CVE-2026-40901 8.8 0.32% 1 0 2026-04-20T16:46:41.137000 DataEase is an open-source data visualization and analytics platform. Versions 2
CVE-2026-33122 9.8 0.03% 1 0 2026-04-20T16:40:39.070000 DataEase is an open-source data visualization and analytics platform. Versions 2
CVE-2026-6284 9.1 0.01% 1 0 2026-04-20T16:16:50.357000 An attacker with network access to the PLC is able to brute force discover passw
CVE-2026-40459 8.8 0.12% 1 0 2026-04-20T15:32:59 PAC4J is vulnerable to LDAP Injection in multiple methods. A low-privileged remo
CVE-2026-3519 8.5 0.14% 1 0 2026-04-20T15:31:58 OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC
CVE-2026-3518 8.5 0.14% 1 0 2026-04-20T15:31:58 OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC
CVE-2026-34018 9.8 0.03% 1 0 2026-04-20T14:44:35.410000 An SQL injection vulnerability exists in CubeCart prior to 6.6.0, which may allo
CVE-2026-4747 8.8 0.08% 1 2 2026-04-20T13:47:31.163000 Each RPCSEC_GSS data packet is validated by a routine which checks a signature i
CVE-2026-6632 8.8 0.05% 1 0 2026-04-20T12:32:07 A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. The affected el
CVE-2026-6631 8.8 0.02% 1 0 2026-04-20T12:32:07 A vulnerability was determined in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the
CVE-2026-6630 8.8 0.05% 1 0 2026-04-20T11:16:19.407000 A vulnerability was found in Tenda F451 1.0.0.7_cn_svn7958. This issue affects t
CVE-2026-5964 9.8 0.08% 2 0 2026-04-20T09:30:51 EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing u
CVE-2026-5963 9.8 0.08% 2 0 2026-04-20T09:30:51 EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing u
CVE-2026-5967 8.8 0.12% 1 0 2026-04-20T09:30:51 ThreatSonar Anti-Ransomware developed by TeamT5 has an Privilege Escalation vuln
CVE-2026-6644 None 0.73% 1 0 2026-04-20T09:30:51 A command injection vulnerability was found in the PPTP VPN Clients on the ADM.
CVE-2026-32955 8.8 0.04% 2 0 2026-04-20T06:31:33 SD-330AC and AMC Manager provided by silex technology, Inc. contain a stack-base
CVE-2026-6597 2.7 0.01% 1 0 2026-04-20T03:34:43 A weakness has been identified in langflow-ai langflow up to 1.8.3. Impacted is
CVE-2026-6591 4.3 0.04% 1 0 2026-04-20T03:34:42 A flaw has been found in ComfyUI up to 0.13.0. Affected is the function folder_p
CVE-2026-6581 8.8 0.04% 2 0 2026-04-20T00:30:19 A vulnerability was detected in H3C Magic B1 up to 100R004. Affected by this vul
CVE-2026-6572 5.6 0.01% 1 0 2026-04-19T15:30:24 A security vulnerability has been detected in Collabora KodExplorer up to 4.52.
CVE-2026-6573 6.3 0.01% 1 0 2026-04-19T15:30:18 A vulnerability was detected in PHPEMS 11.0. This affects the function temppage
CVE-2026-6574 7.3 0.04% 1 0 2026-04-19T14:16:11.593000 A vulnerability has been found in osuuu LightPicture up to 1.2.2. This issue aff
CVE-2026-6570 2.7 0.01% 1 0 2026-04-19T12:31:16 A security flaw has been discovered in kodcloud KodExplorer up to 4.52. Affected
CVE-2026-6568 7.3 0.09% 1 0 2026-04-19T12:31:16 A vulnerability was determined in kodcloud KodExplorer up to 4.52. This affects
CVE-2026-6563 8.8 0.04% 2 0 2026-04-19T09:30:21 A vulnerability has been found in H3C Magic B1 up to 100R004. The affected eleme
CVE-2026-6560 8.8 0.04% 2 0 2026-04-19T07:16:05.973000 A security vulnerability has been detected in H3C Magic B0 up to 100R002. This v
CVE-2026-0868 6.4 0.01% 1 0 2026-04-19T04:16:10.670000 The EMC – Easily Embed Calendly Scheduling Features plugin for WordPress is vuln
CVE-2026-2986 6.4 0.01% 1 1 2026-04-18T12:30:17 The Contextual Related Posts plugin for WordPress is vulnerable to Stored Cross-
CVE-2026-2505 5.4 0.01% 1 2 2026-04-18T10:16:12.823000 The Categories Images plugin for WordPress is vulnerable to Stored Cross-Site Sc
CVE-2026-6518 8.8 0.06% 1 0 2026-04-18T06:30:19 The CMP – Coming Soon & Maintenance Plugin by NiteoThemes plugin for WordPress i
CVE-2026-31317 None 0.02% 1 0 2026-04-18T01:03:38 Craftql v1.3.7 and before is vulnerable to Server-Side Request Forgery (SSRF) wh
CVE-2026-30778 7.5 0.04% 1 0 2026-04-16T22:57:33 The SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configurat
CVE-2026-33032 9.8 7.55% 1 3 template 2026-04-16T22:16:37.433000 Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and
CVE-2026-34197 8.8 59.64% 3 9 template 2026-04-16T21:49:17 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-40611 8.8 0.00% 1 0 2026-04-16T21:28:55 ### Summary The webroot HTTP-01 challenge provider in lego is vulnerable to arb
CVE-2026-40744 8.5 0.03% 1 0 2026-04-16T15:31:44 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-6349 None 0.95% 1 0 2026-04-16T03:31:13 The  iSherlock developed by HGiga  has an OS Command Injection vulnerability, al
CVE-2026-33807 9.1 0.02% 1 0 2026-04-16T01:03:26 ### Summary `@fastify/express` v4.0.4 contains a path handling bug in the `onRe
CVE-2026-40890 7.5 0.00% 2 0 2026-04-15T21:18:41 ### Summary Processing a malformed input containing a `<` character that is not
CVE-2026-40887 9.1 0.00% 2 0 template 2026-04-15T21:18:36 ## Summary An unauthenticated SQL injection vulnerability exists in the Vendure
CVE-2026-40884 9.8 0.00% 2 0 2026-04-15T21:18:16 ### Summary goshs contains an SFTP authentication bypass when the documented emp
CVE-2026-40879 7.5 0.00% 2 0 2026-04-15T21:14:55 ### Impact Attacker sends many small, valid JSON messages in one TCP frame → ha
CVE-2026-40870 7.5 0.00% 2 0 2026-04-15T21:14:50 ### Impact The root level `commentable` field in the API allows access to all co
CVE-2026-40869 7.5 0.00% 2 0 2026-04-15T21:14:45 ### Impact The vulnerability allows any registered and authenticated user to acc
CVE-2026-40868 8.1 0.00% 1 0 2026-04-15T21:14:40 kyverno’s apiCall servicecall helper implicitly injects `Authorization: Bearer .
CVE-2026-40784 8.1 0.05% 1 0 2026-04-15T18:31:56 Authorization Bypass Through User-Controlled Key vulnerability in Mahmudul Hasan
CVE-2026-40764 8.1 0.03% 1 0 2026-04-15T16:16:38.653000 Cross-Site Request Forgery (CSRF) vulnerability in Syed Balkhi Contact Form by W
CVE-2026-40745 7.6 0.04% 1 0 2026-04-15T16:16:38.480000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-34615 9.3 1.56% 1 0 2026-04-15T16:14:07.857000 Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserializati
CVE-2026-4145 7.8 0.01% 1 0 2026-04-15T15:31:50 During an internal security assessment, a potential vulnerability was discovered
CVE-2026-5617 8.8 0.05% 1 0 2026-04-15T09:16:33.210000 The Login as User plugin for WordPress is vulnerable to Privilege Escalation in
CVE-2025-32977 9.6 0.25% 1 0 2026-04-15T00:35:42.020000 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef
CVE-2026-27303 9.7 1.63% 1 0 2026-04-14T18:30:50 Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserializati
CVE-2026-6203 6.1 0.45% 1 0 template 2026-04-14T00:31:19 The User Registration & Membership plugin for WordPress is vulnerable to Open Re
CVE-2026-34621 9.7 8.71% 1 5 2026-04-13T18:31:44 Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by a
CVE-2023-21529 8.8 28.94% 1 0 2026-04-13T18:30:34 Microsoft Exchange Server Remote Code Execution Vulnerability
CVE-2026-6139 9.8 1.25% 1 0 2026-04-13T15:01:43.663000 A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This af
CVE-2026-6154 9.8 1.25% 1 0 2026-04-13T15:01:43.663000 A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th
CVE-2026-6158 7.3 4.86% 1 0 2026-04-13T15:01:43.663000 A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the fu
CVE-2026-6138 9.8 1.25% 1 0 2026-04-13T15:01:43.663000 A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted ele
CVE-2026-6141 6.3 1.23% 1 0 2026-04-13T03:30:31 A vulnerability was determined in danielmiessler Personal_AI_Infrastructure up t
CVE-2026-6140 9.8 0.33% 1 0 2026-04-13T03:30:29 A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts
CVE-2026-39987 None 6.99% 1 5 template 2026-04-09T19:06:18 ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal
CVE-2026-3055 9.8 43.35% 1 5 template 2026-03-31T13:18:14.213000 Insufficient input validation in NetScaler ADC and NetScaler Gateway when config
CVE-2026-21513 8.8 27.79% 1 0 2026-03-30T13:28:07.120000 Protection mechanism failure in MSHTML Framework allows an unauthorized attacker
CVE-2026-4368 0 0.01% 1 0 2026-03-24T15:54:09.400000 Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configur
CVE-2026-4440 8.8 0.03% 1 0 2026-03-20T19:27:12.970000 Out of bounds read and write in WebGL in Google Chrome prior to 146.0.7680.153 a
CVE-2026-32640 None 0.19% 1 0 2026-03-16T22:00:16 ### Impact If the objects passed in as `names` to SimpleEval have modules or oth
CVE-2025-26399 9.8 29.28% 1 1 2026-03-10T13:11:15.553000 SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxP
CVE-2021-22681 9.8 15.38% 1 0 2026-03-05T21:30:23 Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogi
CVE-2026-24884 8.4 0.01% 2 0 2026-02-27T20:27:32.587000 Compressing is a compressing and uncompressing lib for node. In version 2.0.0 an
CVE-2026-1731 9.8 81.50% 1 4 template 2026-02-17T13:40:10.320000 BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote
CVE-2026-21509 7.8 10.86% 1 12 2026-02-10T15:30:22 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2025-52691 10.0 86.67% 1 8 template 2026-01-26T21:31:34 Successful exploitation of the vulnerability could allow an unauthenticated atta
CVE-2025-0520 None 1.61% 2 0 2025-11-05T19:58:03 An unrestricted file upload vulnerability in ShowDoc caused by improper validati
CVE-2025-32976 8.8 0.37% 1 0 2025-11-03T21:35:11 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef
CVE-2025-32978 7.5 0.09% 1 0 2025-11-03T21:34:07 Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x bef
CVE-2023-33538 8.8 89.90% 5 2 2025-10-27T14:32:16.313000 TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to
CVE-2025-32463 9.4 38.49% 1 83 template 2025-10-22T00:34:26 Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswi
CVE-2019-1367 7.5 89.25% 1 1 2025-10-22T00:32:47 A remote code execution vulnerability exists in the way that the scripting engin
CVE-2018-1000500 8.1 0.56% 1 0 2025-06-09T16:15:27.847000 Busybox contains a Missing SSL certificate validation vulnerability in The "busy
CVE-2024-3721 6.3 80.06% 4 1 2024-04-13T12:30:30 A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classi
CVE-2026-40706 0 0.00% 2 0 N/A
CVE-2026-40905 0 0.00% 4 0 N/A
CVE-2026-40925 0 0.00% 2 0 N/A
CVE-2026-40911 0 0.00% 2 0 N/A
CVE-2026-40372 0 0.00% 2 0 N/A
CVE-2026-40903 0 0.00% 2 0 N/A
CVE-2026-41316 0 0.00% 1 0 N/A
CVE-2026-40568 0 0.00% 1 0 N/A
CVE-2026-40586 0 0.00% 1 0 N/A
CVE-2026-40588 0 0.00% 1 0 N/A
CVE-2026-40497 0 0.03% 1 0 N/A
CVE-2026-32311 0 0.21% 1 0 N/A
CVE-2026-33121 0 0.03% 1 0 N/A
CVE-2026-33084 0 0.03% 1 0 N/A
CVE-2026-33207 0 0.03% 1 0 N/A
CVE-2026-40900 0 0.03% 1 0 N/A
CVE-2026-39973 0 0.01% 1 0 N/A

CVE-2026-6784
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-22T00:32:48

2 posts

Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150.

thehackerwire@mastodon.social at 2026-04-21T21:10:58.000Z ##

🟠 CVE-2026-6784 - High (7.5)

Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fix...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:10:58.000Z ##

🟠 CVE-2026-6784 - High (7.5)

Memory safety bugs present in Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fix...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6772
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-22T00:32:44

2 posts

Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.

thehackerwire@mastodon.social at 2026-04-21T21:11:07.000Z ##

🟠 CVE-2026-6772 - High (7.5)

Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:11:07.000Z ##

🟠 CVE-2026-6772 - High (7.5)

Incorrect boundary conditions in the Libraries component in NSS. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, and Firefox ESR 140.10.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41064
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-04-22T00:16:28.187000

2 posts

WWBN AVideo is an open source video platform. In versions up to and including 29.0, an incomplete fix for AVideo's `test.php` adds `escapeshellarg` for wget but leaves the `file_get_contents` and `curl` code paths unsanitized, and the URL validation regex `/^http/` accepts strings like `httpevil[.]com`. Commit 78bccae74634ead68aa6528d631c9ec4fd7aa536 contains an updated fix.

offseq at 2026-04-22T00:00:39.193Z ##

🛑 CRITICAL: WWBN AVideo <=29.0 vulnerable to OS command injection (CVE-2026-41064, CVSS 9.3). Unauthenticated attackers can exploit weak URL validation to run arbitrary commands. No official patch — see commit for fix details. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-22T00:00:39.000Z ##

🛑 CRITICAL: WWBN AVideo <=29.0 vulnerable to OS command injection (CVE-2026-41064, CVSS 9.3). Unauthenticated attackers can exploit weak URL validation to run arbitrary commands. No official patch — see commit for fix details. radar.offseq.com/threat/cve-20 #OffSeq #CVE202641064 #infosec

##

CVE-2026-41060
(7.7 HIGH)

EPSS: 0.00%

updated 2026-04-21T23:16:21.250000

2 posts

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `isSSRFSafeURL()` function in `objects/functions.php` contains a same-domain shortcircuit (lines 4290-4296) that allows any URL whose hostname matches `webSiteRootURL` to bypass all SSRF protections. Because the check compares only the hostname and ignores the port, an attacker can reach arbitrary ports on the AVideo ser

thehackerwire@mastodon.social at 2026-04-21T23:21:56.000Z ##

🟠 CVE-2026-41060 - High (7.7)

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `isSSRFSafeURL()` function in `objects/functions.php` contains a same-domain shortcircuit (lines 4290-4296) that allows any URL whose hostname matches `webSiteRootURL` t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T23:21:56.000Z ##

🟠 CVE-2026-41060 - High (7.7)

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `isSSRFSafeURL()` function in `objects/functions.php` contains a same-domain shortcircuit (lines 4290-4296) that allows any URL whose hostname matches `webSiteRootURL` t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41058
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-21T23:16:21.117000

2 posts

WWBN AVideo is an open source video platform. In versions 29.0 and below, the incomplete fix for AVideo's CloneSite `deleteDump` parameter does not apply path traversal filtering, allowing `unlink()` of arbitrary files via `../../` sequences in the GET parameter. Commit 3c729717c26f160014a5c86b0b6accdbd613e7b2 contains an updated fix.

thehackerwire@mastodon.social at 2026-04-21T23:21:46.000Z ##

🟠 CVE-2026-41058 - High (8.1)

WWBN AVideo is an open source video platform. In versions 29.0 and below, the incomplete fix for AVideo's CloneSite `deleteDump` parameter does not apply path traversal filtering, allowing `unlink()` of arbitrary files via `../../` sequences in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T23:21:46.000Z ##

🟠 CVE-2026-41058 - High (8.1)

WWBN AVideo is an open source video platform. In versions 29.0 and below, the incomplete fix for AVideo's CloneSite `deleteDump` parameter does not apply path traversal filtering, allowing `unlink()` of arbitrary files via `../../` sequences in th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41056
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-21T23:16:20.850000

2 posts

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `allowOrigin($allowAll=true)` function in `objects/functions.php` reflects any arbitrary `Origin` header back in `Access-Control-Allow-Origin` along with `Access-Control-Allow-Credentials: true`. This function is called by both `plugin/API/get.json.php` and `plugin/API/set.json.php` — the primary API endpoints that handl

thehackerwire@mastodon.social at 2026-04-21T23:23:21.000Z ##

🟠 CVE-2026-41056 - High (8.1)

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `allowOrigin($allowAll=true)` function in `objects/functions.php` reflects any arbitrary `Origin` header back in `Access-Control-Allow-Origin` along with `Access-Control...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T23:23:21.000Z ##

🟠 CVE-2026-41056 - High (8.1)

WWBN AVideo is an open source video platform. In versions 29.0 and below, the `allowOrigin($allowAll=true)` function in `objects/functions.php` reflects any arbitrary `Origin` header back in `Access-Control-Allow-Origin` along with `Access-Control...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41055
(8.6 HIGH)

EPSS: 0.00%

updated 2026-04-21T23:16:20.707000

2 posts

WWBN AVideo is an open source video platform. In versions 29.0 and below, an incomplete SSRF fix in AVideo's LiveLinks proxy adds `isSSRFSafeURL()` validation but leaves DNS TOCTOU vulnerabilities where DNS rebinding between validation and the actual HTTP request redirects traffic to internal endpoints. Commit 8d8fc0cadb425835b4861036d589abcea4d78ee8 contains an updated fix.

thehackerwire@mastodon.social at 2026-04-21T23:22:07.000Z ##

🟠 CVE-2026-41055 - High (8.6)

WWBN AVideo is an open source video platform. In versions 29.0 and below, an incomplete SSRF fix in AVideo's LiveLinks proxy adds `isSSRFSafeURL()` validation but leaves DNS TOCTOU vulnerabilities where DNS rebinding between validation and the act...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T23:22:07.000Z ##

🟠 CVE-2026-41055 - High (8.6)

WWBN AVideo is an open source video platform. In versions 29.0 and below, an incomplete SSRF fix in AVideo's LiveLinks proxy adds `isSSRFSafeURL()` validation but leaves DNS TOCTOU vulnerabilities where DNS rebinding between validation and the act...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25917
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-21T22:50:36

1 posts

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.

thehackerwire@mastodon.social at 2026-04-20T20:09:57.000Z ##

🔴 CVE-2026-25917 - Critical (9.8)

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low.

Users are...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6832
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-21T22:16:21.040000

2 posts

Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the session_id parameter. Attackers can exploit unvalidated session identifiers to construct paths that bypass the SESSION_DIR boundary and delete writable JSON

thehackerwire@mastodon.social at 2026-04-21T22:36:50.000Z ##

🟠 CVE-2026-6832 - High (8.1)

Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the ses...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:36:50.000Z ##

🟠 CVE-2026-6832 - High (8.1)

Hermes WebUI contains an arbitrary file deletion vulnerability in the /api/session/delete endpoint that allows authenticated attackers to delete files outside the session directory by supplying an absolute path or path traversal payload in the ses...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40946
(0 None)

EPSS: 0.00%

updated 2026-04-21T22:16:20.230000

2 posts

Oxia is a metadata store and coordination system. Prior to 0.16.2, the OIDC authentication provider unconditionally sets SkipClientIDCheck: true in the go-oidc verifier configuration, disabling the standard audience (aud) claim validation at the library level. This allows tokens issued for unrelated services by the same OIDC issuer to be accepted by Oxia. This vulnerability is fixed in 0.16.2.

offseq at 2026-04-22T01:30:30.410Z ##

🔒 CVE-2026-40946 (CRITICAL, CVSS 9.2): oxia-db oxia < 0.16.2 improperly authenticates OIDC tokens, accepting tokens from other services. Upgrade to 0.16.2+ ASAP. No exploits seen. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-22T01:30:30.000Z ##

🔒 CVE-2026-40946 (CRITICAL, CVSS 9.2): oxia-db oxia < 0.16.2 improperly authenticates OIDC tokens, accepting tokens from other services. Upgrade to 0.16.2+ ASAP. No exploits seen. radar.offseq.com/threat/cve-20 #OffSeq #oxia #infosec #OIDC

##

CVE-2026-40933
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-04-21T22:16:19.383000

4 posts

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, due to unsafe serialization of stdio commands in the MCP adapter, an authenticated attacker can add an MCP stdio server with an arbitrary command, achieving command execution. The vulnerability lies in a bug in the input sanitization from the “Custom MCP” configuration in http://localhost:3000/

offseq at 2026-04-22T03:00:28.603Z ##

🚨 CRITICAL: CVE-2026-40933 in FlowiseAI Flowise (< 3.1.0) allows authenticated OS command injection via unsafe MCP adapter serialization. Upgrade to 3.1.0+ to fully mitigate. CVSS 10 — patch now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-21T22:51:48.000Z ##

🔴 CVE-2026-40933 - Critical (9.9)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, due to unsafe serialization of stdio commands in the MCP adapter, an authenticated attacker can add an MCP stdio server with an arbitrary comm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-22T03:00:28.000Z ##

🚨 CRITICAL: CVE-2026-40933 in FlowiseAI Flowise (< 3.1.0) allows authenticated OS command injection via unsafe MCP adapter serialization. Upgrade to 3.1.0+ to fully mitigate. CVSS 10 — patch now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #FlowiseAI #Cybersecurity

##

thehackerwire@mastodon.social at 2026-04-21T22:51:48.000Z ##

🔴 CVE-2026-40933 - Critical (9.9)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, due to unsafe serialization of stdio commands in the MCP adapter, an authenticated attacker can add an MCP stdio server with an arbitrary comm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40931
(8.4 HIGH)

EPSS: 0.00%

updated 2026-04-21T22:16:19.247000

2 posts

Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and 1.10.5, the patch for CVE-2026-24884 relies on a purely logical string validation within the isPathWithinParent utility. This check verifies if a resolved path string starts with the destination directory string but fails to account for the actual filesystem state. By exploiting this "Logical vs. Physical" divergence,

thehackerwire@mastodon.social at 2026-04-21T22:37:09.000Z ##

🟠 CVE-2026-40931 - High (8.4)

Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and 1.10.5, the patch for CVE-2026-24884 relies on a purely logical string validation within the isPathWithinParent utility. This check verifies if a resolved path string ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:37:09.000Z ##

🟠 CVE-2026-40931 - High (8.4)

Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and 1.10.5, the patch for CVE-2026-24884 relies on a purely logical string validation within the isPathWithinParent utility. This check verifies if a resolved path string ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31019
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:32:31

2 posts

In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can bypass this filtering, resulting in full remote code execution with the ability to execute arbitrary operating system commands on the server.

thehackerwire@mastodon.social at 2026-04-21T21:10:48.000Z ##

🟠 CVE-2026-31019 - High (8.8)

In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can byp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:10:48.000Z ##

🟠 CVE-2026-31019 - High (8.8)

In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can byp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35251
(7.6 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:31:36

2 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impa

thehackerwire@mastodon.social at 2026-04-21T22:01:34.000Z ##

🟠 CVE-2026-35251 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:34.000Z ##

🟠 CVE-2026-35251 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6823
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:31:36

2 posts

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the configured channel can bypass access controls and reach host-backed agent runtimes, potentially leading to unauthorized file disclosure and read access throu

thehackerwire@mastodon.social at 2026-04-21T21:59:59.000Z ##

🟠 CVE-2026-6823 - High (8.2)

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the conf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:59:59.000Z ##

🟠 CVE-2026-6823 - High (8.2)

HKUDS OpenHarness prior to PR #147 remediation contains an insecure default configuration vulnerability where remote channels inherit allow_from = ["*"] permitting arbitrary remote senders to pass admission checks. Attackers who can reach the conf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35243
(7.8 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:31:35

2 posts

Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Application Development Framework (ADF) executes to compromise Oracle Application Developmen

thehackerwire@mastodon.social at 2026-04-21T22:01:44.000Z ##

🟠 CVE-2026-35243 - High (7.8)

Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows low privi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:44.000Z ##

🟠 CVE-2026-35243 - High (7.8)

Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows low privi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41193
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-21T21:16:46.603000

1 posts

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, FreeScout's module installation feature extracts ZIP archives without validating file paths, allowing an authenticated admin to write files arbitrarily on the server filesystem via a specially crafted ZIP. Version 1.8.215 fixes the vulnerability.

thehackerwire@mastodon.social at 2026-04-21T18:54:50.000Z ##

🔴 CVE-2026-41193 - Critical (9.1)

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.215, FreeScout's module installation feature extracts ZIP archives without validating file paths, allowing an authenticated admin to write files arbitrarily on the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40909
(8.7 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:16:45.007000

2 posts

WWBN AVideo is an open source video platform. In versions 29.0 and prior, the locale save endpoint (`locale/save.php`) constructs a file path by directly concatenating `$_POST['flag']` into the path at line 30 without any sanitization. The `$_POST['code']` parameter is then written verbatim to that path via `fwrite()` at line 40. An admin attacker (or any user who can CSRF an admin, since no CSRF

thehackerwire@mastodon.social at 2026-04-21T21:00:10.000Z ##

🟠 CVE-2026-40909 - High (8.7)

WWBN AVideo is an open source video platform. In versions 29.0 and prior, the locale save endpoint (`locale/save.php`) constructs a file path by directly concatenating `$_POST['flag']` into the path at line 30 without any sanitization. The `$_POST...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:00:10.000Z ##

🟠 CVE-2026-40909 - High (8.7)

WWBN AVideo is an open source video platform. In versions 29.0 and prior, the locale save endpoint (`locale/save.php`) constructs a file path by directly concatenating `$_POST['flag']` into the path at line 30 without any sanitization. The `$_POST...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40906
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-04-21T21:16:44.697000

4 posts

Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by parameter in the ElectricSQL /v1/shape API is vulnerable to error-based SQL injection, allowing any authenticated user to read, write, and destroy the full contents of the underlying PostgreSQL database through crafted ORDER BY expressions. This vulnerability is fixed in 1.5.0.

thehackerwire@mastodon.social at 2026-04-21T22:03:11.000Z ##

🔴 CVE-2026-40906 - Critical (9.9)

Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by parameter in the ElectricSQL /v1/shape API is vulnerable to error-based SQL injection, allowing any authenticated user to read, write, and destroy the full contents of t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:31.000Z ##

🔴 CVE-2026-40906 - Critical (9.9)

Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by parameter in the ElectricSQL /v1/shape API is vulnerable to error-based SQL injection, allowing any authenticated user to read, write, and destroy the full contents of t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:03:11.000Z ##

🔴 CVE-2026-40906 - Critical (9.9)

Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by parameter in the ElectricSQL /v1/shape API is vulnerable to error-based SQL injection, allowing any authenticated user to read, write, and destroy the full contents of t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:31.000Z ##

🔴 CVE-2026-40906 - Critical (9.9)

Electric is a Postgres sync engine. From 1.1.12 to before 1.5.0, the order_by parameter in the ElectricSQL /v1/shape API is vulnerable to error-based SQL injection, allowing any authenticated user to read, write, and destroy the full contents of t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40613
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:16:42.843000

1 posts

Coturn is a free open source implementation of TURN and STUN Server. Prior to 4.10.0, the STUN/TURN attribute parsing functions in coturn perform unsafe pointer casts from uint8_t * to uint16_t * without alignment checks. When processing a crafted STUN message with odd-aligned attribute boundaries, this results in misaligned memory reads at ns_turn_msg.c. On ARM64 architectures (AArch64) with stri

thehackerwire@mastodon.social at 2026-04-21T19:58:13.000Z ##

🟠 CVE-2026-40613 - High (7.5)

Coturn is a free open source implementation of TURN and STUN Server. Prior to 4.10.0, the STUN/TURN attribute parsing functions in coturn perform unsafe pointer casts from uint8_t * to uint16_t * without alignment checks. When processing a crafted...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40589
(7.6 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:16:42.640000

1 posts

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.214, a low-privileged agent can edit a visible customer and add an email address already owned by a hidden customer in another mailbox. The server discloses the hidden customer’s name and profile URL in the success flash, reassigns the hidden email to the visible customer, and rebinds hidden-mailbox conversations fo

thehackerwire@mastodon.social at 2026-04-21T19:00:18.000Z ##

🟠 CVE-2026-40589 - High (7.6)

FreeScout is a free self-hosted help desk and shared mailbox. Prior to version 1.8.214, a low-privileged agent can edit a visible customer and add an email address already owned by a hidden customer in another mailbox. The server discloses the hid...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35246
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:16:40.677000

2 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impa

thehackerwire@mastodon.social at 2026-04-21T23:00:07.000Z ##

🟠 CVE-2026-35246 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T23:00:07.000Z ##

🟠 CVE-2026-35246 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35245
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:16:40.537000

2 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via RDP to compromise Oracle VM VirtualBox. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (c

thehackerwire@mastodon.social at 2026-04-21T22:59:57.000Z ##

🟠 CVE-2026-35245 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via RDP to compro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:59:57.000Z ##

🟠 CVE-2026-35245 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Easily exploitable vulnerability allows unauthenticated attacker with network access via RDP to compro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35242
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:16:40.120000

4 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impa

thehackerwire@mastodon.social at 2026-04-21T22:03:20.000Z ##

🟠 CVE-2026-35242 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:41.000Z ##

🟠 CVE-2026-35242 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:03:20.000Z ##

🟠 CVE-2026-35242 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:41.000Z ##

🟠 CVE-2026-35242 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35230
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:16:38.583000

2 posts

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impa

thehackerwire@mastodon.social at 2026-04-21T23:23:54.000Z ##

🟠 CVE-2026-35230 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T23:23:54.000Z ##

🟠 CVE-2026-35230 - High (7.5)

Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is 7.2.6. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35229
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-21T21:16:38.440000

2 posts

Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.30 and 21.3-21.21. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromise Java VM. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java VM accessible da

thehackerwire@mastodon.social at 2026-04-21T23:00:16.000Z ##

🟠 CVE-2026-35229 - High (7.5)

Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.30 and 21.3-21.21. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T23:00:16.000Z ##

🟠 CVE-2026-35229 - High (7.5)

Vulnerability in the Java VM component of Oracle Database Server. Supported versions that are affected are 19.3-19.30 and 21.3-21.21. Easily exploitable vulnerability allows unauthenticated attacker with network access via Oracle Net to compromi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40938
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-21T20:28:37

2 posts

## Summary The git resolver's `revision` parameter is passed directly as a positional argument to `git fetch` without any validation that it does not begin with a `-` character. Because git parses flags from mixed positional arguments, an attacker can inject arbitrary `git fetch` flags such as `--upload-pack=<binary>`. Combined with the `validateRepoURL` function explicitly permitting URLs that b

thehackerwire@mastodon.social at 2026-04-21T22:00:09.000Z ##

🟠 CVE-2026-40938 - High (7.5)

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to before 1.11.0, the git resolver's revision parameter is passed directly as a positional argument to git fetch without any validation that it d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:00:09.000Z ##

🟠 CVE-2026-40938 - High (7.5)

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to before 1.11.0, the git resolver's revision parameter is passed directly as a positional argument to git fetch without any validation that it d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6819
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-21T20:17:05.780000

2 posts

HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can remotely manage plugin trust and activation state, enabling unauthorized plugin installation and activation on the system.

thehackerwire@mastodon.social at 2026-04-21T20:59:59.000Z ##

🟠 CVE-2026-6819 - High (8.8)

HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T20:59:59.000Z ##

🟠 CVE-2026-6819 - High (8.8)

HKUDS OpenHarness prior to PR #156 remediation exposes plugin lifecycle commands including /plugin install, /plugin enable, /plugin disable, and /reload-plugins to remote senders by default. Attackers who gain access through the channel layer can ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33626
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-21T20:16:56.173000

1 posts

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networ

thehackerwire@mastodon.social at 2026-04-20T21:37:15.000Z ##

🟠 CVE-2026-33626 - High (7.5)

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40161
(7.7 HIGH)

EPSS: 0.00%

updated 2026-04-21T18:52:21

2 posts

### Summary The Tekton Pipelines git resolver in API mode sends the system-configured Git API token to a user-controlled `serverURL` when the user omits the `token` parameter. A tenant with TaskRun or PipelineRun create permission can exfiltrate the shared API token (GitHub PAT, GitLab token, etc.) by pointing `serverURL` to an attacker-controlled endpoint. ### Details The git resolver's `Resol

thehackerwire@mastodon.social at 2026-04-21T20:05:08.000Z ##

🟠 CVE-2026-40161 - High (7.7)

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to 1.10.0, the Tekton Pipelines git resolver in API mode sends the system-configured Git API token to a user-controlled serverURL when the user o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T20:05:08.000Z ##

🟠 CVE-2026-40161 - High (7.7)

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to 1.10.0, the Tekton Pipelines git resolver in API mode sends the system-configured Git API token to a user-controlled serverURL when the user o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31018
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-21T18:33:00

2 posts

In Dolibarr ERP & CRM <= 22.0.4, PHP code detection and editing permission enforcement in the Website module is not applied consistently to all input parameters, allowing an authenticated user restricted to HTML/JavaScript editing to inject PHP code through unprotected inputs during website page creation.

thehackerwire@mastodon.social at 2026-04-21T21:07:48.000Z ##

🟠 CVE-2026-31018 - High (8.8)

In Dolibarr ERP & CRM &lt;= 22.0.4, PHP code detection and editing permission enforcement in the Website module is not applied consistently to all input parameters, allowing an authenticated user restricted to HTML/JavaScript editing to inject PHP...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:07:48.000Z ##

🟠 CVE-2026-31018 - High (8.8)

In Dolibarr ERP & CRM &lt;= 22.0.4, PHP code detection and editing permission enforcement in the Website module is not applied consistently to all input parameters, allowing an authenticated user restricted to HTML/JavaScript editing to inject PHP...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15638
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-04-21T18:32:04

2 posts

Net::Dropbear versions before 0.14 for Perl contains a vulnerable version of libtomcrypt. Net::Dropbear versions before 0.14 includes versions of Dropbear 2019.78 or earlier. These include versions of libtomcrypt v1.18.1 or earlier, which is affected by CVE-2016-6129 and CVE-2018-12437.

thehackerwire@mastodon.social at 2026-04-21T21:07:38.000Z ##

🔴 CVE-2025-15638 - Critical (10)

Net::Dropbear versions before 0.14 for Perl contains a vulnerable version of libtomcrypt.

Net::Dropbear versions before 0.14 includes versions of Dropbear 2019.78 or earlier. These include versions of libtomcrypt v1.18.1 or earlier, which is affe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:07:38.000Z ##

🔴 CVE-2025-15638 - Critical (10)

Net::Dropbear versions before 0.14 for Perl contains a vulnerable version of libtomcrypt.

Net::Dropbear versions before 0.14 includes versions of Dropbear 2019.78 or earlier. These include versions of libtomcrypt v1.18.1 or earlier, which is affe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24189
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-21T18:32:04

3 posts

NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticated attacker could cause an out-of-bounds read by sending a maliciously crafted request. A successful exploit of this vulnerability might lead to denial of service and information disclosure.

thehackerwire@mastodon.social at 2026-04-21T20:05:31.000Z ##

🟠 CVE-2026-24189 - High (8.2)

NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticated attacker could cause an out-of-bounds read by sending a maliciously crafted request. A successful exploit of this vulnerability might lead to denial of service and inf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T20:05:31.000Z ##

🟠 CVE-2026-24189 - High (8.2)

NVIDIA CUDA-Q contains a vulnerability in an endpoint, where an unauthenticated attacker could cause an out-of-bounds read by sending a maliciously crafted request. A successful exploit of this vulnerability might lead to denial of service and inf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-21T15:58:05.000Z ##

* Broadcom has a new advisory for a high-severity vulnerability:

Output Management Web Viewer 12.1 Vulnerability in Microsoft JDBC Driver for SQL Server support.broadcom.com/web/ecx/s

* Two advisories from NVIDIA today:

- CVE-2026-24189: Security Bulletin: NVIDIA CUDA-Q - April 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24177 and CVE-2026-24176: NVIDIA KAI Scheduler - April 2026 nvidia.custhelp.com/app/answer

* Dell:

- High-severity: Security Update for Dell PowerProtect Data Domain Multiple Vulnerabilities dell.com/support/kbdoc/en-us/0 #broadcom #infosec #vulnerability #Dell #Nvidia #vulnerability

##

CVE-2026-40050
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-21T18:32:04

2 posts

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does not affect Next-Gen SIEM customers. The vulnerability exists in a specific cluster API endpoint that, if exposed, allows a remote attacker to read arbitrar

thehackerwire@mastodon.social at 2026-04-21T20:00:25.000Z ##

🔴 CVE-2026-40050 - Critical (9.8)

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T20:00:25.000Z ##

🔴 CVE-2026-40050 - Critical (9.8)

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5652
(9.0 CRITICAL)

EPSS: 0.00%

updated 2026-04-21T18:16:53.633000

1 posts

An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation.

thehackerwire@mastodon.social at 2026-04-21T18:59:58.000Z ##

🔴 CVE-2026-5652 - Critical (9)

An insecure direct object reference vulnerability in the Users API component of Crafty Controller allows a remote, authenticated attacker to perform user modification actions via improper API permissions validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40569
(9.0 CRITICAL)

EPSS: 0.00%

updated 2026-04-21T18:16:50.813000

1 posts

FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to 1.8.213 have a mass assignment vulnerability in the mailbox connection settings endpoints of FreeScout (`connectionIncomingSave()` at `app/Http/Controllers/MailboxesController.php:468` and `connectionOutgoingSave()` at line 398). Both methods pass `$request->all()` directly to `$mailbox->fill()` without any field allow

thehackerwire@mastodon.social at 2026-04-21T19:59:57.000Z ##

🔴 CVE-2026-40569 - Critical (9)

FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to 1.8.213 have a mass assignment vulnerability in the mailbox connection settings endpoints of FreeScout (`connectionIncomingSave()` at `app/Http/Controllers/MailboxesCo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40576
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-04-21T17:16:55.870000

2 posts

excel-mcp-server is a Model Context Protocol server for Excel file manipulation. A path traversal vulnerability exists in excel-mcp-server versions up to and including 0.1.7. When running in SSE or Streamable-HTTP transport mode (the documented way to use this server remotely), an unauthenticated attacker on the network can read, write, and overwrite arbitrary files on the host filesystem by suppl

thehackerwire@mastodon.social at 2026-04-21T20:00:06.000Z ##

🔴 CVE-2026-40576 - Critical (9.4)

excel-mcp-server is a Model Context Protocol server for Excel file manipulation. A path traversal vulnerability exists in excel-mcp-server versions up to and including 0.1.7. When running in SSE or Streamable-HTTP transport mode (the documented wa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T20:00:06.000Z ##

🔴 CVE-2026-40576 - Critical (9.4)

excel-mcp-server is a Model Context Protocol server for Excel file manipulation. A path traversal vulnerability exists in excel-mcp-server versions up to and including 0.1.7. When running in SSE or Streamable-HTTP transport mode (the documented wa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24177
(7.7 HIGH)

EPSS: 0.00%

updated 2026-04-21T17:16:23.787000

3 posts

NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API endpoints without authorization. A successful exploit of this vulnerability might lead to information disclosure.

thehackerwire@mastodon.social at 2026-04-21T20:05:20.000Z ##

🟠 CVE-2026-24177 - High (7.7)

NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API endpoints without authorization. A successful exploit of this vulnerability might lead to information disclosure.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T20:05:20.000Z ##

🟠 CVE-2026-24177 - High (7.7)

NVIDIA KAI Scheduler contains a vulnerability where an attacker could access API endpoints without authorization. A successful exploit of this vulnerability might lead to information disclosure.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-21T15:58:05.000Z ##

* Broadcom has a new advisory for a high-severity vulnerability:

Output Management Web Viewer 12.1 Vulnerability in Microsoft JDBC Driver for SQL Server support.broadcom.com/web/ecx/s

* Two advisories from NVIDIA today:

- CVE-2026-24189: Security Bulletin: NVIDIA CUDA-Q - April 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24177 and CVE-2026-24176: NVIDIA KAI Scheduler - April 2026 nvidia.custhelp.com/app/answer

* Dell:

- High-severity: Security Update for Dell PowerProtect Data Domain Multiple Vulnerabilities dell.com/support/kbdoc/en-us/0 #broadcom #infosec #vulnerability #Dell #Nvidia #vulnerability

##

CVE-2026-24176
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-04-21T17:16:23.603000

1 posts

NVIDIA KAI Scheduler contains a vulnerability where an attacker could cause improper authorization through cross-namespace pod references. A successful exploit of this vulnerability might lead to data tampering.

AAKL@infosec.exchange at 2026-04-21T15:58:05.000Z ##

* Broadcom has a new advisory for a high-severity vulnerability:

Output Management Web Viewer 12.1 Vulnerability in Microsoft JDBC Driver for SQL Server support.broadcom.com/web/ecx/s

* Two advisories from NVIDIA today:

- CVE-2026-24189: Security Bulletin: NVIDIA CUDA-Q - April 2026 nvidia.custhelp.com/app/answer

- CVE-2026-24177 and CVE-2026-24176: NVIDIA KAI Scheduler - April 2026 nvidia.custhelp.com/app/answer

* Dell:

- High-severity: Security Update for Dell PowerProtect Data Domain Multiple Vulnerabilities dell.com/support/kbdoc/en-us/0 #broadcom #infosec #vulnerability #Dell #Nvidia #vulnerability

##

CVE-2026-41285
(4.3 MEDIUM)

EPSS: 0.01%

updated 2026-04-21T16:20:24.180000

1 posts

In OpenBSD through 7.8, the slaacd and rad daemons have an infinite loop when they receive a crafted ICMPv6 Neighbor Discovery (ND) option (over a local network) with length zero, because of an "nd_opt_len * 8 - 2" expression with no preceding check for whether nd_opt_len is zero.

Nadsec@cyberplace.social at 2026-04-22T03:33:50.000Z ##

Another1 - CVE-2026-41285 - OpenBSD

nvd.nist.gov/vuln/detail/CVE-2

(Project asswing was not involved)

##

CVE-2026-41036
(0 None)

EPSS: 0.40%

updated 2026-04-21T16:20:24.180000

1 posts

This vulnerability exists in Quantum Networks router due to inadequate sanitization of user-supplied input in the management CLI interface. An authenticated remote attacker could exploit this vulnerability by injecting arbitrary OS commands on the targeted device. Successful exploitation of this vulnerability could allow the attacker to perform remote code execution with root privileges on the ta

offseq@infosec.exchange at 2026-04-21T10:30:29.000Z ##

🚨 HIGH severity alert: Quantum Networks QN-I-470 routers (6.1.1.B1) have a CLI OS command injection (CVE-2026-41036). Authenticated attackers can execute root commands remotely. Limit access & monitor systems. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #NetworkSecurity

##

CVE-2026-31368
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-21T16:20:24.180000

1 posts

AiAssistant is affected by type privilege bypass, successful exploitation of this vulnerability may affect service availability.

offseq@infosec.exchange at 2026-04-21T07:30:32.000Z ##

🚩 HIGH severity: CVE-2026-31368 in Honor AIAssistant (v90.0.12.010) enables privilege bypass and may disrupt service availability. No mitigation yet — review affected deployments. radar.offseq.com/threat/cve-20 #OffSeq #Honor #Vuln #Cybersecurity

##

CVE-2026-32604
(9.9 CRITICAL)

EPSS: 0.18%

updated 2026-04-21T16:20:24.180000

1 posts

Spinnaker is an open source, multi-cloud continuous delivery platform. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, a bad actor can execute arbitrary commands very simply on the clouddriver pods. This can expose credentials, remove files, or inject resources easily. Versions 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2 contain a patch. As a workaround, disable the gitrepo artifac

1 repos

https://github.com/ZeroPathAI/spinnaker-poc

thehackerwire@mastodon.social at 2026-04-20T21:37:26.000Z ##

🔴 CVE-2026-32604 - Critical (9.9)

Spinnaker is an open source, multi-cloud continuous delivery platform. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, a bad actor can execute arbitrary commands very simply on the clouddriver pods. This can expose credentials, re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6257
(9.1 CRITICAL)

EPSS: 0.24%

updated 2026-04-21T16:19:21.183000

2 posts

Vvveb CMS v1.0.8 contains a remote code execution vulnerability in its media management functionality where a missing return statement in the file rename handler allows authenticated attackers to rename files to blocked extensions .php or .htaccess. Attackers can exploit this logic flaw by first uploading a text file and renaming it to .htaccess to inject Apache directives that register PHP-execut

offseq@infosec.exchange at 2026-04-21T01:30:27.000Z ##

🚨 CRITICAL: CVE-2026-6257 in Vvveb CMS v1.0.8 enables RCE by renaming uploads to .php/.htaccess. No patch yet — restrict media mgmt & user access, monitor file changes! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RCE #WebSecurity

##

thehackerwire@mastodon.social at 2026-04-20T20:22:48.000Z ##

🔴 CVE-2026-6257 - Critical (9.1)

Vvveb CMS v1.0.8 contains a remote code execution vulnerability in its media management functionality where a missing return statement in the file rename handler allows authenticated attackers to rename files to blocked extensions .php or .htacces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30912
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-21T14:42:49.920000

1 posts

In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.

thehackerwire@mastodon.social at 2026-04-20T20:09:38.000Z ##

🟠 CVE-2026-30912 - High (7.5)

In case of SQL errors, exception/stack trace of errors was exposed in API even if "api/expose_stack_traces" was set to false. That could lead to exposing additional information to potential attacker. Users are recommended to upgrade to Apache Airf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25524
(8.1 HIGH)

EPSS: 0.07%

updated 2026-04-21T14:32:50

2 posts

PHP functions such as `getimagesize()`, `file_exists()`, and `is_readable()` can trigger deserialization when processing `phar://` stream wrapper paths. OpenMage LTS uses these functions with potentially controllable file paths during image validation and media handling. An attacker who can upload a malicious phar file (disguised as an image) and trigger one of these functions with a `phar://` pat

thehackerwire@mastodon.social at 2026-04-20T18:49:34.000Z ##

🟠 CVE-2026-25524 - High (8.1)

Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, PHP functions such as `g...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-20T18:46:10.000Z ##

🟠 CVE-2026-25524 - High (8.1)

Magento Long Term Support (LTS) is an unofficial, community-driven project provides an alternative to the Magento Community Edition e-commerce platform with a high level of backward compatibility. Prior to version 20.17.0, PHP functions such as `g...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33829
(4.3 MEDIUM)

EPSS: 0.03%

updated 2026-04-21T14:16:04.630000

2 posts

Exposure of sensitive information to an unauthorized actor in Windows Snipping Tool allows an unauthorized attacker to perform spoofing over a network.

hackerworkspace@infosec.exchange at 2026-04-21T19:14:38.000Z ##

Windows Snipping Tool NTLM Hash Leak CVE-2026-33829

hackingpassion.com/snipping-to

Read on HackerWorkspace: hackerworkspace.com/article/wi

#cybersecurity #vulnerability #exploit

##

bezpieka@infosec.exchange at 2026-04-19T10:39:16.000Z ##

CVE-2026-33829 - kolejny ciekawy błąd w Windowsie.
Jeżeli masz zainstalowane "Narzędzie Wycinanie" (a najprawdopodobniej masz) - wystarczy, że wejdziesz na spreparowaną stronę internetową, żeby Twoje hasło do Windowsa (hash NTLM) popłynęło na serwer atakującego.

##

CVE-2025-32975
(10.0 CRITICAL)

EPSS: 75.31%

updated 2026-04-21T14:09:39.213000

2 posts

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains an authentication bypass vulnerability that allows attackers to impersonate legitimate users without valid credentials. The vulnerability exists in the SSO authentication handling mechanism and can lead

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

cisakevtracker@mastodon.social at 2026-04-20T20:02:29.000Z ##

CVE ID: CVE-2025-32975
Vendor: Quest
Product: KACE Systems Management Appliance (SMA)
Date Added: 2026-04-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-32228
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-21T12:54:57.653000

1 posts

UI / API User with asset materialize permission could trigger dags they had no access to. Users are advised to migrate to Airflow version 3.2.0 that fixes the issue.

thehackerwire@mastodon.social at 2026-04-20T20:09:48.000Z ##

🟠 CVE-2026-32228 - High (7.5)

UI / API User with asset materialize permission could trigger dags they had no access to.
Users are advised to migrate to Airflow version 3.2.0 that fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20133
(6.5 MEDIUM)

EPSS: 1.97%

updated 2026-04-21T12:48:33.263000

2 posts

A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file system access restrictions. An attacker could exploit this vulnerability by accessing the API of an affected system. A successful exploit could allow the attacker to read sensitive information on the

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

cisakevtracker@mastodon.social at 2026-04-20T20:01:11.000Z ##

CVE ID: CVE-2026-20133
Vendor: Cisco
Product: Catalyst SD-WAN Manager
Date Added: 2026-04-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2023-27351
(7.5 HIGH)

EPSS: 87.73%

updated 2026-04-21T12:48:26.657000

3 posts

This vulnerability allows remote attackers to bypass authentication on affected installations of PaperCut NG 22.0.5 (Build 63914). Authentication is not required to exploit this vulnerability. The specific flaw exists within the SecurityRequestFilter class. The issue results from improper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authenti

Nuclei template

kev_Stalker@infosec.exchange at 2026-04-21T19:09:38.000Z ##

CVE-2023-27351 - Changed to Known Ransomware Status

PaperCut NG/MF Improper Authentication VulnerabilityVendor: PaperCutProduct: NG/MFPaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: April 21, 2026 at 18:00:35 UTCDate Added nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

cisakevtracker@mastodon.social at 2026-04-20T20:01:43.000Z ##

CVE ID: CVE-2023-27351
Vendor: PaperCut
Product: NG/MF
Date Added: 2026-04-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-20122
(5.4 MEDIUM)

EPSS: 1.12%

updated 2026-04-21T11:59:56.777000

2 posts

A vulnerability in the API of Cisco Catalyst SD-WAN Manager could allow an authenticated, remote attacker to overwrite arbitrary files on the local file system. To exploit this vulnerability, the attacker must have valid read-only credentials with API access on the affected system. This vulnerability is due to improper file handling on the API interface of an affected system. An attacker could

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

cisakevtracker@mastodon.social at 2026-04-20T20:00:56.000Z ##

CVE ID: CVE-2026-20122
Vendor: Cisco
Product: Catalyst SD-WAN Manger
Date Added: 2026-04-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-5965
(9.8 CRITICAL)

EPSS: 6.34%

updated 2026-04-21T06:30:32

1 posts

NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, allowing unauthenticated local attackers to inject arbitrary OS commands and execute them on the server.

offseq@infosec.exchange at 2026-04-21T04:30:27.000Z ##

🚨 NewSoftOA faces a critical OS command injection (CVE-2026-5965, CVSS 9.3). Unauthenticated local attackers can run arbitrary OS commands. No patch yet — restrict access & monitor vendor updates! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vuln

##

CVE-2025-2749
(7.2 HIGH)

EPSS: 13.66%

updated 2026-04-20T21:32:42

2 posts

An authenticated remote code execution in Kentico Xperience allows authenticated users Staging Sync Server to upload arbitrary data to path relative locations. This results in path traversal and arbitrary file upload, including content that can be executed server side leading to remote code execution.This issue affects Kentico Xperience through 13.0.178.

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

cisakevtracker@mastodon.social at 2026-04-20T20:01:27.000Z ##

CVE ID: CVE-2025-2749
Vendor: Kentico
Product: Kentico Xperience
Date Added: 2026-04-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-48700
(6.1 MEDIUM)

EPSS: 34.51%

updated 2026-04-20T21:32:42

2 posts

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 and 10.1. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, specifically involving crafted ta

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

cisakevtracker@mastodon.social at 2026-04-20T20:01:58.000Z ##

CVE ID: CVE-2025-48700
Vendor: Synacor
Product: Zimbra Collaboration Suite (ZCS)
Date Added: 2026-04-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-6249
(8.8 HIGH)

EPSS: 0.10%

updated 2026-04-20T21:31:52

1 posts

Vvveb CMS 1.0.8 contains a remote code execution vulnerability in its media upload handler that allows authenticated attackers to execute arbitrary operating system commands by uploading a PHP webshell with a .phtml extension. Attackers can bypass the extension deny-list and upload malicious files to the publicly accessible media directory, then request the file over HTTP to achieve full server co

thehackerwire@mastodon.social at 2026-04-20T20:23:07.000Z ##

🟠 CVE-2026-6249 - High (8.8)

Vvveb CMS 1.0.8 contains a remote code execution vulnerability in its media upload handler that allows authenticated attackers to execute arbitrary operating system commands by uploading a PHP webshell with a .phtml extension. Attackers can bypass...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39110
(8.2 HIGH)

EPSS: 0.12%

updated 2026-04-20T21:31:45

1 posts

SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the contactno parameter of the forgot password page (forgot-password.php). This allows an unauthenticated attacker to manipulate backend SQL queries during authentication and retrieve sensitive database contents.

thehackerwire@mastodon.social at 2026-04-20T20:00:37.000Z ##

🟠 CVE-2026-39110 - High (8.2)

SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the contactno parameter of the forgot password page (forgot-password.php). This allows an unauthenticated attacker to manipulate backe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30269
(9.9 CRITICAL)

EPSS: 0.04%

updated 2026-04-20T21:31:44

1 posts

Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The `role` field is accepted by the update model without a manage_users permission check for self-updates, enabling privilege escalation to high-privileged roles.

thehackerwire@mastodon.social at 2026-04-20T20:04:26.000Z ##

🔴 CVE-2026-30269 - Critical (9.9)

Improper access control in Doorman v0.1.0 and v1.0.2 allows any authenticated user to update their own account role to a non-admin privileged role via /platform/user/{username}. The `role` field is accepted by the update model without a manage_use...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-27199
(7.3 HIGH)

EPSS: 92.02%

updated 2026-04-20T21:31:38

3 posts

In JetBrains TeamCity before 2023.11.4 path traversal allowing to perform limited admin actions was possible

Nuclei template

3 repos

https://github.com/Stuub/RCity-CVE-2024-27198

https://github.com/W01fh4cker/CVE-2024-27198-RCE

https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198-

kev_Stalker@infosec.exchange at 2026-04-21T19:04:18.000Z ##

CVE-2024-27199 - Changed to Known Ransomware Status

JetBrains TeamCity Relative Path Traversal VulnerabilityVendor: JetBrainsProduct: TeamCityJetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: April 21, 2026 at 18:00:35 UTCDate Added to KEV: 2026-04-20View CVE Details

nvd.nist.gov/vuln/detail/CVE-2

#Ransomware

##

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

cisakevtracker@mastodon.social at 2026-04-20T20:02:44.000Z ##

CVE ID: CVE-2024-27199
Vendor: JetBrains
Product: TeamCity
Date Added: 2026-04-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-20128
(7.6 HIGH)

EPSS: 0.06%

updated 2026-04-20T21:31:38

2 posts

A vulnerability in the Data Collection Agent (DCA) feature of Cisco Catalyst SD-WAN Manager could allow an authenticated, local attacker to gain DCA user privileges on an affected system. To exploit this vulnerability, the attacker must have valid&nbsp;vmanage credentials on the affected system. This vulnerability is due to the presence of a credential file for the DCA user on an affected system.

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

cisakevtracker@mastodon.social at 2026-04-20T20:02:13.000Z ##

CVE ID: CVE-2026-20128
Vendor: Cisco
Product: Catalyst SD-WAN Manager
Date Added: 2026-04-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-5478
(8.1 HIGH)

EPSS: 0.02%

updated 2026-04-20T20:16:48.800000

1 posts

The Everest Forms plugin for WordPress is vulnerable to Arbitrary File Read and Deletion in all versions up to, and including, 3.4.4. This is due to the plugin trusting attacker-controlled old_files data from public form submissions as legitimate server-side upload state, and converting attacker-supplied URLs into local filesystem paths using regex-based string replacement without canonicalization

thehackerwire@mastodon.social at 2026-04-20T20:22:58.000Z ##

🟠 CVE-2026-5478 - High (8.1)

The Everest Forms plugin for WordPress is vulnerable to Arbitrary File Read and Deletion in all versions up to, and including, 3.4.4. This is due to the plugin trusting attacker-controlled old_files data from public form submissions as legitimate ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6248
(8.1 HIGH)

EPSS: 0.39%

updated 2026-04-20T19:16:11.230000

1 posts

The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3.0.5. This is due to two compounding flaws: the Members::update() method does not validate or restrict the value of file-type custom profile fields, allowing authenticated users to store an arbitrary path instead of a legitimate upload path; and the wpforo_fix_upload_dir() sanitization f

thehackerwire@mastodon.social at 2026-04-20T20:00:13.000Z ##

🟠 CVE-2026-6248 - High (8.1)

The wpForo Forum plugin for WordPress is vulnerable to Arbitrary File Deletion in versions up to and including 3.0.5. This is due to two compounding flaws: the Members::update() method does not validate or restrict the value of file-type custom pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39109
(9.4 CRITICAL)

EPSS: 0.17%

updated 2026-04-20T19:16:10.733000

1 posts

SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 within the username parameter of the login page (index.php). This allows an unauthenticated attacker to manipulate backend SQL queries during authentication and retrieve sensitive database contents.

thehackerwire@mastodon.social at 2026-04-20T20:00:24.000Z ##

🔴 CVE-2026-39109 - Critical (9.4)

SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 within the username parameter of the login page (index.php). This allows an unauthenticated attacker to manipulate backend SQL queries du...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32956
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-20T19:05:30.750000

2 posts

SD-330AC and AMC Manager provided by silex technology, Inc. contain a heap-based buffer overflow vulnerability in processing the redirect URLs. Arbitrary code may be executed on the device.

thehackerwire@mastodon.social at 2026-04-20T19:09:31.000Z ##

🔴 CVE-2026-32956 - Critical (9.8)

SD-330AC and AMC Manager provided by silex technology, Inc. contain a heap-based buffer overflow vulnerability in processing the redirect URLs. Arbitrary code may be executed on the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-20T04:30:27.000Z ##

⚠️ CRITICAL: CVE-2026-32956 — Heap buffer overflow in silex SD-330AC (≤v1.42) & AMC Manager. Remote code execution possible. No patch yet; restrict exposure, monitor advisories. radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #CVE202632956 #Vuln

##

CVE-2026-32965
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-20T19:05:30.750000

1 posts

Initialization of a resource with an insecure default vulnerability exists in SD-330AC and AMC Manager provided by silex technology, Inc. When the affected device is connected to the network with the initial (factory-default) configuration, the device can be configured with the null string password.

thehackerwire@mastodon.social at 2026-04-20T19:09:21.000Z ##

🟠 CVE-2026-32965 - High (7.5)

Initialization of a resource with an insecure default vulnerability exists in SD-330AC and AMC Manager provided by silex technology, Inc. When the affected device is connected to the network with the initial (factory-default) configuration, the de...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5966
(8.1 HIGH)

EPSS: 0.31%

updated 2026-04-20T19:05:30.750000

1 posts

ThreatSonar Anti-Ransomware developed by TeamT5 has an Arbitrary File Deletion vulnerability. Authenticated remote attackers with web access can exploit Path Traversal to delete arbitrary files on the system.

thehackerwire@mastodon.social at 2026-04-20T19:07:00.000Z ##

🟠 CVE-2026-5966 - High (8.1)

ThreatSonar Anti-Ransomware developed by TeamT5 has an Arbitrary File Deletion vulnerability. Authenticated remote attackers with web access can exploit Path Traversal to delete arbitrary files on the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39454
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-20T19:05:30.750000

1 posts

SKYSEA Client View and SKYMEC IT Manager provided by Sky Co.,LTD. configure the installation folder with improper file access permission settings. A non-administrative user may manipulate and/or place arbitrary files within the installation folder of the product. As a result, arbitrary code may be executed with the administrative privilege.

thehackerwire@mastodon.social at 2026-04-20T19:06:51.000Z ##

🟠 CVE-2026-39454 - High (7.8)

SKYSEA Client View and SKYMEC IT Manager provided by Sky Co.,LTD. configure the installation folder with improper file access permission settings. A non-administrative user may manipulate and/or place arbitrary files within the installation folder...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33557
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-04-20T19:05:30.750000

1 posts

A possible security vulnerability has been identified in Apache Kafka. By default, the broker property `sasl.oauthbearer.jwt.validator.class` is set to `org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator`. It accepts any JWT token without validating its signature, issuer, or audience. An attacker can generate a JWT token from any issuer with the `preferred_username` set to any user,

thehackerwire@mastodon.social at 2026-04-20T18:59:21.000Z ##

🔴 CVE-2026-33557 - Critical (9.1)

A possible security vulnerability has been identified in Apache Kafka.

By default, the broker property `sasl.oauthbearer.jwt.validator.class` is set to `org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator`. It accepts any JWT token ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3517
(8.4 HIGH)

EPSS: 0.14%

updated 2026-04-20T19:05:30.750000

1 posts

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “Geo Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'addcountry' command

thehackerwire@mastodon.social at 2026-04-20T18:55:49.000Z ##

🟠 CVE-2026-3517 - High (8.4)

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “Geo Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4048
(8.4 HIGH)

EPSS: 0.14%

updated 2026-04-20T19:05:30.750000

1 posts

OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a custom WAF rule file during the file upload process.

1 repos

https://github.com/Astaruf/CVE-2026-40487

thehackerwire@mastodon.social at 2026-04-20T18:55:40.000Z ##

🟠 CVE-2026-4048 - High (8.4)

OS Command Injection Remote Code Execution Vulnerability in UI in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in a cust...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41445
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-20T19:05:30.750000

1 posts

KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr.c where the allocation size calculation dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) overflows signed 32-bit integer arithmetic before being widened to size_t, causing malloc() to allocate an undersized buffer. Attackers can trigger heap buffer overflow by providing crafted d

thehackerwire@mastodon.social at 2026-04-20T18:45:14.000Z ##

🟠 CVE-2026-41445 - High (8.8)

KissFFT before commit 8a8e66e contains an integer overflow vulnerability in the kiss_fftndr_alloc() function in kiss_fftndr.c where the allocation size calculation dimOther*(dimReal+2)*sizeof(kiss_fft_scalar) overflows signed 32-bit integer arith...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24467
(9.0 CRITICAL)

EPSS: 0.18%

updated 2026-04-20T19:03:07.607000

5 posts

OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.0.0 and prior to version 2.0.13, OpenAEV's password reset implementation contains multiple security weaknesses that together allow reliable account takeover. The primary issue is that password reset tokens do not expire. Once a token is genera

Matchbook3469@mastodon.social at 2026-04-21T23:07:51.000Z ##

🔴 New security advisory:

CVE-2026-24467 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #VulnerabilityManagement #CyberSec

##

offseq@infosec.exchange at 2026-04-21T03:00:28.000Z ##

🚨 CRITICAL: OpenAEV-Platform (<2.0.13) uses non-expiring, 8-digit password reset tokens. Unauthenticated attackers can take over any account — including admins. Upgrade to 2.0.13 ASAP. CVE-2026-24467 radar.offseq.com/threat/cve-20 #OffSeq #Vuln #AppSec #PasswordSecurity

##

thehackerwire@mastodon.social at 2026-04-20T18:54:10.000Z ##

🔴 CVE-2026-24467 - Critical (9)

OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.0.0 and prior to version 2.0.13, OpenAEV's password reset implementation contains multiple...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-20T18:47:34.000Z ##

🔴 CVE-2026-24467 - Critical (9)

OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.0.0 and prior to version 2.0.13, OpenAEV's password reset implementation contains multiple...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-20T18:46:55.000Z ##

🔴 CVE-2026-24467 - Critical (9)

OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.0.0 and prior to version 2.0.13, OpenAEV's password reset implementation contains multiple...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40321
(8.0 HIGH)

EPSS: 0.04%

updated 2026-04-20T19:03:07.607000

1 posts

DNN (formerly DotNetNuke) is an open-source web content management platform (CMS) in the Microsoft ecosystem. Prior to version 10.2.2, a user could upload a specially crafted SVG file that could include scripts that can target both authenticated and unauthenticated DNN users. The impact is increased if the scripts are run by a power user. Version 10.2.2 patches the issue.

pentesttools@infosec.exchange at 2026-04-21T13:20:41.000Z ##

New research from Matei "Mal" Bădănoiu (Pentest-Tools.com):

Stored XSS to RCE in DNN Platform (DotNetNuke), CVE-2026-40321.

SVG upload with javascript: in an <a href> bypasses the filter. The /API/personaBar/ConfigConsole/UpdateConfigFile endpoint writes an ASPX backdoor to the web root. whoami → iis apppool, Potato your way to SYSTEM.

Delivery: DNN's own internal messaging. No external infra.

pentest-tools.com/blog/dotnetn

#RedTeam #InfoSec #CVE #AppSec

##

CVE-2026-25058
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-20T19:03:07.607000

1 posts

Vexa is an open-source, self-hostable meeting bot API and meeting transcription API. Prior to 0.10.0-260419-1910, the Vexa transcription-collector service exposes an internal endpoint `GET /internal/transcripts/{meeting_id}` that returns transcript data for any meeting without any authentication or authorization checks. An unauthenticated attacker can enumerate all meeting IDs, access any user's m

thehackerwire@mastodon.social at 2026-04-20T18:47:44.000Z ##

🟠 CVE-2026-25058 - High (7.5)

Vexa is an open-source, self-hostable meeting bot API and meeting transcription API. Prior to 0.10.0-260419-1910, the Vexa transcription-collector service exposes an internal endpoint `GET /internal/transcripts/{meeting_id}` that returns transcrip...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41242
(0 None)

EPSS: 0.05%

updated 2026-04-20T19:03:07.607000

2 posts

protobufjs compiles protobuf definitions into JavaScript (JS) functions. In versions prior to 8.0.1 and 7.5.5, attackers can inject arbitrary code in the "type" fields of protobuf definitions, which will then execute during object decoding using that definition. Versions 8.0.1 and 7.5.5 patch the issue.

beyondmachines1@infosec.exchange at 2026-04-19T10:01:10.000Z ##

Critical Remote Code Execution Vulnerability Discovered in Protobuf.js Library

Protobuf.js patched a critical remote code execution vulnerability (CVE-2026-41242) caused by unsafe dynamic code generation when processing malicious protobuf schemas. The flaw allows attackers to execute arbitrary JavaScript code on servers or developer machines, potentially exposing sensitive credentials and enabling lateral movement.

**If your applications use protobuf.js (or libraries like gRPC, Firebase, or Google Cloud SDKs), update protobuf.js to version 8.0.1 or 7.5.5 ASAP. Run npm audit to catch hidden dependencies. Going forward, only load schemas you control and prefer precompiled static schemas in production to avoid this class of attack entirely.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-04-19T06:00:29.000Z ##

🚨 CRITICAL: CVE-2026-41242 in protobuf.js (<7.5.5, 8.0.0-experimental <8.0.1) allows code injection via "type" fields — remote code execution possible. Upgrade to 7.5.5 or 8.0.1+ now! radar.offseq.com/threat/cve-20 #OffSeq #infosec #protobuff #CVE202641242

##

CVE-2026-40342
(9.9 CRITICAL)

EPSS: 0.08%

updated 2026-04-20T19:03:07.607000

1 posts

Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, the external engine plugin loader concatenates a user-supplied engine name into a filesystem path without filtering path separators or .. components. An authenticated user with CREATE FUNCTION privileges can use a crafted ENGINE name to load an arbitrary shared library from anywhere on t

CVE-2026-40324
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-20T19:03:07.607000

1 posts

Hot Chocolate is an open-source GraphQL server. Prior to versions 12.22.7, 13.9.16, 14.3.1, and 15.1.14, Hot Chocolate's recursive descent parser `Utf8GraphQLParser` has no recursion depth limit. A crafted GraphQL document with deeply nested selection sets, object values, list values, or list types can trigger a `StackOverflowException` on payloads as small as 40 KB. Because `StackOverflowExceptio

offseq@infosec.exchange at 2026-04-18T10:30:29.000Z ##

🚨 CRITICAL: CVE-2026-40324 in ChilliCream Hot Chocolate allows attackers to crash GraphQL workers via deeply nested queries (StackOverflowException). Denial of service risk. Patch to 12.22.7, 13.9.16, 14.3.1, 15.1.14. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202640324 #GraphQL #DoS

##

CVE-2026-40582
(0 None)

EPSS: 0.11%

updated 2026-04-20T18:59:46.333000

1 posts

ChurchCRM is an open-source church management system. In versions prior to 7.2.0, the /api/public/user/login endpoint validates only the username and password before returning the user's API key, bypassing the normal authentication flow that enforces account lockout and two-factor authentication checks. An attacker with knowledge of a user's password can obtain API access even when the account is

offseq@infosec.exchange at 2026-04-18T09:00:30.000Z ##

🚨 CVE-2026-40582: ChurchCRM < 7.2.0 has a CRITICAL auth bypass (CVSS 9.1). /api/public/user/login lets attackers with a password skip lockout & 2FA to get API access. Upgrade to 7.2.0+ ASAP. radar.offseq.com/threat/cve-20 #OffSeq #ChurchCRM #CVE202640582 #infosec

##

CVE-2026-39111
(7.5 HIGH)

EPSS: 0.07%

updated 2026-04-20T18:51:43.663000

1 posts

SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the email parameter of the forgot password page (forgot-password.php). This allows an unauthenticated attacker to manipulate backend SQL queries and retrieve sensitive user data.

thehackerwire@mastodon.social at 2026-04-20T18:40:09.000Z ##

🟠 CVE-2026-39111 - High (7.5)

SQL Injection vulnerability in Apartment Visitors Management System Apartment Visitors Management System V1.1 in the email parameter of the forgot password page (forgot-password.php). This allows an unauthenticated attacker to manipulate backend S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30898
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-20T18:32:51

1 posts

An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any of their own DAGs have adopted this incorrect advice.

thehackerwire@mastodon.social at 2026-04-20T19:11:09.000Z ##

🟠 CVE-2026-30898 - High (8.8)

An example of BashOperator in Airflow documentation suggested a way of passing dag_run.conf in the way that could cause unsanitized user input to be used to escalate privileges of UI user to allow execute code on worker. Users should review if any...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34427
(8.8 HIGH)

EPSS: 0.30%

updated 2026-04-20T18:31:55

2 posts

Vvveb prior to 1.0.8.1 contains a privilege escalation vulnerability in the admin user profile save endpoint that allows authenticated users to modify privileged fields on their own profile. Attackers can inject role_id=1 into profile save requests to escalate to Super Administrator privileges, enabling plugin upload functionality for remote code execution.

thehackerwire@mastodon.social at 2026-04-20T18:54:00.000Z ##

🟠 CVE-2026-34427 - High (8.8)

Vvveb prior to 1.0.8.1 contains a privilege escalation vulnerability in the admin user profile save endpoint that allows authenticated users to modify privileged fields on their own profile. Attackers can inject role_id=1 into profile save reques...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-20T18:46:30.000Z ##

🟠 CVE-2026-34427 - High (8.8)

Vvveb prior to 1.0.8.1 contains a privilege escalation vulnerability in the admin user profile save endpoint that allows authenticated users to modify privileged fields on their own profile. Attackers can inject role_id=1 into profile save reques...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26944
(8.8 HIGH)

EPSS: 0.14%

updated 2026-04-20T18:31:55

1 posts

Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.6, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60 contain a missing authentication for critical function vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution with root privileges. Exploitation

thehackerwire@mastodon.social at 2026-04-20T18:46:45.000Z ##

🟠 CVE-2026-26944 - High (8.8)

Dell PowerProtect Data Domain, versions 7.7.1.0 through 8.6, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.60 contain a missing authentication for critical function vulnerability. An unauthentic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34428
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-20T18:31:55

1 posts

Vvveb prior to 1.0.8.1 contains a server-side request forgery vulnerability in the oEmbedProxy action of the editor/editor module where the url parameter is passed directly to getUrl() via curl without scheme or destination validation. Authenticated backend users can supply file:// URLs to read arbitrary files readable by the web server process or http:// URLs targeting internal network addresses

thehackerwire@mastodon.social at 2026-04-20T18:46:35.000Z ##

🟠 CVE-2026-34428 - High (7.7)

Vvveb prior to 1.0.8.1 contains a server-side request forgery vulnerability in the oEmbedProxy action of the editor/editor module where the url parameter is passed directly to getUrl() via curl without scheme or destination validation. Authentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30266
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-20T18:31:55

1 posts

Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.7 and before allows a local attacker to execute arbitrary code via a crafted file

thehackerwire@mastodon.social at 2026-04-20T18:45:24.000Z ##

🟠 CVE-2026-30266 - High (7.8)

Insecure Permissions vulnerability in DeepCool DeepCreative v.1.2.7 and before allows a local attacker to execute arbitrary code via a crafted file

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5760
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-04-20T18:31:48

4 posts

SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().

1 repos

https://github.com/Stuub/SGLang-0.5.9-RCE

beyondmachines1@infosec.exchange at 2026-04-21T09:01:48.000Z ##

Critical RCE Vulnerability in SGLang AI Framework via Malicious GGUF Models

SGLang disclosed a critical RCE vulnerability CVE-2026-5760 caused by unsandboxed Jinja2 template rendering in its reranking endpoint. Attackers can exploit this by tricking users into loading malicious GGUF model files that run arbitrary Python code.

**If you run SGLang for serving LLMs, treat it as unsafe right now: restrict the API to trusted internal networks only, run it in a non-privileged container, and do not load any GGUF models from public repositories like Hugging Face until the maintainers release a patch. As a temporary fix, have your team manually patch the source to use Jinja2's ImmutableSandboxedEnvironment instead of the default environment.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

hackerworkspace@infosec.exchange at 2026-04-21T06:24:52.000Z ##

GitHub - Stuub/SGLang-0.5.9-RCE: Proof of Concept exploitation of CVE-2026-5760 - RCE in SGLang 0.5.9 via malicious GGUF

github.com/Stuub/SGLang-0.5.9-

Read on HackerWorkspace: hackerworkspace.com/article/gi

#cybersecurity #aisecurity #vulnerability

##

LLMs@activitypub.awakari.com at 2026-04-21T00:48:17.000Z ## Critical SGLang Vulnerability Enables Remote Code Execution A critical security vulnerability in the SGLang framework, tracked as CVE-2026-5760, could allow attackers to execute arbitrary code on v...

#Security #AI #Security #cybersecurity #remote #code #execution #SGLang #vulnerability

Origin | Interest | Match ##

thehackerwire@mastodon.social at 2026-04-20T18:47:55.000Z ##

🔴 CVE-2026-5760 - Critical (9.8)

SGLang's reranking endpoint (/v1/rerank) achieves Remote Code Execution (RCE) when a model file containing a malcious tokenizer.chat_template is loaded, as the Jinja2 chat templates are rendered using an unsandboxed jinja2.Environment().

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39918
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-04-20T18:31:48

3 posts

Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where the subdir POST parameter is written unsanitized into the env.php configuration file without escaping or validation. Attackers can inject arbitrary PHP code by breaking out of the string context in the define statement to achieve unauthenticated remote code execution as the web server user.

offseq@infosec.exchange at 2026-04-21T06:00:28.000Z ##

⚠️ CRITICAL: CVE-2026-39918 in givanz Vvveb <1.0.8.1 allows unauth RCE via code injection in the installation endpoint (unsanitized subdir param). Restrict access, monitor for updates, and deploy WAF rules. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RCE #PHP

##

thehackerwire@mastodon.social at 2026-04-20T18:53:50.000Z ##

🔴 CVE-2026-39918 - Critical (9.8)

Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where the subdir POST parameter is written unsanitized into the env.php configuration file without escaping or validation. Attackers can inject arbitrary ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-20T18:46:20.000Z ##

🔴 CVE-2026-39918 - Critical (9.8)

Vvveb prior to 1.0.8.1 contains a code injection vulnerability in the installation endpoint where the subdir POST parameter is written unsanitized into the env.php configuration file without escaping or validation. Attackers can inject arbitrary ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40901
(8.8 HIGH)

EPSS: 0.32%

updated 2026-04-20T16:46:41.137000

1 posts

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below ship the legacy velocity-1.7.jar, which pulls in commons-collections-3.2.1.jar containing the InvokerTransformer deserialization gadget chain. Quartz 2.3.2, also bundled in the application, deserializes job data BLOBs from the qrtz_job_details table using ObjectInputStream with no deserialization filte

thehackerwire@mastodon.social at 2026-04-20T20:32:01.000Z ##

🟠 CVE-2026-40901 - High (8.8)

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below ship the legacy velocity-1.7.jar, which pulls in commons-collections-3.2.1.jar containing the InvokerTransformer deserialization gadget chain. Quartz ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33122
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-04-20T16:40:39.070000

1 posts

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the API datasource update process. When a new table definition is added during a datasource update via /de2api/datasource/update, the deTableName field from the user-submitted configuration is passed to DatasourceSyncManage.createEngineTable, where it is substit

thehackerwire@mastodon.social at 2026-04-20T20:32:10.000Z ##

🔴 CVE-2026-33122 - Critical (9.8)

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the API datasource update process. When a new table definition is added during a datasource update via /de2ap...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6284
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-04-20T16:16:50.357000

1 posts

An attacker with network access to the PLC is able to brute force discover passwords to gain unauthorized access to systems and services. The limited password complexity and no password input limiters makes brute force password enumeration possible.

threatnoir@infosec.exchange at 2026-04-18T17:08:30.000Z ##

⚠️ CRITICAL: Horner Automation Cscape and XL4, XL7 PLC

Horner Automation Cscape v10.0, XL4 PLC v16.32.0, and XL7 PLC v15.60 contain a critical password brute-force vulnerability (CVE-2026-6284, CVSS 9.1) with no rate limiting. This affects manufacturing environments globally and allows unauthenticated network attackers to compromise PLCs controlling cr…

threatnoir.com/focus

#infosec #cybersecurity

##

CVE-2026-40459
(8.8 HIGH)

EPSS: 0.12%

updated 2026-04-20T15:32:59

1 posts

PAC4J is vulnerable to LDAP Injection in multiple methods. A low-privileged remote attacker can inject crafted LDAP syntax into ID-based search parameters, potentially resulting in unauthorized LDAP queries and arbitrary directory operations. This issue was fixed in PAC4J versions 4.5.10, 5.7.10 and 6.4.1

thehackerwire@mastodon.social at 2026-04-20T20:16:32.000Z ##

🟠 CVE-2026-40459 - High (8.8)

PAC4J is vulnerable to LDAP Injection in multiple methods. A low-privileged remote attacker can inject crafted LDAP syntax into ID-based search parameters, potentially resulting in unauthorized LDAP queries and arbitrary directory operations.

Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3519
(8.5 HIGH)

EPSS: 0.14%

updated 2026-04-20T15:31:58

1 posts

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “VS Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'aclcontrol' command

thehackerwire@mastodon.social at 2026-04-20T18:59:12.000Z ##

🟠 CVE-2026-3519 - High (8.4)

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “VS Administration” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3518
(8.5 HIGH)

EPSS: 0.14%

updated 2026-04-20T15:31:58

1 posts

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the 'killsession' command

thehackerwire@mastodon.social at 2026-04-20T18:55:59.000Z ##

🟠 CVE-2026-3518 - High (8.4)

OS Command Injection Remote Code Execution Vulnerability in API in Progress ADC Products allows an authenticated attacker with “All” permissions to execute arbitrary commands on the LoadMaster appliance by exploiting unsanitized input in the '...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34018
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-04-20T14:44:35.410000

1 posts

An SQL injection vulnerability exists in CubeCart prior to 6.6.0, which may allow an attacker to execute an arbitrary SQL statement on the product.

thehackerwire@mastodon.social at 2026-04-20T20:16:52.000Z ##

🔴 CVE-2026-34018 - Critical (9.8)

An SQL injection vulnerability exists in CubeCart prior to 6.6.0, which may allow an attacker to execute an arbitrary SQL statement on the product.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4747
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-20T13:47:31.163000

1 posts

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerabl

2 repos

https://github.com/kaleth4/CVE-2026-4747

https://github.com/kaleth4/CVE-2026-4747-

CVE-2026-6632
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-20T12:32:07

1 posts

A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component httpd. The manipulation of the argument menufacturer/Go leads to buffer overflow. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-04-20T19:03:11.000Z ##

🟠 CVE-2026-6632 - High (8.8)

A vulnerability was identified in Tenda F451 1.0.0.7_cn_svn7958. The affected element is the function fromSafeClientFilter of the file /goform/SafeClientFilter of the component httpd. The manipulation of the argument menufacturer/Go leads to buffe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6631
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-20T12:32:07

1 posts

A vulnerability was determined in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. Executing a manipulation of the argument page can lead to buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-20T19:03:02.000Z ##

🟠 CVE-2026-6631 - High (8.8)

A vulnerability was determined in Tenda F451 1.0.0.7_cn_svn7958. Impacted is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. Executing a manipulation of the argument page can lead to buffer ov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6630
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-20T11:16:19.407000

1 posts

A vulnerability was found in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-20T18:59:31.000Z ##

🟠 CVE-2026-6630 - High (8.8)

A vulnerability was found in Tenda F451 1.0.0.7_cn_svn7958. This issue affects the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5964
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-20T09:30:51

2 posts

EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

thehackerwire@mastodon.social at 2026-04-20T19:09:12.000Z ##

🔴 CVE-2026-5964 - Critical (9.8)

EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-20T09:00:29.000Z ##

⚠️ CVE-2026-5964: Digiwin EasyFlow .NET (6.1.*, 6.6.*, 8.1.1) has a CRITICAL SQL injection flaw. Unauthenticated attackers can access or alter DB data. Patch status unknown — check the vendor. Deploy WAFs & monitor activity! radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Infosec

##

CVE-2026-5963
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-20T09:30:51

2 posts

EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

thehackerwire@mastodon.social at 2026-04-20T19:07:10.000Z ##

🔴 CVE-2026-5963 - Critical (9.8)

EasyFlow .NET developed by Digiwin has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-20T10:30:30.000Z ##

🚨 CRITICAL: SQL Injection (CVE-2026-5963) in Digiwin EasyFlow .NET (6.1.*, 6.6.*, 8.1.1) allows unauthenticated attackers DB access & control. No patch yet — restrict exposure & monitor closely. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Vuln

##

CVE-2026-5967
(8.8 HIGH)

EPSS: 0.12%

updated 2026-04-20T09:30:51

1 posts

ThreatSonar Anti-Ransomware developed by TeamT5 has an Privilege Escalation vulnerability. Authenticated remote attackers with shell access can inject OS commands and execute them with root privileges.

thehackerwire@mastodon.social at 2026-04-20T19:03:21.000Z ##

🟠 CVE-2026-5967 - High (8.8)

ThreatSonar Anti-Ransomware developed by TeamT5 has an Privilege Escalation vulnerability. Authenticated remote attackers with shell access can inject OS commands and execute them with root privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6644(CVSS UNKNOWN)

EPSS: 0.73%

updated 2026-04-20T09:30:51

1 posts

A command injection vulnerability was found in the PPTP VPN Clients on the ADM. The vulnerability allows an administrative user to break out of the restricted web environment and execute arbitrary code on the underlying operating system. This occurs due to insufficient validation of user-supplied input before it is passed to a system shell. Successful exploitation allows an attacker to achieve Rem

offseq@infosec.exchange at 2026-04-20T07:30:29.000Z ##

🔥 CRITICAL: CVE-2026-6644 in ASUSTOR ADM PPTP VPN Clients (4.1.0 – 5.1.2.REO1) enables admin OS command injection (CVSS 9.4). Restrict admin access & monitor for patches. Full compromise risk. Details: radar.offseq.com/threat/cve-20 #OffSeq #ASUSTOR #Vuln #RCE

##

CVE-2026-32955
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-20T06:31:33

2 posts

SD-330AC and AMC Manager provided by silex technology, Inc. contain a stack-based buffer overflow vulnerability in processing the redirect URLs. Arbitrary code may be executed on the device.

thehackerwire@mastodon.social at 2026-04-20T19:10:49.000Z ##

🟠 CVE-2026-32955 - High (8.8)

SD-330AC and AMC Manager provided by silex technology, Inc. contain a stack-based buffer overflow vulnerability in processing the redirect URLs. Arbitrary code may be executed on the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-20T06:00:27.000Z ##

⚠️ CVE-2026-32955: HIGH severity stack-based buffer overflow in silex SD-330AC (≤v1.42). Attackers with low privileges can execute code via redirect URLs. Restrict access & monitor devices until patch is available. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity

##

CVE-2026-6597
(2.7 LOW)

EPSS: 0.01%

updated 2026-04-20T03:34:43

1 posts

A weakness has been identified in langflow-ai langflow up to 1.8.3. Impacted is the function remove_api_keys/has_api_terms of the file src/backend/base/langflow/api/utils/core.py of the component Flow Using API. This manipulation causes unprotected storage of credentials. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks. The vend

offseq@infosec.exchange at 2026-04-20T03:00:28.000Z ##

🛡️ CVE-2026-6597 (CVSS 5.1, MEDIUM): langflow-ai langflow v1.8.0 – 1.8.3 stores credentials without protection in Flow Using API. Public exploit available. Restrict access & rotate credentials until patched. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Langflow

##

CVE-2026-6591
(4.3 MEDIUM)

EPSS: 0.04%

updated 2026-04-20T03:34:42

1 posts

A flaw has been found in ComfyUI up to 0.13.0. Affected is the function folder_paths.get_annotated_filepath of the file folder_paths.py of the component LoadImage Node. This manipulation of the argument Name causes path traversal. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond i

offseq@infosec.exchange at 2026-04-20T01:30:28.000Z ##

MEDIUM severity alert: CVE-2026-6591 – Path traversal in ComfyUI <=0.13.0 (LoadImage Node, folder_paths.py). Exploit public, vendor silent. Assess exposure & monitor for fixes. radar.offseq.com/threat/cve-20 #OffSeq #ComfyUI #Vuln #ThreatIntel

##

CVE-2026-6581
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-20T00:30:19

2 posts

A vulnerability was detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the function SetMobileAPInfoById of the file /goform/aspForm. Performing a manipulation of the argument param results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in an

thehackerwire@mastodon.social at 2026-04-20T19:10:59.000Z ##

🟠 CVE-2026-6581 - High (8.8)

A vulnerability was detected in H3C Magic B1 up to 100R004. Affected by this vulnerability is the function SetMobileAPInfoById of the file /goform/aspForm. Performing a manipulation of the argument param results in buffer overflow. Remote exploita...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-20T00:00:38.000Z ##

🚩 H3C Magic B1 devices ≤100R004 hit by HIGH severity buffer overflow (CVE-2026-6581). Public exploit code out, no vendor patch yet. Restrict management interface access & monitor /goform/aspForm activity. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #InfoSec

##

CVE-2026-6572
(5.6 MEDIUM)

EPSS: 0.01%

updated 2026-04-19T15:30:24

1 posts

A security vulnerability has been detected in Collabora KodExplorer up to 4.52. Affected by this issue is some unknown functionality of the file /app/controller/share.class.php of the component fileUpload Endpoint. The manipulation of the argument fileUpload leads to improper authorization. Remote exploitation of the attack is possible. The attack's complexity is rated as high. The exploitation is

offseq@infosec.exchange at 2026-04-19T16:30:12.000Z ##

🔔 CVE-2026-6572: Collabora KodExplorer (4.0 – 4.52) has a MEDIUM improper authorization bug in fileUpload. High attack complexity, no patch, vendor silent. Restrict endpoint access & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Cybersecurity

##

CVE-2026-6573
(6.3 MEDIUM)

EPSS: 0.01%

updated 2026-04-19T15:30:18

1 posts

A vulnerability was detected in PHPEMS 11.0. This affects the function temppage of the file /app/exam/controller/exams.master.php of the component Instant Exam Creation Handler. The manipulation of the argument uploadfile results in server-side request forgery. The attack can be executed remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-04-19T13:30:29.000Z ##

🚩 SSRF alert: CVE-2026-6573 in PHPEMS 11.0 (MEDIUM, CVSS 5.3) affects /app/exam/controller/exams.master.php via uploadfile argument. Exploit is public — review exposure! radar.offseq.com/threat/cve-20 #OffSeq #PHPEMS #SSRF #Vuln

##

CVE-2026-6574
(7.3 HIGH)

EPSS: 0.04%

updated 2026-04-19T14:16:11.593000

1 posts

A vulnerability has been found in osuuu LightPicture up to 1.2.2. This issue affects some unknown processing of the file /public/install/lp.sql of the component API Upload Endpoint. Such manipulation of the argument key leads to hard-coded credentials. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this di

offseq@infosec.exchange at 2026-04-19T15:00:11.000Z ##

📢 CVE-2026-6574 (MEDIUM): osuuu LightPicture 1.2.0 – 1.2.2 has hard-coded credentials in API Upload Endpoint (/public/install/lp.sql). No vendor patch yet. Restrict endpoint access & monitor for misuse. More info: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #AppSec

##

CVE-2026-6570
(2.7 LOW)

EPSS: 0.01%

updated 2026-04-19T12:31:16

1 posts

A security flaw has been discovered in kodcloud KodExplorer up to 4.52. Affected is the function initInstall of the file /app/controller/systemMember.class.php. Performing a manipulation of the argument path results in authorization bypass. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclo

offseq@infosec.exchange at 2026-04-19T12:00:28.000Z ##

CVE-2026-6570 (MEDIUM): kodcloud KodExplorer (v4.0 – 4.52) suffers an auth bypass in initInstall, allowing remote unauthorized access. No fix yet — restrict access & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #KodExplorer #Infosec

##

CVE-2026-6568
(7.3 HIGH)

EPSS: 0.09%

updated 2026-04-19T12:31:16

1 posts

A vulnerability was determined in kodcloud KodExplorer up to 4.52. This affects the function share.class.php::initShareOld of the file /app/controller/share.class.php of the component Public Share Handler. This manipulation of the argument path causes path traversal. The attack can be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early ab

offseq@infosec.exchange at 2026-04-19T10:30:27.000Z ##

CVE-2026-6568: MEDIUM severity path traversal in kodcloud KodExplorer (v4.0 – 4.52). Public exploit released; vendor nonresponsive. Review and restrict public shares, monitor for abuse. More: radar.offseq.com/threat/cve-20 #OffSeq #infosec #vulnerability #websecurity

##

CVE-2026-6563
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-19T09:30:21

2 posts

A vulnerability has been found in H3C Magic B1 up to 100R004. The affected element is the function SetAPWifiorLedInfoById of the file /goform/aspForm. The manipulation of the argument param leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond i

thehackerwire@mastodon.social at 2026-04-19T10:00:11.000Z ##

🟠 CVE-2026-6563 - High (8.8)

A vulnerability has been found in H3C Magic B1 up to 100R004. The affected element is the function SetAPWifiorLedInfoById of the file /goform/aspForm. The manipulation of the argument param leads to buffer overflow. It is possible to initiate the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-19T09:00:29.000Z ##

🚨 CVE-2026-6563: HIGH severity buffer overflow in H3C Magic B1 ≤100R004 (SetAPWifiorLedInfoById, /goform/aspForm). Public exploit out, vendor silent. Audit exposure, restrict access! radar.offseq.com/threat/cve-20 #OffSeq #vuln #infosec #routers

##

CVE-2026-6560
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-19T07:16:05.973000

2 posts

A security vulnerability has been detected in H3C Magic B0 up to 100R002. This vulnerability affects the function Edit_BasicSSID of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any wa

thehackerwire@mastodon.social at 2026-04-19T08:00:14.000Z ##

🟠 CVE-2026-6560 - High (8.8)

A security vulnerability has been detected in H3C Magic B0 up to 100R002. This vulnerability affects the function Edit_BasicSSID of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack can be execu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-19T07:30:28.000Z ##

⚠️ HIGH-severity buffer overflow (CVE-2026-6560) in H3C Magic B0 (100R002) allows remote code execution or DoS via Edit_BasicSSID in /goform/aspForm. No patch yet; restrict access & monitor updates. radar.offseq.com/threat/cve-20 #OffSeq #H3C #Vuln #BufferOverflow

##

CVE-2026-0868
(6.4 MEDIUM)

EPSS: 0.01%

updated 2026-04-19T04:16:10.670000

1 posts

The EMC – Easily Embed Calendly Scheduling Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's calendly shortcode in all versions up to, and including, 4.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web

offseq@infosec.exchange at 2026-04-19T04:30:28.000Z ##

MEDIUM severity alert: CVE-2026-0868 (CVSS 6.4) in EMC – Easily Embed Calendly Scheduling WP plugin (≤4.4) allows contributor-level XSS attacks. No patch yet — restrict access, monitor updates. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec #XSS

##

CVE-2026-2986
(6.4 MEDIUM)

EPSS: 0.01%

updated 2026-04-18T12:30:17

1 posts

The Contextual Related Posts plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'other_attributes' parameter in versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user

1 repos

https://github.com/amanyadav78/CVE-2026-29861

offseq@infosec.exchange at 2026-04-19T01:30:27.000Z ##

🛡️ CVE-2026-2986: MEDIUM severity Stored XSS in Contextual Related Posts plugin (≤4.2.1) for WordPress. Contributor+ users can inject scripts — risk to all page viewers. Restrict access & monitor for patches. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS #Infosec

##

CVE-2026-2505
(5.4 MEDIUM)

EPSS: 0.01%

updated 2026-04-18T10:16:12.823000

1 posts

The Categories Images plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 3.3.1, via the 'z_taxonomy_image' shortcode. This is due to the shortcode rendering path passing attacker-controlled class input into a fallback image builder that concatenates HTML attributes without proper escaping. This makes it possible for authenticated attackers, with Con

2 repos

https://github.com/Christbowel/CVE-2026-25050

https://github.com/yadhukrishnam/CVE-2026-25053

offseq@infosec.exchange at 2026-04-19T03:00:27.000Z ##

🛡️ CVE-2026-2505: MEDIUM severity stored XSS in Categories Images plugin (≤3.3.1) lets Contributor+ users inject scripts via the 'class' attribute. Restrict access & watch for a patch. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS #Vuln

##

CVE-2026-6518
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-18T06:30:19

1 posts

The CMP – Coming Soon & Maintenance Plugin by NiteoThemes plugin for WordPress is vulnerable to arbitrary file upload and remote code execution in all versions up to, and including, 4.1.16 via the `cmp_theme_update_install` AJAX action. This is due to the function only checking for the `publish_pages` capability (available to Editors and above) instead of `manage_options` (Administrators only), co

offseq@infosec.exchange at 2026-04-19T00:00:38.000Z ##

🔥 HIGH severity: CVE-2026-6518 affects niteo CMP – Coming Soon & Maintenance Plugin (≤4.1.16). Authenticated Admins can trigger RCE via malicious ZIP uploads. No patch yet — restrict admin access & monitor logs. More: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #RCE #Vuln

##

CVE-2026-31317(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-04-18T01:03:38

1 posts

Craftql v1.3.7 and before is vulnerable to Server-Side Request Forgery (SSRF) which allows an attacker to execute arbitrary code via the vendor/markhuot/craftql/src/Listeners/GetAssetsFieldSchema.php file.

thehackerwire@mastodon.social at 2026-04-20T20:16:42.000Z ##

🟠 CVE-2026-31317 - High (7.5)

Craftql v1.3.7 and before is vulnerable to Server-Side Request Forgery (SSRF) which allows an attacker to execute arbitrary code via the vendor/markhuot/craftql/src/Listeners/GetAssetsFieldSchema.php file

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30778
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-16T22:57:33

1 posts

The SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information of MySQL/PostgreSQL. This issue affects Apache SkyWalking: from 9.7.0 through 10.3.0. Users are recommended to upgrade to version 10.4.0, which fixes the issue.

thehackerwire@mastodon.social at 2026-04-19T08:00:57.000Z ##

🟠 CVE-2026-30778 - High (7.5)

The SkyWalking OAP /debugging/config/dump endpoint may leak sensitive configuration information of MySQL/PostgreSQL.

This issue affects Apache SkyWalking: from 9.7.0 through 10.3.0.

Users are recommended to upgrade to version 10.4.0, which fixes...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33032
(9.8 CRITICAL)

EPSS: 7.55%

updated 2026-04-16T22:16:37.433000

1 posts

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware t

Nuclei template

3 repos

https://github.com/Shreda/CVE-2026-33032-nginx-ui-vuln-lab

https://github.com/keraattin/CVE-2026-33032

https://github.com/Twinson333/cve-2026-33032-scanner

hackmag@infosec.exchange at 2026-04-20T08:30:02.000Z ##

⚪️ Critical Vulnerability in Nginx UI Allows Full Server Takeover

🗨️ Information security researchers have warned that a critical vulnerability in the popular Nginx web server management tool (nginx-ui) is being actively exploited by attackers and allows for complete server takeover. The issue has been assigned the identifier CVE-2026-33032 (9.8 on…

🔗 hackmag.com/news/nginx-ui?utm_

#news

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 59.64%

updated 2026-04-16T21:49:17

3 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

9 repos

https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

https://github.com/hg0434hongzh0/CVE-2026-34197

https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-

https://github.com/0xBlackash/CVE-2026-34197

https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197

https://github.com/DEVSECURITYSPRO/CVE-2026-34197

https://github.com/dinosn/CVE-2026-34197

https://github.com/Catherines77/ActiveMQ-EXPtools

https://github.com/keraattin/CVE-2026-34197

hackerworkspace@infosec.exchange at 2026-04-21T16:03:58.000Z ##

CVE-2026-34197 ActiveMQ RCE via Jolokia API

horizon3.ai/attack-research/di

Read on HackerWorkspace: hackerworkspace.com/article/cv

#cybersecurity #vulnerability #exploit

##

threatnoir@infosec.exchange at 2026-04-20T18:09:48.000Z ##

⚠️ CRITICAL: CVE-2026-34197: 13-Year-Old Apache ActiveMQ RCE via Jolokia API Surfaces for In-the-Wild Attacks

Apache ActiveMQ Classic has a 13-year-old RCE vulnerability (CVE-2026-34197) in the Jolokia API that is actively exploited in the wild. Attackers chain vm:// URIs with remote Spring XML configs to execute arbitrary code as the broker process. Any organization running ActiveMQ Classic without the Ap…

threatnoir.com/focus

#infosec #cybersecurity

##

threatnoir@infosec.exchange at 2026-04-20T03:30:06.000Z ##

2026-W16 — Weekly Threat Roundup

🚨 Critical Apache ActiveMQ flaw (CVE-2026-34197) actively exploited after 13-year dormancy, now on CISA KEV catalog
🏛️ Operation PowerOFF dismantles 53 DDoS-for-hire domains, arrests 4, exposes 3M criminal accounts across 21 countries
🔍 Three Windows zero-days (BlueHammer, RedSun, UnDefend) acti…

threatnoir.com/weekly/2026-w16

#infosec #cybersecurity #threatintel

##

CVE-2026-40611
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-16T21:28:55

1 posts

### Summary The webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challenge token containing `../` sequences, causing lego to write attacker-influenced content to any path writable by the lego process. ### Details The `ChallengePath()` function in `challenge/http01/http_challenge.go:26-

thehackerwire@mastodon.social at 2026-04-21T18:55:00.000Z ##

🟠 CVE-2026-40611 - High (8.8)

Let's Encrypt client and ACME library written in Go (Lego). Prior to 4.34.0, the webroot HTTP-01 challenge provider in lego is vulnerable to arbitrary file write and deletion via path traversal. A malicious ACME server can supply a crafted challen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40744
(8.5 HIGH)

EPSS: 0.03%

updated 2026-04-16T15:31:44

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Beaver Builder Beaver Builder beaver-builder-lite-version allows Blind SQL Injection.This issue affects Beaver Builder: from n/a through <= 2.10.1.2.

thehackerwire@mastodon.social at 2026-04-19T07:00:12.000Z ##

🟠 CVE-2026-40744 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Beaver Builder Beaver Builder beaver-builder-lite-version allows Blind SQL Injection.This issue affects Beaver Builder: from n/a through &lt;= 2....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6349(CVSS UNKNOWN)

EPSS: 0.95%

updated 2026-04-16T03:31:13

1 posts

The  iSherlock developed by HGiga  has an OS Command Injection vulnerability, allowing unauthenticated local attackers to inject arbitrary OS commands and execute them on the server.

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33807
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-04-16T01:03:26

1 posts

### Summary `@fastify/express` v4.0.4 contains a path handling bug in the `onRegister` function that causes middleware paths to be doubled when inherited by child plugins. This results in complete bypass of Express middleware security controls for all routes defined within child plugin scopes that share a prefix with parent-scoped middleware. No special configuration is required — this affects th

thehackerwire@mastodon.social at 2026-04-19T08:02:14.000Z ##

🔴 CVE-2026-33807 - Critical (9.1)

@fastify/express v4.0.4 and earlier contains a path handling bug in the onRegister function that causes middleware paths to be doubled when inherited by child plugins. When a child plugin is registered with a prefix that matches a middleware path,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40890
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-15T21:18:41

2 posts

### Summary Processing a malformed input containing a `<` character that is not followed by a `>` character anywhere in the remaining text with a SmartypantsRenderer will lead to Out of Bounds read or a panic. ### Details The `smartLeftAngle()` function in `html/smartypants.go:367-376` performs an out-of-bounds slice operation when processing a `<` character that is not followed by a `>` charac

thehackerwire@mastodon.social at 2026-04-21T21:01:19.000Z ##

🟠 CVE-2026-40890 - High (7.5)

The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Processing a malformed input containing a < character that is not followed by a > character anywhere in the remaining text with a Smartyp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:01:19.000Z ##

🟠 CVE-2026-40890 - High (7.5)

The package `github.com/gomarkdown/markdown` is a Go library for parsing Markdown text and rendering as HTML. Processing a malformed input containing a < character that is not followed by a > character anywhere in the remaining text with a Smartyp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40887
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-15T21:18:36

2 posts

## Summary An unauthenticated SQL injection vulnerability exists in the Vendure Shop API. A user-controlled query string parameter is interpolated directly into a raw SQL expression without parameterization or validation, allowing an attacker to execute arbitrary SQL against the database. This affects all supported database backends (PostgreSQL, MySQL/MariaDB, SQLite). The Admin API is also affe

Nuclei template

thehackerwire@mastodon.social at 2026-04-21T21:01:10.000Z ##

🔴 CVE-2026-40887 - Critical (9.1)

Vendure is an open-source headless commerce platform. Starting in version 1.7.4 and prior to versions 2.3.4, 3.5.7, and 3.6.2, an unauthenticated SQL injection vulnerability exists in the Vendure Shop API. A user-controlled query string parameter ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:01:10.000Z ##

🔴 CVE-2026-40887 - Critical (9.1)

Vendure is an open-source headless commerce platform. Starting in version 1.7.4 and prior to versions 2.3.4, 3.5.7, and 3.6.2, an unauthenticated SQL injection vulnerability exists in the Vendure Shop API. A user-controlled query string parameter ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40884
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-15T21:18:16

2 posts

### Summary goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with `-b ':pass'` together with `-sftp`, goshs accepts that configuration but does not install any SFTP password handler. As a result, an unauthenticated network attacker can connect to the SFTP service and access files without a password. I reproduced thi

thehackerwire@mastodon.social at 2026-04-21T21:00:20.000Z ##

🔴 CVE-2026-40884 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accept...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:00:20.000Z ##

🔴 CVE-2026-40884 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs contains an SFTP authentication bypass when the documented empty-username basic-auth syntax is used. If the server is started with -b ':pass' together with -sftp, goshs accept...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40879
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-15T21:14:55

2 posts

### Impact Attacker sends many small, valid JSON messages in one TCP frame → handleData() recurses once per message; buffer shrinks each call → maxBufferSize is never reached; call stack overflows instead → A ~47 KB payload is sufficient to trigger RangeError ### Patches Fixed in `@nestjs/microservices@11.1.19` ### References Discovered by https://github.com/hwpark6804-gif

thehackerwire@mastodon.social at 2026-04-21T21:01:45.000Z ##

🟠 CVE-2026-40879 - High (7.5)

Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.19, when an attacker sends many small, valid JSON messages in one TCP frame, handleData() recurses once per message; the buffer shrinks each call. maxBufferS...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:01:45.000Z ##

🟠 CVE-2026-40879 - High (7.5)

Nest is a framework for building scalable Node.js server-side applications. Prior to 11.1.19, when an attacker sends many small, valid JSON messages in one TCP frame, handleData() recurses once per message; the buffer shrinks each call. maxBufferS...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40870
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-15T21:14:50

2 posts

### Impact The root level `commentable` field in the API allows access to all commentable resources within the platform, without any permission checks. All Decidim instances are impacted that have not secured the `/api` endpoint. The `/api` endpoint is publicly available with the default configuration. ### Patches Not available ### Workarounds To mitigate the issue, you can limit the scope to on

thehackerwire@mastodon.social at 2026-04-21T21:02:05.000Z ##

🟠 CVE-2026-40870 - High (7.5)

Decidim is a participatory democracy framework. Starting in version 0.0.1 and prior to versions 0.30.5 and 0.31.1, the root level `commentable` field in the API allows access to all commentable resources within the platform, without any permission...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:02:05.000Z ##

🟠 CVE-2026-40870 - High (7.5)

Decidim is a participatory democracy framework. Starting in version 0.0.1 and prior to versions 0.30.5 and 0.31.1, the root level `commentable` field in the API allows access to all commentable resources within the platform, without any permission...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40869
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-15T21:14:45

2 posts

### Impact The vulnerability allows any registered and authenticated user to accept or reject any amendments. The impact is on any users who have created proposals where the amendments feature is enabled. This also elevates the user accepting the amendment as the author of the original proposal as people amending proposals are provided coauthorship on the coauthorable resources. The only check do

thehackerwire@mastodon.social at 2026-04-21T21:01:55.000Z ##

🟠 CVE-2026-40869 - High (7.5)

Decidim is a participatory democracy framework. Starting in version 0.19.0 and prior to versions 0.30.5 and 0.31.1, a vulnerability allows any registered and authenticated user to accept or reject any amendments. The impact is on any users who hav...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:01:55.000Z ##

🟠 CVE-2026-40869 - High (7.5)

Decidim is a participatory democracy framework. Starting in version 0.19.0 and prior to versions 0.30.5 and 0.31.1, a vulnerability allows any registered and authenticated user to accept or reject any amendments. The impact is on any users who hav...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40868
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-15T21:14:40

1 posts

kyverno’s apiCall servicecall helper implicitly injects `Authorization: Bearer ...` using the kyverno controller serviceaccount token when a policy does not explicitly set an Authorization header. because `context.apiCall.service.url` is policy-controlled, this can send the kyverno serviceaccount token to an attacker-controlled endpoint (confused deputy). namespaced policies are blocked from serv

thehackerwire@mastodon.social at 2026-04-21T19:58:02.000Z ##

🟠 CVE-2026-40868 - High (8.1)

Kyverno is a policy engine designed for cloud native platform engineering teams. Prior to 1.16.4, kyverno’s apiCall servicecall helper implicitly injects Authorization: Bearer ... using the kyverno controller serviceaccount token when a policy d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40784
(8.1 HIGH)

EPSS: 0.05%

updated 2026-04-15T18:31:56

1 posts

Authorization Bypass Through User-Controlled Key vulnerability in Mahmudul Hasan Arif FluentBoards fluent-boards allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FluentBoards: from n/a through <= 1.91.2.

thehackerwire@mastodon.social at 2026-04-19T07:00:02.000Z ##

🟠 CVE-2026-40784 - High (8.1)

Authorization Bypass Through User-Controlled Key vulnerability in Mahmudul Hasan Arif FluentBoards fluent-boards allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects FluentBoards: from n/a through &lt;= 1.91.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40764
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-15T16:16:38.653000

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Syed Balkhi Contact Form by WPForms wpforms-lite allows Cross Site Request Forgery.This issue affects Contact Form by WPForms: from n/a through <= 1.10.0.2.

thehackerwire@mastodon.social at 2026-04-19T08:00:47.000Z ##

🟠 CVE-2026-40764 - High (8.1)

Cross-Site Request Forgery (CSRF) vulnerability in Syed Balkhi Contact Form by WPForms wpforms-lite allows Cross Site Request Forgery.This issue affects Contact Form by WPForms: from n/a through &lt;= 1.10.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40745
(7.6 HIGH)

EPSS: 0.04%

updated 2026-04-15T16:16:38.480000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bdthemes Element Pack Elementor Addons bdthemes-element-pack-lite allows Blind SQL Injection.This issue affects Element Pack Elementor Addons: from n/a through <= 8.4.2.

thehackerwire@mastodon.social at 2026-04-19T08:00:37.000Z ##

🟠 CVE-2026-40745 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in bdthemes Element Pack Elementor Addons bdthemes-element-pack-lite allows Blind SQL Injection.This issue affects Element Pack Elementor Addons: fr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34615
(9.3 CRITICAL)

EPSS: 1.56%

updated 2026-04-15T16:14:07.857000

1 posts

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. Scope is changed.

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4145
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-15T15:31:50

1 posts

During an internal security assessment, a potential vulnerability was discovered in Lenovo Software Fix that could allow a local authenticated user to perform arbitrary code execution with elevated privileges.

thehackerwire@mastodon.social at 2026-04-19T06:59:53.000Z ##

🟠 CVE-2026-4145 - High (7.8)

During an internal security assessment, a potential vulnerability was discovered in Lenovo Software Fix that could allow a local authenticated user to perform arbitrary code execution with elevated privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5617
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-15T09:16:33.210000

1 posts

The Login as User plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the handle_return_to_admin() function trusting a client-controlled cookie (oclaup_original_admin) to determine which user to authenticate as, without any server-side verification that the cookie value was legitimately set during an admin-initiated user switch. Th

thehackerwire@mastodon.social at 2026-04-19T08:02:23.000Z ##

🟠 CVE-2026-5617 - High (8.8)

The Login as User plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the handle_return_to_admin() function trusting a client-controlled cookie (oclaup_original_admin) to determine...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-32977
(9.6 CRITICAL)

EPSS: 0.25%

updated 2026-04-15T00:35:42.020000

1 posts

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to upload backup files to the system. While signature validation is implemented, weaknesses in the validation process can be exploited to upload malicious backup content that could co

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

CVE-2026-27303
(9.7 CRITICAL)

EPSS: 1.63%

updated 2026-04-14T18:30:50

1 posts

Adobe Connect versions 2025.3, 12.10 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue does not require user interaction. Scope is changed.

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-6203
(6.1 MEDIUM)

EPSS: 0.45%

updated 2026-04-14T00:31:19

1 posts

The User Registration & Membership plugin for WordPress is vulnerable to Open Redirect in versions up to and including 5.1.4. This is due to insufficient validation of user-supplied URLs passed via the 'redirect_to_on_logout' GET parameter before redirecting users. The `redirect_to_on_logout` GET parameter is passed directly to WordPress's `wp_redirect()` function instead of the domain-restricted

Nuclei template

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-34621
(9.7 CRITICAL)

EPSS: 8.71%

updated 2026-04-13T18:31:44

1 posts

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

5 repos

https://github.com/KeulenR01/Remediate-AdobeAcrobat-CVE-2026-34621

https://github.com/ercihan/CVE-2026-34621_PDF_SAMPLE

https://github.com/ercihan/CVE-2026-34621

https://github.com/NULL200OK/cve_2026_34621_advanced

https://github.com/eduardorossi84/CVE-2026-34621-POC

_r_netsec@infosec.exchange at 2026-04-18T15:58:05.000Z ##

CVE-2026-34621 PoC isn't a scanner, it's a campaign weaponizer with 62 pre-authenticated Brazilian fintech targets nefariousplan.com/posts/adobe-

##

CVE-2023-21529
(8.8 HIGH)

EPSS: 28.94%

updated 2026-04-13T18:30:34

1 posts

Microsoft Exchange Server Remote Code Execution Vulnerability

kev_Stalker@infosec.exchange at 2026-04-21T19:19:20.000Z ##

CVE-2023-21529 - Changed to Known Ransomware Status

Microsoft Exchange Server Deserialization of Untrusted Data VulnerabilityVendor: MicrosoftProduct: Exchange ServerMicrosoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: April 21, 2026 at 18:00:35 UTCDate Added to KEV: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-6139
(9.8 CRITICAL)

EPSS: 1.25%

updated 2026-04-13T15:01:43.663000

1 posts

A vulnerability has been found in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function UploadOpenVpnCert of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument FileName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-6154
(9.8 CRITICAL)

EPSS: 1.25%

updated 2026-04-13T15:01:43.663000

1 posts

A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument wizard results in os command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-6158
(7.3 HIGH)

EPSS: 4.86%

updated 2026-04-13T15:01:43.663000

1 posts

A flaw has been found in Totolink N300RH 6.1c.1353_B20190305. Affected is the function setUpgradeUboot of the file upgrade.so. This manipulation of the argument FileName causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-6138
(9.8 CRITICAL)

EPSS: 1.25%

updated 2026-04-13T15:01:43.663000

1 posts

A flaw has been found in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setAccessDeviceCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mac causes os command injection. The attack can be initiated remotely. The exploit has been published and may be used.

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-6141
(6.3 MEDIUM)

EPSS: 1.23%

updated 2026-04-13T03:30:31

1 posts

A vulnerability was determined in danielmiessler Personal_AI_Infrastructure up to 2.3.0. Affected is an unknown function of the file Skills/Parser/Tools/parse_url.ts. Executing a manipulation can lead to os command injection. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called 14322e87e58bf585cf3c7b9295578a6eb7dc4945. It is advisab

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-6140
(9.8 CRITICAL)

EPSS: 0.33%

updated 2026-04-13T03:30:29

1 posts

A vulnerability was found in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function UploadFirmwareFile of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument FileName results in os command injection. The attack may be initiated remotely. The exploit has been made public and could be used.

secdb@infosec.exchange at 2026-04-20T00:01:03.000Z ##

📈 CVE Published in last 7 days (2026-04-13 - 2026-04-20)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1192

Severity:
- Critical: 104
- High: 477
- Medium: 485
- Low: 67
- None: 59

Status:
- : 27
- Analyzed: 155
- Awaiting Analysis: 421
- Deferred: 72
- Received: 270
- Rejected: 6
- Undergoing Analysis: 241

Top CNAs:
- GitHub, Inc.: 234
- Microsoft Corporation: 163
- MITRE: 116
- Wordfence: 100
- VulDB: 77
- Adobe Systems Incorporated: 53
- Chrome: 31
- N/A: 27
- Fortinet, Inc.: 27
- VulnCheck: 23

Top Affected Products:
- UNKNOWN: 856
- Microsoft Windows Server 2025: 121
- Microsoft Windows 11 24h2: 118
- Microsoft Windows 11 26h1: 117
- Microsoft Windows 11 25h2: 114
- Microsoft Windows Server 2022: 114
- Microsoft Windows 11 23h2: 113
- Microsoft Windows Server 23h2: 108
- Microsoft Windows 10 21h2: 105
- Microsoft Windows 10 22h2: 105

Top EPSS Score:
- CVE-2026-6158 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-27303 - 1.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34615 - 1.44 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6203 - 1.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6349 - 0.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6141 - 0.92 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6138 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6139 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6140 - 0.89 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6154 - 0.89 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-39987(CVSS UNKNOWN)

EPSS: 6.99%

updated 2026-04-09T19:06:18

1 posts

## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint `/terminal/ws` lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., `/ws`) that correctly call `validate_auth()` for authentication, the `/terminal/ws` endpoint only checks the

Nuclei template

5 repos

https://github.com/0xBlackash/CVE-2026-39987

https://github.com/fevar54/marimo_CVE-2026-39987_RCE_PoC

https://github.com/Nxploited/CVE-2026-39987

https://github.com/mki9/CVE-2026-39987_exploit

https://github.com/keraattin/CVE-2026-39987

threatnoir@infosec.exchange at 2026-04-18T17:08:28.000Z ##

⚠️ CRITICAL: Hackers exploit Marimo flaw to deploy NKAbuse malware from Hugging Face

Attackers are actively exploiting CVE-2026-39987, a critical RCE vulnerability in Marimo Python notebooks, to deploy NKAbuse malware hosted on Hugging Face. The malware acts as a RAT with credential theft and lateral movement capabilities. Exploitation started within 10 hours of disclosure across m…

threatnoir.com/focus

#infosec #cybersecurity

##

mttaggart@infosec.exchange at 2026-04-19T14:35:08.000Z ##

Useful explainer on the latest Citrix shenanigans, including verifying exposure and hunting/forensics recommendations

picussecurity.com/resource/blo

##

CVE-2026-21513
(8.8 HIGH)

EPSS: 27.79%

updated 2026-03-30T13:28:07.120000

1 posts

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

blog@insicurezzadigitale.com at 2026-04-20T08:44:42.000Z ##

PRISMEX: la suite di cyberspionaggio di APT28 che prende di mira Ucraina e alleati NATO con steganografia e cloud C2

APT28 ha lanciato una nuova campagna di cyberspionaggio contro Ucraina e alleati NATO con PRISMEX, una suite di malware inedita che combina steganografia 'Bit Plane Round Robin', COM hijacking e abuso di Filen.io come C2 cifrato. La campagna sfrutta due vulnerabilità Microsoft Office — CVE-2026-21509 e CVE-2026-21513 — con exploit pronti settimane prima della divulgazione pubblica.

insicurezzadigitale.com/prisme

##

CVE-2026-4368
(0 None)

EPSS: 0.01%

updated 2026-03-24T15:54:09.400000

1 posts

Race Condition in NetScaler ADC and NetScaler Gateway when appliance is configured as Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server leading to User Session Mixup

mttaggart@infosec.exchange at 2026-04-19T14:35:08.000Z ##

Useful explainer on the latest Citrix shenanigans, including verifying exposure and hunting/forensics recommendations

picussecurity.com/resource/blo

##

CVE-2026-4440
(8.8 HIGH)

EPSS: 0.03%

updated 2026-03-20T19:27:12.970000

1 posts

Out of bounds read and write in WebGL in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Critical)

campuscodi@mastodon.social at 2026-04-19T10:46:24.000Z ##

Exploit code for a recently patched Chrome vulnerability has leaked online via a misconfigured server.

Security firm Breakglass believes the code is the work of a "professional exploit developer," and most intended for "sale or government use."

intel.breakglass.tech/post/cve

##

CVE-2026-32640(CVSS UNKNOWN)

EPSS: 0.19%

updated 2026-03-16T22:00:16

1 posts

### Impact If the objects passed in as `names` to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. Examples (found by @ByamB4): Any module where non-underscore attribute chains reach os or sys: - os.path, pathlib, shutil, glob (direct .os

linux@activitypub.awakari.com at 2026-04-20T19:04:42.000Z ## Debian DSA-6220-1 SimpleEval Important Sandbox Bypass CVE-2026-32640 Byambadalai Sumiya discovered that SimpleEval, a library for adding evaluatable expressions into Python projects, didn't ful...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2025-26399
(9.8 CRITICAL)

EPSS: 29.28%

updated 2026-03-10T13:11:15.553000

1 posts

SolarWinds Web Help Desk was found to be susceptible to an unauthenticated AjaxProxy deserialization remote code execution vulnerability that, if exploited, would allow an attacker to run commands on the host machine. This vulnerability is a patch bypass of CVE-2024-28988, which in turn is a patch bypass of CVE-2024-28986.

1 repos

https://github.com/rxerium/CVE-2025-26399

technadu@infosec.exchange at 2026-04-21T07:35:49.000Z ##

QEMU abuse rising 🚨
QEMU used for stealth VMs, SSH tunnels, persistence
CVE-2025-26399, CitrixBleed2 exploited
💬 Monitoring VM layer yet?

Source: securityweek.com/hackers-abuse

Follow TechNadu

#InfoSec #CyberSecurity

##

CVE-2021-22681
(9.8 CRITICAL)

EPSS: 15.38%

updated 2026-03-05T21:30:23

1 posts

Rockwell Automation Studio 5000 Logix Designer Versions 21 and later, and RSLogix 5000 Versions 16 through 20 use a key to verify Logix controllers are communicating with Rockwell Automation CompactLogix 1768, 1769, 5370, 5380, 5480: ControlLogix 5550, 5560, 5570, 5580; DriveLogix 5560, 5730, 1794-L34; Compact GuardLogix 5370, 5380; GuardLogix 5570, 5580; SoftLogix 5800. Rockwell Automation Studio

blog@insicurezzadigitale.com at 2026-04-21T16:16:47.000Z ##

CyberAv3ngers e l’IRGC all’assalto delle infrastrutture critiche USA: sei agenzie federali confermano gli attacchi ai PLC Rockwell Automation

Un advisory congiunto di sei agenzie federali statunitensi, pubblicato il 7 aprile 2026, conferma che CyberAv3ngers — gruppo state-directed dell’IRGC iraniano — ha compromesso sistemi di controllo industriale Rockwell Automation in settori idrici, energetici e governativi USA, sfruttando CVE-2021-22681, una vulnerabilità critica priva di patch del vendor.

insicurezzadigitale.com/cybera

##

CVE-2026-24884
(8.4 HIGH)

EPSS: 0.01%

updated 2026-02-27T20:27:32.587000

2 posts

Compressing is a compressing and uncompressing lib for node. In version 2.0.0 and 1.10.3 and prior, Compressing extracts TAR archives while restoring symbolic links without validating their targets. By embedding symlinks that resolve outside the intended extraction directory, an attacker can cause subsequent file entries to be written to arbitrary locations on the host file system. Depending on th

thehackerwire@mastodon.social at 2026-04-21T22:37:09.000Z ##

🟠 CVE-2026-40931 - High (8.4)

Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and 1.10.5, the patch for CVE-2026-24884 relies on a purely logical string validation within the isPathWithinParent utility. This check verifies if a resolved path string ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:37:09.000Z ##

🟠 CVE-2026-40931 - High (8.4)

Compressing is a compressing and uncompressing lib for node. Prior to 2.1.1 and 1.10.5, the patch for CVE-2026-24884 relies on a purely logical string validation within the isPathWithinParent utility. This check verifies if a resolved path string ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1731
(9.8 CRITICAL)

EPSS: 81.50%

updated 2026-02-17T13:40:10.320000

1 posts

BeyondTrust Remote Support (RS) and certain older versions of Privileged Remote Access (PRA) contain a critical pre-authentication remote code execution vulnerability. By sending specially crafted requests, an unauthenticated remote attacker may be able to execute operating system commands in the context of the site user.

Nuclei template

4 repos

https://github.com/cybrdude/cve-2026-1731-scanner

https://github.com/win3zz/CVE-2026-1731

https://github.com/jakubie07/CVE-2026-1731

https://github.com/hexissam/CVE-2026-1731

tierrasapiens@mastodon.social at 2026-04-21T23:22:12.000Z ##

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ Surge in Bomgar RMM Exploitation Demonstrates Supply Chain Risk
🔗 darkreading.com/cyberattacks-d

The critical remote code execution flaw (CVE-2026-1731) in the remote monitoring and management tool can be exploited to spread ransomware and compromise supply chains.

##

blog@insicurezzadigitale.com at 2026-04-20T08:44:42.000Z ##

PRISMEX: la suite di cyberspionaggio di APT28 che prende di mira Ucraina e alleati NATO con steganografia e cloud C2

APT28 ha lanciato una nuova campagna di cyberspionaggio contro Ucraina e alleati NATO con PRISMEX, una suite di malware inedita che combina steganografia 'Bit Plane Round Robin', COM hijacking e abuso di Filen.io come C2 cifrato. La campagna sfrutta due vulnerabilità Microsoft Office — CVE-2026-21509 e CVE-2026-21513 — con exploit pronti settimane prima della divulgazione pubblica.

insicurezzadigitale.com/prisme

##

kev_Stalker@infosec.exchange at 2026-04-21T19:14:20.000Z ##

CVE-2025-52691 - Changed to Known Ransomware Status

SmarterTools SmarterMail Unrestricted Upload of File with Dangerous Type VulnerabilityVendor: SmarterToolsProduct: SmarterMailSmarterTools SmarterMail contains an unrestricted upload of file with dangerous type vulnerability that could allow an unauthenticated attacker to upload arbitrary files to any location on the mail server, potentially enabling remote code execution.Status changed fromhttps://nvd.nist.gov/vuln/detail/CVE-2025-52691

##

CVE-2025-0520(CVSS UNKNOWN)

EPSS: 1.61%

updated 2025-11-05T19:58:03

2 posts

An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution. This issue affects ShowDoc: before 2.8.7.

Hackread@mstdn.social at 2026-04-18T14:42:19.000Z ##

📢⚠️ Hackers are exploiting a 5-year-old #ShowDoc vulnerability (CVE-2025-0520) to deploy web shells, enabling RCE and full server takeover worldwide.

Read: hackread.com/showdoc-vulnerabi

#CyberSecurity #Vulnerability #CyberAttacks

##

Hackread@mstdn.social at 2026-04-18T14:39:50.000Z ##

📢⚠️ Hackers are exploiting a 5-year-old #ShowDoc vulnerability (CVE-2025-0520) to deploy web shells, enabling RCE and full server takeover worldwide.

Read: hackread.com/showdoc-vulnerabi

#CyberSecurity #Vulnerability #CyberAttacks

##

CVE-2025-32976
(8.8 HIGH)

EPSS: 0.37%

updated 2025-11-03T21:35:11

1 posts

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) contains a logic flaw in its two-factor authentication implementation that allows authenticated users to bypass TOTP-based 2FA requirements. The vulnerability exists in the 2FA validation process and can be explo

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

CVE-2025-32978
(7.5 HIGH)

EPSS: 0.09%

updated 2025-11-03T21:34:07

1 posts

Quest KACE Systems Management Appliance (SMA) 13.0.x before 13.0.385, 13.1.x before 13.1.81, 13.2.x before 13.2.183, 14.0.x before 14.0.341 (Patch 5), and 14.1.x before 14.1.101 (Patch 4) allows unauthenticated users to replace system licenses through a web interface intended for license renewal. Attackers can exploit this to replace valid licenses with expired or trial licenses, causing denial of

secdb@infosec.exchange at 2026-04-20T22:00:15.000Z ##

🚨 [CISA-2026:0420] CISA Adds 8 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 8 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2023-27351 (secdb.nttzen.cloud/cve/detail/)
- Name: PaperCut NG/MF Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: PaperCut
- Product: NG/MF
- Notes: papercut.com/kb/Main/PO-1216-a ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-27199 (secdb.nttzen.cloud/cve/detail/)
- Name: JetBrains TeamCity Relative Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: JetBrains
- Product: TeamCity
- Notes: jetbrains.com/privacy-security ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-2749 (secdb.nttzen.cloud/cve/detail/)
- Name: Kentico Xperience Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Kentico
- Product: Kentico Xperience
- Notes: devnet.kentico.com/download/ho ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-32975 (secdb.nttzen.cloud/cve/detail/)
- Name: Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Quest
- Product: KACE Systems Management Appliance (SMA)
- Notes: support.quest.com/kb/4379499/q ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-48700 (secdb.nttzen.cloud/cve/detail/)
- Name: Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Synacor
- Product: Zimbra Collaboration Suite (ZCS)
- Notes: wiki.zimbra.com/wiki/Zimbra_Se ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20122 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manger
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/ CVE-2026-20122

⚠️ CVE-2026-20128 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-20133 (secdb.nttzen.cloud/cve/detail/)
- Name: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
- Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Cisco
- Product: Catalyst SD-WAN Manager
- Notes: CISA Mitigation Instructions: cisa.gov/news-events/directive ; cisa.gov/news-events/directive ; sec.cloudapps.cisco.com/securi ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260420 #cisa20260420 #cve_2023_27351 #cve_2024_27199 #cve_2025_2749 #cve_2025_32975 #cve_2025_48700 #cve_2026_20122 #cve_2026_20128 #cve_2026_20133 #cve202327351 #cve202427199 #cve20252749 #cve202532975 #cve202548700 #cve202620122 #cve202620128 #cve202620133

##

CVE-2023-33538
(8.8 HIGH)

EPSS: 89.90%

updated 2025-10-27T14:32:16.313000

5 posts

TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .

2 repos

https://github.com/mrowkoob/CVE-2023-33538-msf

https://github.com/explxx/CVE-2023-33538

patrickcmiller at 2026-04-22T01:12:00.598Z ##

CVE-2023-33538 under attack for a year, but exploitation still unsuccessful securityaffairs.com/191040/hac

##

ChrisShort@hachyderm.io at 2026-04-21T23:34:11.000Z ##

TP-Link router owners beware | A Deep Dive Into Attempted Exploitation of CVE-2023-33538 #devopsish unit42.paloaltonetworks.com/ex

##

patrickcmiller@infosec.exchange at 2026-04-22T01:12:00.000Z ##

CVE-2023-33538 under attack for a year, but exploitation still unsuccessful securityaffairs.com/191040/hac

##

ChrisShort@hachyderm.io at 2026-04-21T23:34:11.000Z ##

TP-Link router owners beware | A Deep Dive Into Attempted Exploitation of CVE-2023-33538 #devopsish unit42.paloaltonetworks.com/ex

##

LLMs@activitypub.awakari.com at 2026-04-18T18:27:51.000Z ## Hackers target old TP-Link routers in Mirai malware campaign tied to CVE-2023-33538 Hackers are actively trying to compromise several older TP-Link routers through CVE-2023-33538, a command injecti...

#News

Origin | Interest | Match ##

CVE-2025-32463
(9.4 CRITICAL)

EPSS: 38.49%

updated 2025-10-22T00:34:26

1 posts

Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

Nuclei template

83 repos

https://github.com/CIA911/sudo_patch_CVE-2025-32463

https://github.com/MohamedKarrab/CVE-2025-32463

https://github.com/ashardev002/CVE-2025-32463_chwoot

https://github.com/Mr-Alperen/CVE-2025-32463

https://github.com/abrewer251/CVE-2025-32463_Sudo_PoC

https://github.com/cybertechajju/CVE-2025-32463

https://github.com/gmh5225/Blackash-CVE-2025-32463

https://github.com/Chocapikk/CVE-2025-32463-lab

https://github.com/blackcat4347/CVE-2025-32463_PoC

https://github.com/painoob/CVE-2025-32463

https://github.com/cybershaolin47/CVE-2025-32463_POC

https://github.com/pevinkumar10/CVE-2025-32463

https://github.com/shazed-x/CVE-2025-32463

https://github.com/ill-deed/CVE-2025-32463_illdeed

https://github.com/FreeDurok/CVE-2025-32463-PoC

https://github.com/hackingyseguridad/root

https://github.com/danilo1992-sys/CVE-2025-32463

https://github.com/vpr-labs/CVE-2025-32463

https://github.com/0x3c4dfa1/CVE-2025-32463

https://github.com/Maalfer/Sudo-CVE-2021-3156

https://github.com/harsh1verma/CVE-Analysis

https://github.com/dr4xp/sudo-chroot

https://github.com/san8383/CVE-2025-32463

https://github.com/hacieda/CVE-2025-32463

https://github.com/12bijaya/CVE-2025-32463

https://github.com/0xzap/CVE-2025-32463

https://github.com/Nowafen/CVE-2025-32463

https://github.com/MAAYTHM/CVE-2025-32462_32463-Lab

https://github.com/SysMancer/CVE-2025-32463

https://github.com/0xAkarii/CVE-2025-32463

https://github.com/4f-kira/CVE-2025-32463

https://github.com/daryllundy/CVE-2025-32463

https://github.com/KaiHT-Ladiant/CVE-2025-32463

https://github.com/K3ysTr0K3R/CVE-2025-32463-EXPLOIT

https://github.com/khoazero123/CVE-2025-32463

https://github.com/SpycioKon/CVE-2025-32463

https://github.com/aexdyhaxor/CVE-2025-32463

https://github.com/yonathanpy/CVE-2025-32462-CVE-2025-32463-PoC-Lab

https://github.com/lakshan-sameera/CVE-2025-32462-and-CVE-2025-32463---Critical-Sudo-Vulnerabilities

https://github.com/IC3-512/linux-root-kit

https://github.com/0xBlackash/CVE-2025-32463

https://github.com/Floodnut/CVE-2025-32463

https://github.com/ankitpandey383/CVE-2025-32463-Sudo-Privilege-Escalation

https://github.com/dr4x-c0d3r/sudo-chroot

https://github.com/D3ltaFormation/CVE-2025-32463-Sudo-Chroot-Escape

https://github.com/AdityaBhatt3010/Sudo-Privilege-Escalation-Linux-CVE-2025-32463-and-CVE-2025-32462

https://github.com/0x00315732/musical-engine

https://github.com/K1tt3h/CVE-2025-32463-POC

https://github.com/mirchr/CVE-2025-32463-sudo-chwoot

https://github.com/y4ney/CVE-2025-32463-lab

https://github.com/0p5cur/CVE-2025-32463-POC

https://github.com/onniio/CVE-2025-32463

https://github.com/0xb0rn3/CVE-2025-32463-EXPLOIT

https://github.com/zhaduchanhzz/CVE-2025-32463_POC

https://github.com/robbert1978/CVE-2025-32463_POC

https://github.com/yeremeu/CVE-2025-32463_chwoot

https://github.com/ricardomaia/CVE-2025-32463

https://github.com/Yuy0ung/CVE-2025-32463_chwoot

https://github.com/justjoeyking/CVE-2025-32463

https://github.com/robbin0919/CVE-2025-32463

https://github.com/AC8999/CVE-2025-32463

https://github.com/aldoClau98/CVE-2025-32463

https://github.com/MGunturG/CVE-2025-32463

https://github.com/kh4sh3i/CVE-2025-32463

https://github.com/Rajneeshkarya/CVE-2025-32463

https://github.com/morgenm/sudo-chroot-CVE-2025-32463

https://github.com/Mikivirus0/sudoinjection

https://github.com/Ghstxz/CVE-2025-32463

https://github.com/7r00t/cve-2025-32463-lab

https://github.com/krypton-0x00/CVE-2025-32463-Chwoot-POC

https://github.com/NewComrade12211/CVE-2025-32463

https://github.com/muhammedkayag/CVE-2025-32463

https://github.com/SpongeBob-369/cve-2025-32463

https://github.com/pr0v3rbs/CVE-2025-32463_chwoot

https://github.com/behnamvanda/CVE-2025-32463

https://github.com/zinzloun/CVE-2025-32463

https://github.com/lowercasenumbers/CVE-2025-32463_sudo_chroot

https://github.com/ChetanKomal/sudo_exploit

https://github.com/wvverez/CVE-2025-32463

https://github.com/toohau/CVE-2025-32462-32463-Detection-Script-

https://github.com/mihnasdsad/CVE-2025-32463

https://github.com/neko205-mx/CVE-2025-32463_Exploit

https://github.com/r3dBust3r/CVE-2025-32463

certvde@infosec.exchange at 2026-04-21T08:54:39.000Z ##

#OT #Advisory VDE-2026-032
Endress+Hauser: sudo vulnerability affects Endress+Hauser MCS200HW

The display unit of the Endress+Hauser MCS200HW is affected by a sudo chroot vulnerability.
#CVE CVE-2025-32463

certvde.com/en/advisories/vde-

#CSAF endress-hauser.csaf-tp.certvde

##

CVE-2019-1367
(7.5 HIGH)

EPSS: 89.25%

updated 2025-10-22T00:32:47

1 posts

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221.

1 repos

https://github.com/mandarenmanman/CVE-2019-1367

CVE-2018-1000500
(8.1 HIGH)

EPSS: 0.56%

updated 2025-06-09T16:15:27.847000

1 posts

Busybox contains a Missing SSL certificate validation vulnerability in The "busybox wget" applet that can result in arbitrary code execution. This attack appear to be exploitable via Simply download any file over HTTPS using "busybox wget https://compromised-domain.com/important-file".

CVE-2024-3721
(6.3 MEDIUM)

EPSS: 80.06%

updated 2024-04-13T12:30:30

4 posts

A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classified as critical. This issue affects some unknown processing of the file /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___. The manipulation of the argument mdb/mdc leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260573

1 repos

https://github.com/bytecategory/homeip

technadu@infosec.exchange at 2026-04-20T15:06:00.000Z ##

FortiGuard Labs tracks #Nexcorium, a Mirai variant targeting TBK DVRs via CVE-2024-3721. It uses aggressive persistence (systemd, cron) and wide-ranging DDoS vectors. Check your IoT logs for "X-Hacked-By" headers.

Details: fortinet.com/blog/threat-resea

What’s your take?

#Botnet #IoT #DDoS #InfoSec

##

patrickcmiller@infosec.exchange at 2026-04-20T13:42:00.000Z ##

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet thehackernews.com/2026/04/mira

##

jbz@indieweb.social at 2026-04-19T23:00:11.000Z ##

☣️ Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

「 The attack activity outlined by Fortinet involves the exploitation of CVE-2024-3721 to obtain and drop a downloader script, which then launches the botnet payload based on the Linux system's architecture. Once the malware is executed, it displays a message stating "nexuscorp has taken control." 」

thehackernews.com/2026/04/mira

#iot #ddos #botnet #cybersecurity

##

hackerworkspace@infosec.exchange at 2026-04-18T08:49:10.000Z ##

Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet

thehackernews.com/2026/04/mira

Read on HackerWorkspace: hackerworkspace.com/article/mi

#malware #cybersecurity #vulnerability

##

CVE-2026-40706
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T22:37:00.000Z ##

🟠 CVE-2026-40706 - High (8.4)

In NTFS-3G 2022.10.3 before 2026.2.25, a heap buffer overflow exists in ntfs_build_permissions_posix() in acls.c that allows an attacker to corrupt heap memory in the SUID-root ntfs-3g binary by crafting a malicious NTFS image. The overflow is tri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:37:00.000Z ##

🟠 CVE-2026-40706 - High (8.4)

In NTFS-3G 2022.10.3 before 2026.2.25, a heap buffer overflow exists in ntfs_build_permissions_posix() in acls.c that allows an attacker to corrupt heap memory in the SUID-root ntfs-3g binary by crafting a malicious NTFS image. The overflow is tri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40905
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T22:03:01.000Z ##

🟠 CVE-2026-40905 - High (8.1)

LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, a password reset poisoning vulnerability was identified in the application due to improper trust of user-controlled HTTP headers. The application uses the X-Forwarded-Host ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:22.000Z ##

🟠 CVE-2026-40905 - High (8.1)

LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, a password reset poisoning vulnerability was identified in the application due to improper trust of user-controlled HTTP headers. The application uses the X-Forwarded-Host ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:03:01.000Z ##

🟠 CVE-2026-40905 - High (8.1)

LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, a password reset poisoning vulnerability was identified in the application due to improper trust of user-controlled HTTP headers. The application uses the X-Forwarded-Host ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:22.000Z ##

🟠 CVE-2026-40905 - High (8.1)

LinkAce is a self-hosted archive to collect website links. Prior to 2.5.4, a password reset poisoning vulnerability was identified in the application due to improper trust of user-controlled HTTP headers. The application uses the X-Forwarded-Host ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40925
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T22:01:24.000Z ##

🟠 CVE-2026-40925 - High (8.3)

WWBN AVideo is an open source video platform. In versions 29.0 and prior, `objects/configurationUpdate.json.php` (also routed via `/updateConfig`) persists dozens of global site settings from `$_POST` but protects the endpoint only with `User::isA...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:01:24.000Z ##

🟠 CVE-2026-40925 - High (8.3)

WWBN AVideo is an open source video platform. In versions 29.0 and prior, `objects/configurationUpdate.json.php` (also routed via `/updateConfig`) persists dozens of global site settings from `$_POST` but protects the endpoint only with `User::isA...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40911
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T22:00:20.000Z ##

🔴 CVE-2026-40911 - Critical (10)

WWBN AVideo is an open source video platform. In versions 29.0 and prior, the YPTSocket plugin's WebSocket server relays attacker-supplied JSON message bodies to every connected client without sanitizing the `msg` or `callback` fields. On the clie...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T22:00:20.000Z ##

🔴 CVE-2026-40911 - Critical (10)

WWBN AVideo is an open source video platform. In versions 29.0 and prior, the YPTSocket plugin's WebSocket server relays attacker-supplied JSON message bodies to every connected client without sanitizing the `msg` or `callback` fields. On the clie...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40372
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T21:07:28.000Z ##

🔴 CVE-2026-40372 - Critical (9.1)

Improper verification of cryptographic signature in ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:07:28.000Z ##

🔴 CVE-2026-40372 - Critical (9.1)

Improper verification of cryptographic signature in ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40903
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T21:01:29.000Z ##

🔴 CVE-2026-40903 - Critical (9.1)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs has an ArtiPACKED vulnerability. ArtiPACKED can lead to leakage of the GITHUB_TOKEN through workflow artifacts, even though the token is not present in the repository source c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-21T21:01:29.000Z ##

🔴 CVE-2026-40903 - Critical (9.1)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.6, goshs has an ArtiPACKED vulnerability. ArtiPACKED can lead to leakage of the GITHUB_TOKEN through workflow artifacts, even though the token is not present in the repository source c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41316
(0 None)

EPSS: 0.00%

1 posts

N/A

picandocodigo@mastodon.online at 2026-04-21T20:36:21.000Z ##

Ruby 4.0.3 Released
This release only contains ERB 6.0.1.1, which fixes CVE-2026-41316.

ruby-lang.org/en/news/2026/04/

#Ruby

##

CVE-2026-40568
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T19:58:22.000Z ##

🟠 CVE-2026-40568 - High (8.5)

FreeScout is a free self-hosted help desk and shared mailbox. Versions prior to 1.8.213 have a stored cross-site scripting (XSS) vulnerability in the mailbox signature feature. The sanitization function `Helper::stripDangerousTags()` (`app/Misc/He...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40586
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T19:00:08.000Z ##

🟠 CVE-2026-40586 - High (7.5)

blueprintUE is a tool to help Unreal Engine developers. Prior to 4.2.0, the login form handler performs no throttling of any kind. Failed authentication attempts are processed at full network speed with no IP-based rate limiting, no per-account at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40588
(0 None)

EPSS: 0.00%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-21T18:55:09.000Z ##

🟠 CVE-2026-40588 - High (8.1)

blueprintUE is a tool to help Unreal Engine developers. Prior to 4.2.0, the password change form at /profile/{slug}/edit/ does not include a current_password field and does not verify the user's existing password before accepting a new one. Any at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40497
(0 None)

EPSS: 0.03%

1 posts

N/A

offseq@infosec.exchange at 2026-04-21T09:00:30.000Z ##

⚠️ HIGH severity XSS in FreeScout (<1.8.213)! CVE-2026-40497 lets mailbox admins/agents inject CSS and steal CSRF tokens, leading to privilege escalation. Upgrade to 1.8.213 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vulnerability #FreeScout

##

CVE-2026-32311
(0 None)

EPSS: 0.21%

1 posts

N/A

offseq@infosec.exchange at 2026-04-21T00:00:40.000Z ##

🚨 CRITICAL: CVE-2026-32311 in reconurge Flowsint (<b52cbbb9) enables remote OS command injection as root via 'org_to_asn' transform. Update to the commit fixing this flaw! Details: radar.offseq.com/threat/cve-20 #OffSeq #OSINT #CVE202632311 #Vulnerability

##

CVE-2026-33121
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-20T21:00:24.000Z ##

🟠 CVE-2026-33121 - High (8.8)

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the API datasource saving process. The deTableName field from the Base64-encoded datasource configuration is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33084
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-20T21:00:14.000Z ##

🟠 CVE-2026-33084 - High (8.8)

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the sort parameter of the /de2api/datasetData/enumValueObj endpoint. The DatasetDataManage service layer dire...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33207
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-20T21:00:04.000Z ##

🟠 CVE-2026-33207 - High (8.8)

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the /datasource/getTableField endpoint. The getTableFiledSql method in CalciteProvider.java incorporates the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40900
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-20T20:31:51.000Z ##

🟠 CVE-2026-40900 - High (8.8)

DataEase is an open-source data visualization and analytics platform. Versions 2.10.20 and below contain a SQL injection vulnerability in the /de2api/datasetData/previewSql endpoint. The user-supplied SQL is wrapped in a subquery without validatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39973
(0 None)

EPSS: 0.01%

1 posts

N/A

iBotPeaches@infosec.exchange at 2026-04-19T12:42:34.000Z ##

apktool 3.0.2 is out!

- performance boosts
- CVE-2026-39973 fix
- bug fixes for splits & Meta apks

apktool.org/blog/apktool-3.0.2

##

Visit counter For Websites