## Updated at UTC 2026-04-06T10:11:51.143682

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-5629 8.8 0.00% 4 0 2026-04-06T06:16:22.310000 A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is
CVE-2026-5628 8.8 0.00% 4 0 2026-04-06T06:16:22.087000 A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted i
CVE-2026-5614 8.8 0.00% 4 0 2026-04-06T04:16:09.967000 A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the f
CVE-2026-5613 8.8 0.00% 4 0 2026-04-06T03:16:07.990000 A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the
CVE-2026-5612 8.8 0.00% 2 0 2026-04-06T03:16:07.790000 A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability aff
CVE-2026-5611 8.8 0.00% 2 0 2026-04-06T03:16:07.570000 A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function f
CVE-2026-5610 8.8 0.00% 4 0 2026-04-06T02:16:00.927000 A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue
CVE-2026-5609 8.8 0.00% 2 0 2026-04-06T02:16:00.670000 A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerabilit
CVE-2026-5608 8.8 0.00% 4 0 2026-04-06T01:16:40.367000 A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function
CVE-2026-5605 8.8 0.00% 4 0 2026-04-06T00:30:31 A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function
CVE-2026-5604 8.8 0.00% 2 0 2026-04-06T00:30:31 A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element
CVE-2026-4272 8.1 0.00% 2 0 2026-04-06T00:30:31 Missing Authentication for Critical Function vulnerability in Honeywell Handheld
CVE-2026-5567 8.8 0.00% 2 0 2026-04-05T15:32:03 A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the funct
CVE-2026-5566 8.8 0.00% 2 0 2026-04-05T15:32:03 A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This
CVE-2026-5558 6.3 0.03% 2 0 2026-04-05T10:16:19.933000 A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up
CVE-2026-5548 8.8 0.05% 2 0 2026-04-05T09:30:22 A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by thi
CVE-2026-5550 8.8 0.05% 4 0 2026-04-05T08:16:25.100000 A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affec
CVE-2026-5544 8.8 0.04% 5 0 2026-04-05T06:32:08 A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-18053
CVE-2026-2936 7.2 0.02% 2 0 2026-04-04T12:31:04 The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to S
CVE-2026-3666 8.8 0.03% 4 0 2026-04-04T12:31:04 The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion i
CVE-2026-1233 7.5 0.02% 4 0 2026-04-04T12:16:02.943000 The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulner
CVE-2026-5425 7.2 0.06% 2 0 2026-04-04T09:30:37 The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored C
CVE-2026-3445 7.1 0.03% 2 0 2026-04-04T09:30:37 The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User
CVE-2026-4896 8.1 0.01% 2 0 2026-04-04T09:30:31 The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Lis
CVE-2026-35216 9.1 0.34% 1 0 2026-04-04T06:04:59 ### Summary An unauthenticated attacker can achieve Remote Code Execution (RCE)
CVE-2026-4634 7.5 0.07% 2 0 2026-04-04T06:00:48 A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulne
CVE-2026-35616 9.8 0.03% 18 2 2026-04-04T01:16:39.720000 A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through
CVE-2026-34780 8.3 0.04% 1 0 2026-04-04T01:16:39.540000 Electron is a framework for writing cross-platform desktop applications using Ja
CVE-2026-34769 7.7 0.02% 1 0 2026-04-04T00:16:17.657000 Electron is a framework for writing cross-platform desktop applications using Ja
CVE-2026-34953 9.1 0.03% 2 0 2026-04-03T23:17:06.653000 PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.v
CVE-2026-34935 9.8 0.08% 2 0 2026-04-03T23:17:05.693000 PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4
CVE-2026-34612 9.9 0.14% 2 0 2026-04-03T23:17:04.587000 Kestra is an open-source, event-driven orchestration platform. Prior to version
CVE-2026-33184 7.5 0.04% 1 0 2026-04-03T23:17:03.600000 nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake pro
CVE-2025-15620 8.6 0.01% 1 0 2026-04-03T23:17:03.417000 HiOS Switch Platform versions 09.1.00 prior to 09.4.05 and 10.3.01 contains a de
CVE-2026-27456 4.7 0.01% 1 0 2026-04-03T22:16:25.400000 util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a
CVE-2026-34824 7.5 0.02% 1 0 2026-04-03T21:54:37 ### Summary An uncontrolled resource consumption vulnerability exists in the Web
CVE-2026-33950 9.4 0.05% 1 0 2026-04-03T21:37:19 ## Summary According to SignalK's security documentation, when a server is firs
CVE-2026-33175 8.8 0.10% 1 0 2026-04-03T21:35:39 ### Summary An authentication bypass vulnerability in `oauthenticator` allows a
CVE-2026-31818 9.6 0.01% 1 0 2026-04-03T21:34:49 ## 1. Summary | Field | Value | |-------|-------| | **Title** | SSRF via REST C
CVE-2026-25197 9.1 0.03% 2 2 2026-04-03T21:31:49 A specific endpoint allows authenticated users to pivot to other user profiles b
CVE-2025-10681 8.6 0.04% 1 2 2026-04-03T21:31:49 Storage credentials are hardcoded in the mobile app and device firmware. These c
CVE-2026-22665 8.1 0.03% 1 0 2026-04-03T21:31:49 prompts.chat prior to commit 1464475 contains an identity confusion vulnerabilit
CVE-2026-28766 9.3 0.07% 1 2 2026-04-03T21:31:49 A specific endpoint exposes all user account information for registered Gardyn u
CVE-2026-35558 7.8 0.04% 1 0 2026-04-03T21:31:49 Improper neutralization of special elements in the authentication components in
CVE-2026-35562 7.5 0.08% 1 0 2026-04-03T21:31:49 Allocation of resources without limits in the parsing components in Amazon Athen
CVE-2026-22661 8.1 0.04% 1 0 2026-04-03T21:31:48 prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in
CVE-2026-5485 7.8 0.03% 1 0 2026-04-03T21:17:12.603000 OS command injection in the browser-based authentication component in Amazon Ath
CVE-2026-32646 7.5 0.07% 1 2 2026-04-03T21:17:11.137000 A specific administrative endpoint is accessible without proper authentication,
CVE-2026-22664 7.7 0.03% 1 0 2026-04-03T21:17:09.513000 prompts.chat prior to commit 30a8f04 contains a server-side request forgery vuln
CVE-2026-22663 7.5 0.03% 1 0 2026-04-03T21:17:09.337000 prompts.chat prior to commit 7b81836 contains multiple authorization bypass vuln
CVE-2026-25726 8.1 0.04% 1 0 2026-04-03T20:16:02.263000 Cloudreve is a self-hosted file management and sharing system. Prior to version
CVE-2026-34758 9.1 0.03% 1 0 2026-04-03T19:52:26.097000 OneUptime is an open-source monitoring and observability platform. Prior to vers
CVE-2026-34752 7.5 0.04% 1 0 2026-04-03T19:50:42.600000 Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with _
CVE-2026-34524 8.3 0.05% 1 0 2026-04-03T19:17:22.687000 SillyTavern is a locally installed user interface that allows users to interact
CVE-2026-28373 9.7 0.03% 2 0 2026-04-03T18:31:34 The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path t
CVE-2026-0545 9.1 0.20% 1 0 2026-04-03T18:31:34 In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not
CVE-2026-26477 7.5 0.11% 1 0 2026-04-03T18:31:21 An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause
CVE-2025-43202 8.8 0.02% 1 0 2026-04-03T18:31:17 This issue was addressed with improved memory handling. This issue is fixed in i
CVE-2025-43219 8.8 0.02% 1 0 2026-04-03T18:31:17 The issue was addressed with improved memory handling. This issue is fixed in ma
CVE-2025-43264 8.8 0.02% 1 0 2026-04-03T17:56:53.233000 The issue was addressed with improved memory handling. This issue is fixed in ma
CVE-2026-35218 8.7 0.03% 1 0 2026-04-03T16:16:41.977000 Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase'
CVE-2026-35214 8.7 0.11% 1 0 2026-04-03T16:16:41.607000 Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugi
CVE-2025-59711 8.3 0.87% 1 0 2026-04-03T16:16:22.840000 An issue was discovered in Biztalk360 before 11.5. Because of mishandling of use
CVE-2026-20093 9.8 0.03% 1 0 2026-04-03T16:11:11.357000 A vulnerability in the change password functionality of Cisco Integrated Managem
CVE-2026-20160 9.8 0.17% 1 0 2026-04-03T16:11:11.357000 A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allo
CVE-2026-4636 8.1 0.03% 2 0 2026-04-03T16:10:52.680000 A flaw was found in Keycloak. An authenticated user with the uma_protection role
CVE-2026-31933 7.5 0.04% 2 0 2026-04-03T16:10:52.680000 Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.
CVE-2026-31932 7.5 0.04% 1 0 2026-04-03T16:10:52.680000 Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.
CVE-2026-35168 8.8 0.06% 1 0 2026-04-03T16:10:52.680000 OpenSTAManager is an open source management software for technical assistance an
CVE-2026-31934 7.5 0.04% 1 0 2026-04-03T16:10:52.680000 Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before vers
CVE-2026-34728 8.7 0.19% 1 0 2026-04-03T16:10:52.680000 phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the Medi
CVE-2026-34791 8.8 0.24% 1 0 2026-04-03T16:10:52.680000 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34794 8.8 0.24% 2 0 2026-04-03T16:10:52.680000 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34795 8.8 0.24% 1 0 2026-04-03T16:10:52.680000 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34797 8.8 0.24% 1 0 2026-04-03T16:10:52.680000 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-35467 7.5 0.02% 1 0 2026-04-03T16:10:23.730000 The stored API keys in temporary browser client is not marked as protected allow
CVE-2026-25773 8.1 0.01% 1 0 2026-04-03T16:10:23.730000 ** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize categor
CVE-2026-33105 10.0 0.05% 2 0 2026-04-03T16:10:23.730000 Improper authorization in Microsoft Azure Kubernetes Service allows an unauthori
CVE-2026-34743 0 0.04% 1 0 2026-04-03T16:10:23.730000 XZ Utils provide a general-purpose data-compression library plus command-line to
CVE-2026-34838 9.9 0.45% 2 1 2026-04-03T16:10:23.730000 Group-Office is an enterprise customer relationship management and groupware too
CVE-2026-5463 8.6 0.85% 2 0 2026-04-03T16:10:23.730000 Command injection vulnerability in console.run_module_with_output() in pymetaspl
CVE-2026-30332 7.5 0.01% 1 1 2026-04-03T16:10:23.730000 A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena E
CVE-2026-5350 8.8 0.04% 1 0 2026-04-03T16:10:23.730000 A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted
CVE-2026-25212 9.9 0.04% 1 0 2026-04-03T16:10:23.730000 An issue was discovered in Percona PMM before 3.7. Because an internal database
CVE-2025-65114 7.5 0.03% 1 0 2026-04-03T16:10:23.730000 Apache Traffic Server allows request smuggling if chunked messages are malformed
CVE-2026-35385 7.5 0.04% 2 0 2026-04-03T16:10:23.730000 In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setg
CVE-2026-34577 8.6 0.09% 1 0 2026-04-03T16:10:23.730000 Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /
CVE-2026-34827 7.5 0.04% 1 0 2026-04-03T16:10:23.730000 Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before
CVE-2026-34725 8.2 0.02% 1 0 2026-04-03T16:10:23.730000 DbGate is cross-platform database manager. From version 7.0.0 to before version
CVE-2026-32173 8.6 0.06% 1 0 2026-04-03T16:10:23.730000 Improper authentication in Azure SRE Agent allows an unauthorized attacker to di
CVE-2026-35386 3.6 0.01% 1 0 2026-04-03T16:10:23.730000 In OpenSSH before 10.3, command execution can occur via shell metacharacters in
CVE-2026-3502 7.8 1.32% 5 2 2026-04-03T11:40:57.390000 TrueConf Client downloads application update code and applies it without perform
CVE-2026-4350 8.1 0.10% 1 0 2026-04-03T09:30:21 The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion vi
CVE-2026-28815 None 0.03% 1 0 2026-04-03T03:39:42 ### Summary The X-Wing decapsulation path accepts attacker-controlled encapsula
CVE-2026-34774 8.1 0.04% 1 0 2026-04-03T02:42:31 ### Impact Apps that use offscreen rendering and allow child windows via `window
CVE-2026-34771 7.5 0.04% 1 0 2026-04-03T02:40:26 ### Impact Apps that register an asynchronous `session.setPermissionRequestHandl
CVE-2026-32213 10.0 0.05% 2 0 2026-04-03T00:31:15 Improper authorization in Azure AI Foundry allows an unauthorized attacker to el
CVE-2026-33107 10.0 0.05% 1 0 2026-04-03T00:31:15 Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized at
CVE-2026-32211 9.1 0.05% 1 0 2026-04-03T00:31:14 Missing authentication for critical function in Azure MCP Server allows an unaut
CVE-2026-26135 9.6 0.05% 1 0 2026-04-03T00:31:14 Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (
CVE-2025-58136 7.5 0.04% 1 0 2026-04-02T21:34:00 A bug in POST request handling causes a crash under a certain condition. This i
CVE-2026-5429 7.8 0.02% 1 0 2026-04-02T21:33:03 Unsanitized input during web page generation in the Kiro Agent webview in Kiro I
CVE-2025-43257 8.7 0.01% 1 0 2026-04-02T21:33:02 This issue was addressed with improved handling of symlinks. This issue is fixed
CVE-2026-34426 7.6 0.04% 1 0 2026-04-02T21:33:02 OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerabili
CVE-2026-34829 7.5 0.04% 1 0 2026-04-02T20:34:49 ## Summary `Rack::Multipart::Parser` only wraps the request body in a `BoundedI
CVE-2026-34785 7.5 0.03% 1 0 2026-04-02T18:44:26 ## Summary `Rack::Static` determines whether a request should be served as a st
CVE-2026-34876 7.5 0.02% 1 0 2026-04-02T18:31:45 An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vuln
CVE-2026-5349 8.8 0.04% 1 0 2026-04-02T18:31:45 A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected eleme
CVE-2026-34877 9.8 0.07% 1 0 2026-04-02T18:31:45 An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4
CVE-2026-35388 2.5 0.01% 1 0 2026-04-02T18:31:45 OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode mu
CVE-2026-35387 3.1 0.03% 1 0 2026-04-02T18:31:45 OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA al
CVE-2026-34792 8.8 0.24% 2 0 2026-04-02T15:31:49 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34796 8.8 0.24% 2 0 2026-04-02T15:31:49 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-34793 8.8 0.24% 1 0 2026-04-02T15:31:49 Endian Firewall version 3.3.25 and prior allow authenticated users to execute ar
CVE-2026-2701 9.1 0.19% 7 0 2026-04-02T15:31:41 Authenticated user can upload a malicious file to the server and execute it, whi
CVE-2026-2699 9.8 0.41% 7 1 2026-04-02T15:31:40 Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica
CVE-2026-26928 None 0.02% 1 0 2026-04-02T15:31:40 SzafirHost downloads necessary files in the context of the initiating web page. 
CVE-2026-34952 9.1 0.04% 3 0 2026-04-01T23:28:05 ### Summary The PraisonAI Gateway server accepts WebSocket connections at `/ws`
CVE-2026-34954 8.6 0.03% 1 0 2026-04-01T23:27:07 ### Summary `FileTools.download_file()` in `praisonaiagents` validates the dest
CVE-2026-34955 8.8 0.02% 1 0 2026-04-01T23:26:02 ### Summary `SubprocessSandbox` in all modes (BASIC, STRICT, NETWORK_ISOLATED)
CVE-2026-34936 7.7 0.03% 1 0 2026-04-01T23:21:46 ### Summary `passthrough()` and `apassthrough()` in `praisonai` accept a caller
CVE-2026-34934 9.8 0.05% 2 0 2026-04-01T23:20:34 ## Summary The `get_all_user_threads` function constructs raw SQL queries using
CVE-2026-34937 7.8 0.03% 2 0 2026-04-01T23:18:18 ### Summary `run_python()` in `praisonai` constructs a shell command string by
CVE-2026-34938 10.0 0.10% 2 0 2026-04-01T23:17:49 ### Summary `execute_code()` in `praisonai-agents` runs attacker-controlled Pyt
CVE-2026-34522 8.1 0.06% 1 0 2026-04-01T21:36:44 ### Summary A path traversal vulnerability in `/api/chats/import` allows an auth
CVE-2026-5281 8.8 3.03% 8 1 2026-04-01T21:30:28 Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote
CVE-2026-34742 None 0.05% 1 0 2026-04-01T21:09:10 The Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection
CVE-2026-34581 8.1 0.03% 1 0 2026-04-01T20:58:51 ### Summary When using the `Share Token` it is possible to bypass the limited se
CVE-2026-33544 7.7 0.04% 1 0 2026-04-01T19:52:05 ### Summary All three OAuth service implementations (`GenericOAuthService`, `Gi
CVE-2026-28805 8.8 0.03% 2 0 2026-04-01T19:46:02 ## Description Multiple AJAX select handlers in OpenSTAManager <= 2.10.1 are vu
CVE-2026-33579 8.1 0.01% 10 1 2026-04-01T19:07:04.223000 OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /
CVE-2026-4747 8.8 0.18% 2 0 2026-04-01T15:23:23.797000 Each RPCSEC_GSS data packet is validated by a routine which checks a signature i
CVE-2026-5176 7.3 2.96% 2 0 2026-04-01T14:24:02.583000 A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. A
CVE-2026-34601 7.5 0.04% 1 0 2026-04-01T00:19:07 ## Summary `@xmldom/xmldom` allows attacker-controlled strings containing the C
CVE-2026-34453 7.5 2.67% 2 0 template 2026-03-31T23:30:05 ### Summary The publish service exposes bookmarked blocks from password-protecte
CVE-2026-34156 10.0 5.19% 2 1 template 2026-03-31T18:50:36 `##` Summary NocoBase's Workflow Script Node executes user-supplied JavaScript
CVE-2026-4020 7.5 4.66% 2 0 template 2026-03-31T03:31:35 The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exp
CVE-2026-4257 9.8 19.61% 2 0 template 2026-03-31T00:31:19 The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side
CVE-2026-5105 6.3 2.16% 2 0 2026-03-30T18:32:18 A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affe
CVE-2026-5104 6.3 2.16% 2 0 2026-03-30T18:31:16 A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b2022
CVE-2026-5103 6.3 2.16% 2 0 2026-03-30T18:31:16 A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This i
CVE-2026-33645 7.1 0.07% 1 0 2026-03-30T18:12:01.663000 Fireshare facilitates self-hosted media and link sharing. In version 1.5.1, an a
CVE-2026-33641 7.8 0.02% 1 0 2026-03-30T17:01:32 ## Summary Glances supports dynamic configuration values in which substrings enc
CVE-2026-4415 8.1 0.48% 1 0 2026-03-30T13:26:07.647000 Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulner
CVE-2026-4425 None 0.00% 1 0 2026-03-30T12:32:36 Rejected reason: Reserved for EastLink case, but no need for CVE anymore
CVE-2026-5102 6.3 2.16% 2 0 2026-03-30T00:31:08 A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. T
CVE-2026-21536 9.8 0.40% 1 0 2026-03-16T15:40:44.357000 Microsoft Devices Pricing Program Remote Code Execution Vulnerability
CVE-2025-55182 10.0 66.27% 4 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2025-50286 8.1 62.34% 1 2 2025-11-07T19:18:37.380000 A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authen
CVE-2025-30208 5.3 88.96% 1 23 template 2025-03-25T14:00:04 ### Summary The contents of arbitrary files can be returned to the browser. ###
CVE-2025-70951 0 0.00% 3 0 N/A
CVE-2026-26026 0 0.00% 2 0 N/A
CVE-2026-26027 0 0.00% 2 0 N/A
CVE-2026-31931 0 0.05% 1 0 N/A
CVE-2026-28798 0 0.04% 1 0 N/A
CVE-2026-27833 0 0.04% 1 0 N/A
CVE-2026-28289 0 17.68% 1 1 N/A
CVE-2026-34745 0 0.04% 2 0 N/A
CVE-2026-31937 0 0.04% 1 0 N/A
CVE-2026-31935 0 0.04% 1 0 N/A
CVE-2026-33746 0 0.08% 1 0 N/A
CVE-2026-34717 0 0.04% 1 0 N/A
CVE-2026-34840 0 0.05% 1 0 N/A

CVE-2026-5629
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T06:16:22.310000

4 posts

A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

offseq at 2026-04-06T07:30:28.691Z ##

⚠️ CVE-2026-5629: High-severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remote exploit possible — public code out, no patch yet. Restrict device access & monitor vendor updates. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-06T06:22:15.000Z ##

🟠 CVE-2026-5629 - High (8.8)

A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-06T07:30:28.000Z ##

⚠️ CVE-2026-5629: High-severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remote exploit possible — public code out, no patch yet. Restrict device access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity #Belkin

##

thehackerwire@mastodon.social at 2026-04-06T06:22:15.000Z ##

🟠 CVE-2026-5629 - High (8.8)

A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5628
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T06:16:22.087000

4 posts

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted

offseq at 2026-04-06T09:00:29.989Z ##

📢 CVE-2026-5628: HIGH severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remotely exploitable — no patch yet. Restrict mgmt access & disable remote mgmt until fixed. Info: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-06T06:22:06.000Z ##

🟠 CVE-2026-5628 - High (8.8)

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-06T09:00:29.000Z ##

📢 CVE-2026-5628: HIGH severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remotely exploitable — no patch yet. Restrict mgmt access & disable remote mgmt until fixed. Info: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoT #Belkin

##

thehackerwire@mastodon.social at 2026-04-06T06:22:06.000Z ##

🟠 CVE-2026-5628 - High (8.8)

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5614
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T04:16:09.967000

4 posts

A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not res

offseq at 2026-04-06T04:30:28.981Z ##

🔒 HIGH-severity stack buffer overflow in Belkin F9K1015 (v1.00.10) — CVE-2026-5614. Public exploit, no patch, vendor silent. Disable remote access, restrict device exposure. Stay vigilant! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-06T04:17:33.000Z ##

🟠 CVE-2026-5614 - High (8.8)

A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-06T04:30:28.000Z ##

🔒 HIGH-severity stack buffer overflow in Belkin F9K1015 (v1.00.10) — CVE-2026-5614. Public exploit, no patch, vendor silent. Disable remote access, restrict device exposure. Stay vigilant! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vuln #IoTSecurity

##

thehackerwire@mastodon.social at 2026-04-06T04:17:33.000Z ##

🟠 CVE-2026-5614 - High (8.8)

A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5613
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T03:16:07.990000

4 posts

A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

offseq at 2026-04-06T06:00:27.832Z ##

🔔 CVE-2026-5613: HIGH severity stack-based buffer overflow in Belkin F9K1015 v1.00.10. Remote code execution or DoS possible. No patch; exploit public. Restrict mgmt interface, disable remote mgmt. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-06T04:00:50.000Z ##

🟠 CVE-2026-5613 - High (8.8)

A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-06T06:00:27.000Z ##

🔔 CVE-2026-5613: HIGH severity stack-based buffer overflow in Belkin F9K1015 v1.00.10. Remote code execution or DoS possible. No patch; exploit public. Restrict mgmt interface, disable remote mgmt. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #IoT #Vuln

##

thehackerwire@mastodon.social at 2026-04-06T04:00:50.000Z ##

🟠 CVE-2026-5613 - High (8.8)

A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5612
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T03:16:07.790000

2 posts

A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability affects the function formWlEncrypt of the file /goform/formWlEncrypt. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not

thehackerwire@mastodon.social at 2026-04-06T04:00:39.000Z ##

🟠 CVE-2026-5612 - High (8.8)

A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability affects the function formWlEncrypt of the file /goform/formWlEncrypt. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T04:00:39.000Z ##

🟠 CVE-2026-5612 - High (8.8)

A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability affects the function formWlEncrypt of the file /goform/formWlEncrypt. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5611
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T03:16:07.570000

2 posts

A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function formCrossBandSwitch of the file /goform/formCrossBandSwitch. Performing a manipulation of the argument webpage results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any

thehackerwire@mastodon.social at 2026-04-06T04:00:28.000Z ##

🟠 CVE-2026-5611 - High (8.8)

A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function formCrossBandSwitch of the file /goform/formCrossBandSwitch. Performing a manipulation of the argument webpage results in stack-based buffer overflow. The attack can be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T04:00:28.000Z ##

🟠 CVE-2026-5611 - High (8.8)

A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function formCrossBandSwitch of the file /goform/formCrossBandSwitch. Performing a manipulation of the argument webpage results in stack-based buffer overflow. The attack can be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5610
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T02:16:00.927000

4 posts

A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond

offseq at 2026-04-06T03:00:26.148Z ##

⚠️ HIGH severity: Belkin F9K1015 (v1.00.10) stack buffer overflow (CVE-2026-5610) in /goform/formWISP5G. Remotely exploitable, no patch yet. Restrict device exposure & monitor for anomalies. More at radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-06T02:18:13.000Z ##

🟠 CVE-2026-5610 - High (8.8)

A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-06T03:00:26.000Z ##

⚠️ HIGH severity: Belkin F9K1015 (v1.00.10) stack buffer overflow (CVE-2026-5610) in /goform/formWISP5G. Remotely exploitable, no patch yet. Restrict device exposure & monitor for anomalies. More at radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Security

##

thehackerwire@mastodon.social at 2026-04-06T02:18:13.000Z ##

🟠 CVE-2026-5610 - High (8.8)

A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5609
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T02:16:00.670000

2 posts

A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-06T02:18:03.000Z ##

🟠 CVE-2026-5609 - High (8.8)

A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-base...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T02:18:03.000Z ##

🟠 CVE-2026-5609 - High (8.8)

A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-base...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5608
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T01:16:40.367000

4 posts

A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

offseq at 2026-04-06T01:30:25.873Z ##

⚠️ HIGH severity: CVE-2026-5608 in Belkin F9K1122 v1.00.33 enables remote buffer overflow via the /goform/formWlanSetup endpoint. Exploit code is public; no patch from vendor. Restrict remote mgmt access now. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-06T01:18:30.000Z ##

🟠 CVE-2026-5608 - High (8.8)

A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from rem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-06T01:30:25.000Z ##

⚠️ HIGH severity: CVE-2026-5608 in Belkin F9K1122 v1.00.33 enables remote buffer overflow via the /goform/formWlanSetup endpoint. Exploit code is public; no patch from vendor. Restrict remote mgmt access now. radar.offseq.com/threat/cve-20 #OffSeq #Belkin #Vuln

##

thehackerwire@mastodon.social at 2026-04-06T01:18:30.000Z ##

🟠 CVE-2026-5608 - High (8.8)

A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from rem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5605
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T00:30:31

4 posts

A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-06T00:37:25.000Z ##

🟠 CVE-2026-5605 - High (8.8)

A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-06T00:00:36.754Z ##

🚨 HIGH severity: CVE-2026-5605 in Tenda CH22 v1.0.0.1 — stack-based buffer overflow in /goform/WrlExtraSet. No patch yet. Restrict remote access & monitor for threats. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-06T00:37:25.000Z ##

🟠 CVE-2026-5605 - High (8.8)

A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-06T00:00:36.000Z ##

🚨 HIGH severity: CVE-2026-5605 in Tenda CH22 v1.0.0.1 — stack-based buffer overflow in /goform/WrlExtraSet. No patch yet. Restrict remote access & monitor for threats. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity

##

CVE-2026-5604
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-06T00:30:31

2 posts

A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element is the function formCertLocalPrecreate of the file /goform/CertLocalPrecreate of the component Parameter Handler. Performing a manipulation of the argument standard results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for atta

thehackerwire@mastodon.social at 2026-04-05T23:16:37.000Z ##

🟠 CVE-2026-5604 - High (8.8)

A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element is the function formCertLocalPrecreate of the file /goform/CertLocalPrecreate of the component Parameter Handler. Performing a manipulation of the argument standard re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T23:16:37.000Z ##

🟠 CVE-2026-5604 - High (8.8)

A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element is the function formCertLocalPrecreate of the file /goform/CertLocalPrecreate of the component Parameter Handler. Performing a manipulation of the argument standard re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4272
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-06T00:30:31

2 posts

Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085BAA, from A1/B1 Base(IMX25) before BK000763BAA_BK000765BAA_CU000101BAA. This vulnerability could allow a remote attacker within Bluetooth range of the s

thehackerwire@mastodon.social at 2026-04-05T22:16:48.000Z ##

🟠 CVE-2026-4272 - High (8.1)

Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T22:16:48.000Z ##

🟠 CVE-2026-4272 - High (8.1)

Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5567
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-05T15:32:03

2 posts

A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-05T14:00:22.000Z ##

🟠 CVE-2026-5567 - High (8.8)

A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T14:00:22.000Z ##

🟠 CVE-2026-5567 - High (8.8)

A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5566
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-05T15:32:03

2 posts

A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-05T14:00:12.000Z ##

🟠 CVE-2026-5566 - High (8.8)

A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T14:00:12.000Z ##

🟠 CVE-2026-5566 - High (8.8)

A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5558
(6.3 MEDIUM)

EPSS: 0.03%

updated 2026-04-05T10:16:19.933000

2 posts

A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up to 2.1. Impacted is an unknown function of the file /pending-orders.php of the component Parameter Handler. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

offseq at 2026-04-05T10:30:26.358Z ##

⚠️ MEDIUM risk: CVE-2026-5558 allows SQL injection in PHPGurukul Online Shopping Portal (v2.0, 2.1) via /pending-orders.php. Exploit is public. Review your instances & restrict access if needed. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-05T10:30:26.000Z ##

⚠️ MEDIUM risk: CVE-2026-5558 allows SQL injection in PHPGurukul Online Shopping Portal (v2.0, 2.1) via /pending-orders.php. Exploit is public. Review your instances & restrict access if needed. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #PHP #Vuln

##

CVE-2026-5548
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-05T09:30:22

2 posts

A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overflow. The attack can be initiated remotely.

thehackerwire@mastodon.social at 2026-04-05T08:17:52.000Z ##

🟠 CVE-2026-5548 - High (8.8)

A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T08:17:52.000Z ##

🟠 CVE-2026-5548 - High (8.8)

A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5550
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-05T08:16:25.100000

4 posts

A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endpoints might be affected.

offseq at 2026-04-05T09:00:28.602Z ##

🔎 HIGH severity: Tenda AC10 (v16.03.10.10_multi_TDE01) has a stack buffer overflow (CVE-2026-5550) in /bin/httpd. Remote code execution possible. No patch yet — restrict remote mgmt & monitor closely. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-05T08:17:43.000Z ##

🟠 CVE-2026-5550 - High (8.8)

A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T09:00:28.000Z ##

🔎 HIGH severity: Tenda AC10 (v16.03.10.10_multi_TDE01) has a stack buffer overflow (CVE-2026-5550) in /bin/httpd. Remote code execution possible. No patch yet — restrict remote mgmt & monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE2026_5550

##

thehackerwire@mastodon.social at 2026-04-05T08:17:43.000Z ##

🟠 CVE-2026-5550 - High (8.8)

A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5544
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-05T06:32:08

5 posts

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

Matchbook3469@mastodon.social at 2026-04-05T17:22:53.000Z ##

🔶 New security advisory:

CVE-2026-5544 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-04-05T06:24:22.000Z ##

🟠 CVE-2026-5544 - High (8.8)

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-05T06:00:26.012Z ##

🔎 CVE-2026-5544: HIGH severity stack overflow in UTT HiPER 1250GW (≤ v3.2.7-210907-180535). Remote, no auth needed. Public exploit code available — restrict network access & monitor vendor alerts. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-05T06:24:22.000Z ##

🟠 CVE-2026-5544 - High (8.8)

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T06:00:26.000Z ##

🔎 CVE-2026-5544: HIGH severity stack overflow in UTT HiPER 1250GW (≤ v3.2.7-210907-180535). Remote, no auth needed. Public exploit code available — restrict network access & monitor vendor alerts. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CyberSecurity #UTT

##

CVE-2026-2936
(7.2 HIGH)

EPSS: 0.02%

updated 2026-04-04T12:31:04

2 posts

The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_title' parameter in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an admin user accesses the Traffic by T

offseq at 2026-04-05T01:30:26.958Z ##

⚠️ HIGH severity XSS (CVE-2026-2936) in Visitor Traffic Real Time Statistics WP plugin ≤8.4. Unauth attackers can inject persistent scripts via 'page_title', executed by admins. No patch yet — restrict access or disable plugin. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-05T01:30:26.000Z ##

⚠️ HIGH severity XSS (CVE-2026-2936) in Visitor Traffic Real Time Statistics WP plugin ≤8.4. Unauth attackers can inject persistent scripts via 'page_title', executed by admins. No patch yet — restrict access or disable plugin. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS

##

CVE-2026-3666
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-04T12:31:04

4 posts

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authenticated attackers, with subscriber level access and above, to delete arbitrary files on the server by embedding a crafted path traversal string in a forum po

thehackerwire@mastodon.social at 2026-04-05T01:19:59.000Z ##

🟠 CVE-2026-3666 - High (8.8)

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-05T00:00:36.814Z ##

wpForo Forum plugin for WordPress (up to 2.4.16) has a HIGH severity path traversal vuln (CVE-2026-3666) 🛡️. Authenticated users can delete server files. No patch yet — restrict permissions & watch for suspicious deletions. More: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-05T01:19:59.000Z ##

🟠 CVE-2026-3666 - High (8.8)

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T00:00:36.000Z ##

wpForo Forum plugin for WordPress (up to 2.4.16) has a HIGH severity path traversal vuln (CVE-2026-3666) 🛡️. Authenticated users can delete server files. No patch yet — restrict permissions & watch for suspicious deletions. More: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

CVE-2026-1233
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-04T12:16:02.943000

4 posts

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the vendor's external telemetry server in the `Mementor_TTS_Remote_Telemetry` class. This makes it possible for unauthenticated attackers to extract and decod

offseq at 2026-04-05T03:00:26.518Z ##

CVE-2026-1233 (HIGH): The Text to Speech for WP plugin (<=1.9.8) exposes hardcoded MySQL creds, risking unauthorized write access to telemetry DB. No patch yet — disable or restrict access. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-05T01:20:09.000Z ##

🟠 CVE-2026-1233 - High (7.5)

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T03:00:26.000Z ##

CVE-2026-1233 (HIGH): The Text to Speech for WP plugin (<=1.9.8) exposes hardcoded MySQL creds, risking unauthorized write access to telemetry DB. No patch yet — disable or restrict access. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #InfoSec #CVE

##

thehackerwire@mastodon.social at 2026-04-05T01:20:09.000Z ##

🟠 CVE-2026-1233 - High (7.5)

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5425
(7.2 HIGH)

EPSS: 0.06%

updated 2026-04-04T09:30:37

2 posts

The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'feed_data' parameter keys in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

offseq at 2026-04-05T07:30:27.798Z ##

⚠️ HIGH severity: Stored XSS (CVE-2026-5425) in trustindex Widgets for Social Photo Feed (≤1.7.9) allows unauthenticated attackers to inject malicious scripts via 'feed_data'. No patch yet — disable plugin. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-05T07:30:27.000Z ##

⚠️ HIGH severity: Stored XSS (CVE-2026-5425) in trustindex Widgets for Social Photo Feed (≤1.7.9) allows unauthenticated attackers to inject malicious scripts via 'feed_data'. No patch yet — disable plugin. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS #Vuln

##

CVE-2026-3445
(7.1 HIGH)

EPSS: 0.03%

updated 2026-04-04T09:30:37

2 posts

The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to unauthorized membership payment bypass in all versions up to, and including, 4.16.11. This is due to a missing ownership verification on the `change_plan_sub_id` parameter in the `process_checkout()` function. This makes it possible for aut

offseq at 2026-04-05T04:30:26.620Z ##

🚨 HIGH severity: CVE-2026-3445 in ProfilePress plugin lets subscriber-level users bypass paid memberships via missing authorization in process_checkout(). No patch yet. Restrict privileges & monitor activity. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-05T04:30:26.000Z ##

🚨 HIGH severity: CVE-2026-3445 in ProfilePress plugin lets subscriber-level users bypass paid memberships via missing authorization in process_checkout(). No patch yet. Restrict privileges & monitor activity. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-4896
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-04T09:30:31

2 posts

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions including `wcfm_modify_order_status`, `delete_wcfm_article`, `delete_wcfm_product`, and the article management controller due to missing validation on user-suppl

thehackerwire@mastodon.social at 2026-04-05T01:20:19.000Z ##

🟠 CVE-2026-4896 - High (8.1)

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T01:20:19.000Z ##

🟠 CVE-2026-4896 - High (8.1)

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35216
(9.1 CRITICAL)

EPSS: 0.34%

updated 2026-04-04T06:04:59

1 posts

### Summary An unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint. No authentication is required to trigger the exploit. The process executes as `root` inside the container. ### Details **Vulnerable endpoint — `packages/server/src/api/routes/webhook.ts` line 13:** ```typesc

thehackerwire@mastodon.social at 2026-04-04T03:01:21.000Z ##

🔴 CVE-2026-35216 - Critical (9)

Budibase is an open-source low-code platform. Prior to version 3.33.4, an unauthenticated attacker can achieve Remote Code Execution (RCE) on the Budibase server by triggering an automation that contains a Bash step via the public webhook endpoint...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4634
(7.5 HIGH)

EPSS: 0.07%

updated 2026-04-04T06:00:48

2 posts

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.

thehackerwire@mastodon.social at 2026-04-05T03:01:05.000Z ##

🟠 CVE-2026-4634 - High (7.5)

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T03:01:05.000Z ##

🟠 CVE-2026-4634 - High (7.5)

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35616
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-04-04T01:16:39.720000

18 posts

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

2 repos

https://github.com/0xBlackash/CVE-2026-35616

https://github.com/z3r0h3ro/CVE-2026-35616-poc

undercodenews@mastodon.social at 2026-04-06T05:49:01.000Z ##

Fortinet Releases Emergency Patch as Critical FortiClient EMS Vulnerability Faces Active Exploitation + Video

🎯 Introduction: A Critical Security Gap Already Under Attack A newly disclosed vulnerability in Fortinet’s FortiClient EMS platform has escalated into a serious cybersecurity concern, with attackers already exploiting it in real-world environments. The flaw, identified as CVE-2026-35616, carries a high severity rating and exposes organizations to unauthorized…

undercodenews.com/fortinet-rel

##

youranonnewsirc@nerdculture.de at 2026-04-06T03:42:59.000Z ##

US President Trump issued an ultimatum to Iran: reopen the Strait of Hormuz by Tuesday or face strikes, intensifying Middle East tensions and driving up oil prices. NVIDIA unveiled new GPU compression technology, while a Chinese chipmaker claims a 300% performance lead over Nvidia's flagship GPU. In cybersecurity, Fortinet patched an actively exploited critical flaw (CVE-2026-35616) in FortiClient EMS. April has seen a surge in ransomware, including the Marquis fintech attack exposing 672,000 records.

#Cybersecurity #Geopolitics #TechNews

##

youranonnewsirc@nerdculture.de at 2026-04-05T19:42:59.000Z ##

US-Iran geopolitical tensions escalate with downed aircraft and President Trump's threats. (Apr 5, 2026) On technology, Microsoft announced a ¥1.6 trillion investment in Japan for AI infrastructure and cybersecurity. (Apr 4, 2026) In cybersecurity, a critical Fortinet EMS zero-day (CVE-2026-35616) is actively exploited, and the EU Commission confirmed a 300GB data breach from a Trivy supply chain attack. (Apr 4, 2026)

#Cybersecurity #Geopolitics #TechNews

##

cktodon@mas.to at 2026-04-05T15:00:05.000Z ##

Fortinet corrige una #vulnerabilidad crítica explotada activamente en FortiClient EMS (CVE-2026-35616)

unaaldia.hispasec.com/2026/04/

##

beyondmachines1 at 2026-04-05T08:01:10.326Z ##

Fortinet Issues Emergency Hotfix for Actively Exploited FortiClient EMS Zero-Day

Fortinet has released emergency hotfix for an actively exploited critical zero-day vulnerability (CVE-2026-35616) in FortiClient EMS that allows unauthenticated attackers to bypass API security and run arbitrary commands.

**If you use FortiClient EMS versions 7.4.5 or 7.4.6, apply Fortinet's emergency hotfix ASAP. It's being actively exploited andcan give attackers full control of your endpoint management server. While you're at it, check your EMS API logs for any signs of unauthorized access or unusual command execution that might indicate you've already been compromised.**

beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-04-05T03:43:01.000Z ##

Recent global developments on April 4, 2026:

Geopolitical: Trump challenges NATO's future over "Operation Epic Fury" participation; US-Iran conflict ongoing, Planet Labs withholds satellite images.
Technology: AI breakthroughs include Google DeepMind's Alpha Green for code optimization & OpenAI's GPT-6 on smartphones. Green compute initiatives accelerate.
Cybersecurity: Fortinet zero-day (CVE-2026-35616) exploited; EC suffers Trivy supply chain breach. New polymorphic malware & AI-generated bot threats emerge.

#AnonNews_irc #Cybersecurity #News

##

hackerworkspace at 2026-04-04T22:28:25.841Z ##

Fortinet CVE-2026-35616 Actively Exploited - Decipher

decipher.sc/2026/04/04/fortine

Read on HackerWorkspace: hackerworkspace.com/article/fo

##

youranonnewsirc@nerdculture.de at 2026-04-04T19:43:05.000Z ##

Geopolitical tensions escalate as the Iran War continues, leading to the functional closure of the Strait of Hormuz, severely impacting global energy markets. In cybersecurity, the European Commission confirmed a 300GB data breach on April 4, 2026, stemming from a Trivy supply chain attack. Additionally, critical RCE flaws in Progress ShareFile were reported on April 3, 2026, and an actively exploited FortiClient EMS zero-day (CVE-2026-35616) necessitated urgent hotfixes on April 4, 2026.

#AnonNews_irc #Cybersecurity #News

##

youranonnewsirc@nerdculture.de at 2026-04-06T03:42:59.000Z ##

US President Trump issued an ultimatum to Iran: reopen the Strait of Hormuz by Tuesday or face strikes, intensifying Middle East tensions and driving up oil prices. NVIDIA unveiled new GPU compression technology, while a Chinese chipmaker claims a 300% performance lead over Nvidia's flagship GPU. In cybersecurity, Fortinet patched an actively exploited critical flaw (CVE-2026-35616) in FortiClient EMS. April has seen a surge in ransomware, including the Marquis fintech attack exposing 672,000 records.

#Cybersecurity #Geopolitics #TechNews

##

youranonnewsirc@nerdculture.de at 2026-04-05T19:42:59.000Z ##

US-Iran geopolitical tensions escalate with downed aircraft and President Trump's threats. (Apr 5, 2026) On technology, Microsoft announced a ¥1.6 trillion investment in Japan for AI infrastructure and cybersecurity. (Apr 4, 2026) In cybersecurity, a critical Fortinet EMS zero-day (CVE-2026-35616) is actively exploited, and the EU Commission confirmed a 300GB data breach from a Trivy supply chain attack. (Apr 4, 2026)

#Cybersecurity #Geopolitics #TechNews

##

beyondmachines1@infosec.exchange at 2026-04-05T08:01:10.000Z ##

Fortinet Issues Emergency Hotfix for Actively Exploited FortiClient EMS Zero-Day

Fortinet has released emergency hotfix for an actively exploited critical zero-day vulnerability (CVE-2026-35616) in FortiClient EMS that allows unauthenticated attackers to bypass API security and run arbitrary commands.

**If you use FortiClient EMS versions 7.4.5 or 7.4.6, apply Fortinet's emergency hotfix ASAP. It's being actively exploited andcan give attackers full control of your endpoint management server. While you're at it, check your EMS API logs for any signs of unauthorized access or unusual command execution that might indicate you've already been compromised.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-04-05T03:43:01.000Z ##

Recent global developments on April 4, 2026:

Geopolitical: Trump challenges NATO's future over "Operation Epic Fury" participation; US-Iran conflict ongoing, Planet Labs withholds satellite images.
Technology: AI breakthroughs include Google DeepMind's Alpha Green for code optimization & OpenAI's GPT-6 on smartphones. Green compute initiatives accelerate.
Cybersecurity: Fortinet zero-day (CVE-2026-35616) exploited; EC suffers Trivy supply chain breach. New polymorphic malware & AI-generated bot threats emerge.

#AnonNews_irc #Cybersecurity #News

##

hackerworkspace@infosec.exchange at 2026-04-04T22:28:25.000Z ##

Fortinet CVE-2026-35616 Actively Exploited - Decipher

decipher.sc/2026/04/04/fortine

Read on HackerWorkspace: hackerworkspace.com/article/fo

#cybersecurity #vulnerability #exploit

##

youranonnewsirc@nerdculture.de at 2026-04-04T19:43:05.000Z ##

Geopolitical tensions escalate as the Iran War continues, leading to the functional closure of the Strait of Hormuz, severely impacting global energy markets. In cybersecurity, the European Commission confirmed a 300GB data breach on April 4, 2026, stemming from a Trivy supply chain attack. Additionally, critical RCE flaws in Progress ShareFile were reported on April 3, 2026, and an actively exploited FortiClient EMS zero-day (CVE-2026-35616) necessitated urgent hotfixes on April 4, 2026.

#AnonNews_irc #Cybersecurity #News

##

0x3e4@cyberplace.social at 2026-04-04T08:22:25.000Z ##

FortiYikes at it again..

🔐 CVE-2026-35616

📊 CVSS: 9.1 · Critical
📅 04/04/2026, 05:31 AM
🛡️ CWE: CWE-284
📦 Affected: Fortinet FortiClientEMS (>= 7.4.5, <= 7.4.6)
📚 fortiguard.fortinet.com/psirt/ nvd.nist.gov/vuln/detail/CVE-2

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

rxerium@infosec.exchange at 2026-04-04T07:31:20.000Z ##

🚨 Forticlient EMS Zero Day disclosed minutes ago actively being exploited in the wild as being report by @DefusedCyber & @fortinet

I've created a vulnerability detection script to check for vulnerable instances:
github.com/rxerium/rxerium-tem

Fortinet recommends that you install hotfixes for EMS 7.4.5 / 7.4.6 as per their advisory:
fortiguard.com/psirt/FG-IR-26-

##

offseq@infosec.exchange at 2026-04-04T01:30:28.000Z ##

🚨 CRITICAL: CVE-2026-35616 affects Fortinet FortiClientEMS 7.4.5 – 7.4.6. Unauthenticated attackers can run code via crafted requests — leading to total system compromise. Official fix is out. Patch ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Fortinet #Vuln #PatchTuesday

##

thehackerwire@mastodon.social at 2026-04-04T01:21:54.000Z ##

🔴 CVE-2026-35616 - Critical (9.8)

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34780
(8.3 HIGH)

EPSS: 0.04%

updated 2026-04-04T01:16:39.540000

1 posts

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass VideoFrame objects (from the WebCodecs API) across the contextBridge are vulnerable to a context isolation bypass. An attacker who can execute JavaScript in

thehackerwire@mastodon.social at 2026-04-04T01:21:45.000Z ##

🟠 CVE-2026-34780 - High (8.3)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. From versions 39.0.0-alpha.1 to before 39.8.0, 40.0.0-alpha.1 to before 40.7.0, and 41.0.0-alpha.1 to before 41.0.0-beta.8, apps that pass Vide...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34769
(7.7 HIGH)

EPSS: 0.02%

updated 2026-04-04T00:16:17.657000

1 posts

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be appended to the renderer process command line. Apps that construct webPreferences by spreading untrusted configuration objects may inadvertently allow a

thehackerwire@mastodon.social at 2026-04-04T01:14:52.000Z ##

🟠 CVE-2026-34769 - High (7.7)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, an undocumented commandLineSwitches webPreference allowed arbitrary switches to be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34953
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T23:17:06.653000

2 posts

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.

thehackerwire@mastodon.social at 2026-04-04T01:16:47.000Z ##

🔴 CVE-2026-34953 - Critical (9.1)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer toke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-04T00:00:49.000Z ##

⚠️ CRITICAL vuln in PraisonAI (<4.5.97): CVE-2026-34953 allows any bearer token to bypass auth & gain full access to all agent capabilities. Patch to 4.5.97+ now! No exploits yet. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202634953 #infosec #patch

##

CVE-2026-34935
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-03T23:17:05.693000

2 posts

PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. This issue has been patched in version 4.5.69.

offseq@infosec.exchange at 2026-04-04T07:30:29.000Z ##

⚠️ CRITICAL: PraisonAI (v4.5.15 - <4.5.69) vulnerable to OS command injection via - -mcp, allowing arbitrary OS commands (CVE-2026-34935). Patch to 4.5.69+ now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202634935 #PraisonAI #infosec

##

thehackerwire@mastodon.social at 2026-04-04T01:24:08.000Z ##

🔴 CVE-2026-34935 - Critical (9.8)

PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34612
(9.9 CRITICAL)

EPSS: 0.14%

updated 2026-04-03T23:17:04.587000

2 posts

Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/v1/main/flows/search". Once a user is authenticated, simply visiting a crafted link is enough to trigger the vulnerability. The injected payload is execu

offseq@infosec.exchange at 2026-04-04T09:00:28.000Z ##

⚠️ SQL Injection (CVSS 10, CRITICAL) in Kestra < 1.3.7 — authenticated users can trigger RCE via /api/v1/main/flows/search. Patch to v1.3.7 to mitigate. CVE-2026-34612. Details: radar.offseq.com/threat/cve-20 #OffSeq #Kestra #SQLInjection #RCE

##

thehackerwire@mastodon.social at 2026-04-04T01:24:27.000Z ##

🔴 CVE-2026-34612 - Critical (9.9)

Kestra is an open-source, event-driven orchestration platform. Prior to version 1.3.7, Kestra (default docker-compose deployment) contains a SQL Injection vulnerability that leads to Remote Code Execution (RCE) in the following endpoint "GET /api/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33184
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T23:17:03.600000

1 posts

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, the discovery handler accepts a peer-controlled limit during handshake and stores it unchanged. The immediate HandshakeAck path then honors limit = 0 and returns zero contacts, which makes the session look benign. Later, after the same session re

thehackerwire@mastodon.social at 2026-04-04T01:53:21.000Z ##

🟠 CVE-2026-33184 - High (7.5)

nimiq/core-rs-albatross is a Rust implementation of the Nimiq Proof-of-Stake protocol based on the Albatross consensus algorithm. Prior to version 1.3.0, the discovery handler accepts a peer-controlled limit during handshake and stores it unchange...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15620
(8.6 HIGH)

EPSS: 0.01%

updated 2026-04-03T23:17:03.417000

1 posts

HiOS Switch Platform versions 09.1.00 prior to 09.4.05 and 10.3.01 contains a denial-of-service vulnerability in the web interface that allows remote attackers to reboot the affected device by sending a malicious HTTP GET request to a specific endpoint. Attackers can trigger an uncontrolled reboot condition through crafted HTTP requests to cause service disruption and unavailability of the switch.

thehackerwire@mastodon.social at 2026-04-03T01:59:51.000Z ##

🟠 CVE-2025-15620 - High (8.6)

HiOS Switch Platform versions 09.1.00 prior to 09.4.05 and 10.3.01 contains a denial-of-service vulnerability in the web interface that allows remote attackers to reboot the affected device by sending a malicious HTTP GET request to a specific end...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27456
(4.7 MEDIUM)

EPSS: 0.01%

updated 2026-04-03T22:16:25.400000

1 posts

util-linux is a random collection of Linux utilities. Prior to version 2.41.4, a TOCTOU (Time-of-Check-Time-of-Use) vulnerability has been identified in the SUID binary /usr/bin/mount from util-linux. The mount binary, when setting up loop devices, validates the source file path with user privileges via fork() + setuid() + realpath(), but subsequently re-canonicalizes and opens it with root privil

linux@activitypub.awakari.com at 2026-04-05T08:02:24.000Z ## CVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup Information published.

#CVE

Origin | Interest | Match ##

CVE-2026-34824
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-03T21:54:37

1 posts

### Summary An uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unauthenticated attacker can send a rapid succession of WebSocket messages, forcing the server to spawn an unbounded number of operating system threads. This leads to thread exhaustion and Out of Memory (OOM) errors, causing a complete Denial of Service (DoS) for any app

thehackerwire@mastodon.social at 2026-04-04T01:22:20.000Z ##

🟠 CVE-2026-34824 - High (7.5)

Mesop is a Python-based UI framework that allows users to build web applications. From version 1.2.3 to before version 1.2.5, an uncontrolled resource consumption vulnerability exists in the WebSocket implementation of the Mesop framework. An unau...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33950
(9.4 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T21:37:19

1 posts

## Summary According to SignalK's security documentation, when a server is first initialized without security enabled, the **/skServer/enableSecurity** endpoint is intentionally exposed to allow the owner to set up the initial admin account. This initial open access is by design. However, the critical vulnerability is that this route is never deregistered or disabled after the initial successful

thehackerwire@mastodon.social at 2026-04-03T04:00:37.000Z ##

🔴 CVE-2026-33950 - Critical (9.4)

Signal K Server is a server application that runs on a central hub in a boat. Prior to version 2.24.0-beta.4, there is a privilege escalation vulnerability by Admin Role Injection via /enableSecurity. An unauthenticated attacker can gain full Admi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33175
(8.8 HIGH)

EPSS: 0.10%

updated 2026-04-03T21:35:39

1 posts

### Summary An authentication bypass vulnerability in `oauthenticator` allows an attacker with an unverified email address on an Auth0 tenant to login to JupyterHub. When `email` is used as the usrname_claim, this gives users control over their username and the possibility of account takeover. ### Impact This is an **Authentication Bypass Vulnerability**. Any Auth0 tenant leveraging the `Auth0O

thehackerwire@mastodon.social at 2026-04-04T01:53:30.000Z ##

🟠 CVE-2026-33175 - High (8.8)

OAuthenticator is software that allows OAuth2 identity providers to be plugged in and used with JupyterHub. Prior to version 17.4.0, an authentication bypass vulnerability in oauthenticator allows an attacker with an unverified email address on an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31818
(9.6 CRITICAL)

EPSS: 0.01%

updated 2026-04-03T21:34:49

1 posts

## 1. Summary | Field | Value | |-------|-------| | **Title** | SSRF via REST Connector with Empty Default Blacklist Leading to Full Internal Data Exfiltration | | **Product** | Budibase | | **Version** | 3.30.6 (latest stable as of 2026-02-25) | | **Component** | REST Datasource Integration + Backend-Core Blacklist Module | | **Severity** | Critical | | **Attack Vector** | Network | | **Privileg

thehackerwire@mastodon.social at 2026-04-04T03:02:23.000Z ##

🔴 CVE-2026-31818 - Critical (9.6)

Budibase is an open-source low-code platform. Prior to version 3.33.4, a server-side request forgery (SSRF) vulnerability exists in Budibase's REST datasource connector. The platform's SSRF protection mechanism (IP blacklist) is rendered completel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25197
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T21:31:49

2 posts

A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call.

2 repos

https://github.com/MichaelAdamGroberman/ICSA-26-055-03

https://github.com/MichaelAdamGroberman/CVE-2026-25197

offseq@infosec.exchange at 2026-04-04T10:30:27.000Z ##

🚨 CVE-2026-25197 (CRITICAL): Gardyn Cloud API lets authenticated users access other profiles by tweaking ID in API calls (CWE-639). No patch yet — restrict access & monitor for abuse. Details: radar.offseq.com/threat/cve-20 #OffSeq #APIsecurity #CVE202625197

##

thehackerwire@mastodon.social at 2026-04-04T02:15:36.000Z ##

🔴 CVE-2026-25197 - Critical (9.1)

A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-10681
(8.6 HIGH)

EPSS: 0.04%

updated 2026-04-03T21:31:49

1 posts

Storage credentials are hardcoded in the mobile app and device firmware. These credentials do not adequately limit end user permissions and do not expire within a reasonable amount of time. This vulnerability may grant unauthorized access to production storage containers.

2 repos

https://github.com/MichaelAdamGroberman/ICSA-26-055-03

https://github.com/MichaelAdamGroberman/CVE-2025-10681

thehackerwire@mastodon.social at 2026-04-04T02:27:23.000Z ##

🟠 CVE-2025-10681 - High (8.6)

Storage credentials are hardcoded in the mobile app and device firmware. These credentials do not adequately limit end user permissions and do not expire within a reasonable amount of time. This vulnerability may grant unauthorized access to produ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22665
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:31:49

1 posts

prompts.chat prior to commit 1464475 contains an identity confusion vulnerability due to inconsistent case-sensitive and case-insensitive handling of usernames across write and read paths, allowing attackers to create case-variant usernames that bypass uniqueness checks. Attackers can exploit non-deterministic username resolution to impersonate victim accounts, replace profile content on canonical

thehackerwire@mastodon.social at 2026-04-04T02:15:27.000Z ##

🟠 CVE-2026-22665 - High (8.1)

prompts.chat prior to commit 1464475 contains an identity confusion vulnerability due to inconsistent case-sensitive and case-insensitive handling of usernames across write and read paths, allowing attackers to create case-variant usernames that b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28766
(9.3 CRITICAL)

EPSS: 0.07%

updated 2026-04-03T21:31:49

1 posts

A specific endpoint exposes all user account information for registered Gardyn users without requiring authentication.

2 repos

https://github.com/MichaelAdamGroberman/CVE-2026-28766

https://github.com/MichaelAdamGroberman/ICSA-26-055-03

thehackerwire@mastodon.social at 2026-04-04T02:02:09.000Z ##

🔴 CVE-2026-28766 - Critical (9.3)

A specific endpoint exposes all user account information for registered Gardyn users without requiring authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35558
(7.8 HIGH)

EPSS: 0.04%

updated 2026-04-03T21:31:49

1 posts

Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection parameters that are processed by the driver during user-initiated authentication. To remediate this issue, users should upgrade to version 2.1.0.0.

thehackerwire@mastodon.social at 2026-04-04T02:02:00.000Z ##

🟠 CVE-2026-35558 - High (7.8)

Improper neutralization of special elements in the authentication components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to execute arbitrary code or redirect authentication flows by using specially crafted connection pa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35562
(7.5 HIGH)

EPSS: 0.08%

updated 2026-04-03T21:31:49

1 posts

Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during the driver's parsing operations. To remediate this issue, users should upgrade to version 2.1.0.0.

thehackerwire@mastodon.social at 2026-04-04T01:59:49.000Z ##

🟠 CVE-2026-35562 - High (7.5)

Allocation of resources without limits in the parsing components in Amazon Athena ODBC driver before 2.1.0.0 might allow a threat actor to cause a denial of service by delivering crafted input that triggers excessive resource consumption during th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22661
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-03T21:31:48

1 posts

prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path traversal sequences. Attackers can exploit missing server-side filename validation to inject path traversal sequences ../ into skill file archives, which

thehackerwire@mastodon.social at 2026-04-04T02:27:32.000Z ##

🟠 CVE-2026-22661 - High (8.1)

prompts.chat prior to commit 0f8d4c3 contains a path traversal vulnerability in skill file handling that allows attackers to write arbitrary files to the client system by crafting malicious ZIP archives with unsanitized filenames containing path t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5485
(7.8 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:17:12.603000

1 posts

OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the driver during a local user-initiated connection. To remediate this issue, users should upgrade to version 2.0.5.1 or later.

thehackerwire@mastodon.social at 2026-04-04T01:59:59.000Z ##

🟠 CVE-2026-5485 - High (7.8)

OS command injection in the browser-based authentication component in Amazon Athena ODBC driver before 2.0.5.1 on Linux might allow a threat actor to execute arbitrary code by using specially crafted connection parameters that are loaded by the dr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32646
(7.5 HIGH)

EPSS: 0.07%

updated 2026-04-03T21:17:11.137000

1 posts

A specific administrative endpoint is accessible without proper authentication, exposing device management functions.

2 repos

https://github.com/MichaelAdamGroberman/ICSA-26-055-03

https://github.com/MichaelAdamGroberman/CVE-2026-32646

thehackerwire@mastodon.social at 2026-04-04T02:00:09.000Z ##

🟠 CVE-2026-32646 - High (7.5)

A specific administrative endpoint is accessible without proper authentication, exposing device management functions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22664
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:17:09.513000

1 posts

prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token parameter. Attackers can exploit the lack of URL validation to disclose the FAL_API_KEY in the Authorization header, enabling credential theft, internal netw

thehackerwire@mastodon.social at 2026-04-04T02:15:17.000Z ##

🟠 CVE-2026-22664 - High (7.7)

prompts.chat prior to commit 30a8f04 contains a server-side request forgery vulnerability in Fal.ai media status polling that allows authenticated users to perform arbitrary outbound requests by supplying attacker-controlled URLs in the token para...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22663
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:17:09.337000

1 posts

prompts.chat prior to commit 7b81836 contains multiple authorization bypass vulnerabilities due to missing isPrivate checks across API endpoints and page metadata generation that allow unauthorized users to access sensitive data associated with private prompts. Attackers can exploit these missing authorization checks to retrieve private prompt version history, change requests, examples, current co

thehackerwire@mastodon.social at 2026-04-04T02:02:18.000Z ##

🟠 CVE-2026-22663 - High (7.5)

prompts.chat prior to commit 7b81836 contains multiple authorization bypass vulnerabilities due to missing isPrivate checks across API endpoints and page metadata generation that allow unauthorized users to access sensitive data associated with pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25726
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-03T20:16:02.263000

1 posts

Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to generate critical security secrets, including the secret_key, and hash_id_salt. These secrets are generated upon first startup and persisted in the database. An attacker can exploit this by obtaining the

thehackerwire@mastodon.social at 2026-04-04T02:27:42.000Z ##

🟠 CVE-2026-25726 - High (8.1)

Cloudreve is a self-hosted file management and sharing system. Prior to version 4.13.0, the application uses the weak pseudo-random number generator math/rand seeded with time.Now().UnixNano() to generate critical security secrets, including the s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34758
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T19:52:26.097000

1 posts

OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows SMS/Call/Email/WhatsApp abuse and phone number purchase. This issue has been patched in version 10.0.42.

thehackerwire@mastodon.social at 2026-04-03T02:03:29.000Z ##

🔴 CVE-2026-34758 - Critical (9.1)

OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows SMS/Call/Email/WhatsApp abuse and phone number purchase. This iss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34752
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T19:50:42.600000

1 posts

Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the Haraka worker process. This issue has been patched in version 3.1.4.

thehackerwire@mastodon.social at 2026-04-04T05:00:46.000Z ##

🟠 CVE-2026-34752 - High (7.5)

Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the Haraka worker process. This issue has been patched in version 3.1.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34524
(8.3 HIGH)

EPSS: 0.05%

updated 2026-04-03T19:17:22.687000

1 posts

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat endpoints allows an authenticated attacker to read and delete arbitrary files under their user data root (for example secrets.json and settings.json) by

thehackerwire@mastodon.social at 2026-04-03T03:06:04.000Z ##

🟠 CVE-2026-34524 - High (8.3)

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in chat ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28373
(9.7 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T18:31:34

2 posts

The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the victim's filesystem.

Matchbook3469@mastodon.social at 2026-04-04T22:58:06.000Z ##

🔴 New security advisory:

CVE-2026-28373 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-04-04T03:00:32.000Z ##

🔴 CVE-2026-28373 - Critical (9.6)

The Stackfield Desktop App before 1.10.2 for macOS and Windows contains a path traversal vulnerability in certain decryption functionality when processing the filePath property. A malicious export can write arbitrary content to any path on the vic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0545
(9.1 CRITICAL)

EPSS: 0.20%

updated 2026-04-03T18:31:34

1 posts

In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution is enabled (`MLFLOW_SERVER_ENABLE_JOB_EXECUTION=true`) and any job function is allowlisted, any network client can submit, read, search, and cancel jobs w

thehackerwire@mastodon.social at 2026-04-04T03:00:22.000Z ##

🔴 CVE-2026-0545 - Critical (9.1)

In mlflow/mlflow, the FastAPI job endpoints under `/ajax-api/3.0/jobs/*` are not protected by authentication or authorization when the `basic-auth` app is enabled. This vulnerability affects the latest version of the repository. If job execution i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26477
(7.5 HIGH)

EPSS: 0.11%

updated 2026-04-03T18:31:21

1 posts

An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file

thehackerwire@mastodon.social at 2026-04-04T03:02:33.000Z ##

🟠 CVE-2026-26477 - High (7.5)

An issue in Dokuwiki v.2025-05-14b 'Librarian' allows a remote attacker to cause a denial of service via the media_upload_xhr() function in the media.php file

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43202
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-03T18:31:17

1 posts

This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.

thehackerwire@mastodon.social at 2026-04-04T05:09:19.000Z ##

🟠 CVE-2025-43202 - High (8.8)

This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43219
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-03T18:31:17

1 posts

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

thehackerwire@mastodon.social at 2026-04-03T02:30:28.000Z ##

🟠 CVE-2025-43219 - High (8.8)

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43264
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-03T17:56:53.233000

1 posts

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

thehackerwire@mastodon.social at 2026-04-03T02:21:38.000Z ##

🟠 CVE-2025-43264 - High (8.8)

The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.6. Processing a maliciously crafted image may corrupt process memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35218
(8.7 HIGH)

EPSS: 0.03%

updated 2026-04-03T16:16:41.977000

1 posts

Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user with Builder access can create a table, automation, view, or query whose name contains an HTML payload (e.g. <img src=x onerror=alert(document.domain)>).

thehackerwire@mastodon.social at 2026-04-04T03:01:31.000Z ##

🟠 CVE-2026-35218 - High (8.7)

Budibase is an open-source low-code platform. Prior to version 3.32.5, Budibase's Builder Command Palette renders entity names (tables, views, queries, automations) using Svelte's {@html} directive without any sanitization. An authenticated user w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35214
(8.7 HIGH)

EPSS: 0.11%

updated 2026-04-03T16:16:41.607000

1 posts

Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attacker with Global Builder privileges can craft a multipart upload with a filename containing ../ to delete arbitrary directories via rmSync and write arbit

thehackerwire@mastodon.social at 2026-04-04T03:01:12.000Z ##

🟠 CVE-2026-35214 - High (8.7)

Budibase is an open-source low-code platform. Prior to version 3.33.4, the plugin file upload endpoint (POST /api/plugin/upload) passes the user-supplied filename directly to createTempFolder() without sanitizing path traversal sequences. An attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59711
(8.3 HIGH)

EPSS: 0.87%

updated 2026-04-03T16:16:22.840000

1 posts

An issue was discovered in Biztalk360 before 11.5. Because of mishandling of user-provided input in an upload mechanism, an authenticated attacker is able to write files outside of the destination directory and/or coerce an authentication from the service, aka Directory Traversal.

thehackerwire@mastodon.social at 2026-04-04T03:02:43.000Z ##

🟠 CVE-2025-59711 - High (8.3)

An issue was discovered in Biztalk360 before 11.5. Because of mishandling of user-provided input in an upload mechanism, an authenticated attacker is able to write files outside of the destination directory and/or coerce an authentication from the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20093
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T16:11:11.357000

1 posts

A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as&nbsp;Admin. This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device.

beyondmachines1@infosec.exchange at 2026-04-02T16:01:27.000Z ##

Critical Cisco IMC Authentication Bypass Allows Remote Administrative Takeover

Cisco patched a critical authentication bypass (CVE-2026-20093) in its Integrated Management Controller that allows unauthenticated attackers to gain Admin access by changing passwords via crafted HTTP requests.

**If your organization is running Cisco FMC on-premise, SSM On-Prem, or UCS servers with exposed IMC interfaces, consider this urgent and critical. Your immediate first step must be to ensure the web and management interfaces for all these devices are strictly isolated and accessible only from highly trusted internal networks. Even if you have them isolated, threat actors will weaponize these flaws and look for a way in.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-20160
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-04-03T16:11:11.357000

1 posts

A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host. This vulnerability is due to the unintentional exposure of an&nbsp;internal service. An attacker could exploit this vulnerability by sending a crafted request to the API of the expo

beyondmachines1@infosec.exchange at 2026-04-02T15:01:26.000Z ##

Critical Cisco Smart Software Manager Vulnerability Allows Root Command Execution

Cisco patched a critical unauthenticated remote code execution vulnerability (CVE-2026-20160) in its Smart Software Manager On-Prem platform that allows attackers to gain root access. The flaw is caused by an exposed internal API and requires no user interaction to exploit.

**Treat this Cisco SSM update as an emergency priority because it allows full root access without a password and has no available workarounds. First, make sure the SSM is isolated from the internet and accessible only from trusted networks. Even with that, patch ASAP. Since license managers often have broad network reach, a compromise here provides attackers an ideal platform for lateral movement across your entire infrastructure.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-4636
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-03T16:10:52.680000

2 posts

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling th

thehackerwire@mastodon.social at 2026-04-05T03:01:15.000Z ##

🟠 CVE-2026-4636 - High (8.1)

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, ev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T03:01:15.000Z ##

🟠 CVE-2026-4636 - High (8.1)

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, ev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31933
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:52.680000

2 posts

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.

thehackerwire@mastodon.social at 2026-04-05T01:59:56.000Z ##

🟠 CVE-2026-31933 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T01:59:56.000Z ##

🟠 CVE-2026-31933 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31932
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:52.680000

1 posts

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, inefficiency in KRB5 buffering can lead to performance degradation. This issue has been patched in versions 7.0.15 and 8.0.4.

thehackerwire@mastodon.social at 2026-04-04T06:00:13.000Z ##

🟠 CVE-2026-31932 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, inefficiency in KRB5 buffering can lead to performance degradation. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35168
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-03T16:10:52.680000

1 posts

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-database) that accepts a JSON array of SQL statements via POST and executes them directly against the database without any validation, allowlist, or sanitizati

thehackerwire@mastodon.social at 2026-04-04T05:09:28.000Z ##

🟠 CVE-2026-35168 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-databa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31934
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:52.680000

1 posts

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, there is a quadratic complexity issue when searching for URLs in mime encoded messages over SMTP leading to a performance impact. This issue has been patched in version 8.0.4.

thehackerwire@mastodon.social at 2026-04-03T07:08:53.000Z ##

🟠 CVE-2026-31934 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, there is a quadratic complexity issue when searching for URLs in mime encoded messages over SMTP leading to a performance impact. This issue has been patche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34728
(8.7 HIGH)

EPSS: 0.19%

updated 2026-04-03T16:10:52.680000

1 posts

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenated with the base upload directory path without any path traversal validation. The FILTER_SANITIZE_SPECIAL_CHARS filter only encodes HTML special characte

thehackerwire@mastodon.social at 2026-04-03T07:00:27.000Z ##

🟠 CVE-2026-34728 - High (8.7)

phpMyFAQ is an open source FAQ web application. Prior to version 4.1.1, the MediaBrowserController::index() method handles file deletion for the media browser. When the fileRemove action is triggered, the user-supplied name parameter is concatenat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34791
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-03T16:10:52.680000

1 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T07:00:17.000Z ##

🟠 CVE-2026-34791 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_proxy.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34794
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-03T16:10:52.680000

2 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:05:16.000Z ##

🟠 CVE-2026-34794 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-03T06:01:02.000Z ##

🟠 CVE-2026-34794 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_ids.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34795
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-03T16:10:52.680000

1 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:01:10.000Z ##

🟠 CVE-2026-34795 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_log.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34797
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-03T16:10:52.680000

1 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_smtp.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:01:01.000Z ##

🟠 CVE-2026-34797 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_smtp.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35467
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-03T16:10:23.730000

1 posts

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

thehackerwire@mastodon.social at 2026-04-04T05:00:27.000Z ##

🟠 CVE-2026-35467 - High (7.5)

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25773
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-03T16:10:23.730000

1 posts

** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, which is stored in the database and later executed unsanitized when the category reorder API processes the stored value. This Second-Order SQL Injection (Tim

thehackerwire@mastodon.social at 2026-04-04T04:00:19.000Z ##

🟠 CVE-2026-25773 - High (8.1)

** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, whic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33105
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T16:10:23.730000

2 posts

Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.

vitobotta@mastodon.social at 2026-04-03T13:02:01.000Z ##

CVE-2026-33105 hits Azure Kubernetes Service with CVSS 10.0. Unauthenticated remote privilege escalation - Microsoft patched it but check your AKS clusters. Critical severity, no user interaction required.

##

thehackerwire@mastodon.social at 2026-04-03T01:02:27.000Z ##

🔴 CVE-2026-33105 - Critical (10)

Improper authorization in Microsoft Azure Kubernetes Service allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34743
(0 None)

EPSS: 0.04%

updated 2026-04-03T16:10:23.730000

1 posts

XZ Utils provide a general-purpose data-compression library plus command-line tools. Prior to version 5.8.3, if lzma_index_decoder() was used to decode an Index that contained no Records, the resulting lzma_index was left in a state where where a subsequent lzma_index_append() would allocate too little memory, and a buffer overflow would occur. This issue has been patched in version 5.8.3.

beyondmachines1@infosec.exchange at 2026-04-03T10:01:27.000Z ##

XZ Utils 5.8.3 Released to Patch Buffer Overflow and Memory Access Flaws

XZ Utils version 5.8.3 addresses a critical buffer overflow (CVE-2026-34743) and a 32-bit memory access flaw affecting versions 5.0.0 and later. Although developers consider the real-world risk low, security organizations have assigned a CVSS score of 9.8 due to the potential for arbitrary code execution.

**Even if developers claim a bug is hard to hit, a CVSS 9.8 in a core library like XZ requires attention. Plan an update of your Linux distributions and container images now to ensure this foundational component isn't a weak link in your supply chain.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-34838
(9.9 CRITICAL)

EPSS: 0.45%

updated 2026-04-03T16:10:23.730000

2 posts

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.156, 25.0.90, and 26.0.12, a vulnerability in the AbstractSettingsCollection model leads to insecure deserialization when these settings are loaded. By injecting a serialized FileCookieJar object into a setting string, an authenticated attacker can achieve Arbitrary File Write, leading directly

1 repos

https://github.com/bamuwe/CVE-2026-34838

offseq@infosec.exchange at 2026-04-03T09:00:27.000Z ##

🚨 CVE-2026-34838 (CRITICAL, CVSS 10): Group-Office <6.8.156, <25.0.90, <26.0.12 vulnerable to insecure deserialization (CWE-502). Authenticated attackers can achieve RCE by injecting malicious serialized objects. Patch now! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RCE

##

thehackerwire@mastodon.social at 2026-04-03T02:00:04.000Z ##

🔴 CVE-2026-34838 - Critical (9.9)

Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.156, 25.0.90, and 26.0.12, a vulnerability in the AbstractSettingsCollection model leads to insecure deserialization when these settings are l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5463
(8.6 HIGH)

EPSS: 0.85%

updated 2026-04-03T16:10:23.730000

2 posts

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the Metasploit console to execute additional unintended commands, potentially leading to arbitrary command execution and manipulation of Metasploit sessions.

offseq@infosec.exchange at 2026-04-03T06:00:27.000Z ##

⚠️ CRITICAL vuln: pymetasploit3 ≤1.0.6 (CVE-2026-5463) lets attackers inject commands via newline chars in console.run_module_with_output(), risking full session compromise. Avoid untrusted input, watch for patches. radar.offseq.com/threat/cve-20 #OffSeq #CVE20265463 #infosec

##

thehackerwire@mastodon.social at 2026-04-03T06:00:15.000Z ##

🟠 CVE-2026-5463 - High (8.6)

Command injection vulnerability in console.run_module_with_output() in pymetasploit3 through version 1.0.6 allows attackers to inject newline characters into module options such as RHOSTS. This breaks the intended command structure and causes the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30332
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-03T16:10:23.730000

1 posts

A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code via replacing a legitimate script with a crafted payload during the flashing process.

1 repos

https://github.com/B1tBreaker/CVE-2026-30332

thehackerwire@mastodon.social at 2026-04-03T05:00:23.000Z ##

🟠 CVE-2026-30332 - High (7.5)

A Time-of-Check to Time-of-Use (TOCTOU) race condition vulnerability in Balena Etcher for Windows prior to v2.1.4 allows attackers to escalate privileges and execute arbitrary code via replacing a legitimate script with a crafted payload during th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5350
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:23.730000

1 posts

A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor confirms, that "[t]he product in question (...) has bee

thehackerwire@mastodon.social at 2026-04-03T04:02:43.000Z ##

🟠 CVE-2026-5350 - High (8.8)

A security flaw has been discovered in Trendnet TEW-657BRM 1.00.1. The impacted element is the function update_pcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba results in stack-based buffer overflow. The attack can be launc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25212
(9.9 CRITICAL)

EPSS: 0.04%

updated 2026-04-03T16:10:23.730000

1 posts

An issue was discovered in Percona PMM before 3.7. Because an internal database user retains specific superuser privileges, an attacker with pmm-admin rights can abuse the "Add data source" feature to break out of the database context and execute shell commands on the underlying operating system.

thehackerwire@mastodon.social at 2026-04-03T04:00:55.000Z ##

🔴 CVE-2026-25212 - Critical (9.9)

An issue was discovered in Percona PMM before 3.7. Because an internal database user retains specific superuser privileges, an attacker with pmm-admin rights can abuse the "Add data source" feature to break out of the database context and execute ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-65114
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-03T16:10:23.730000

1 posts

Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1. Users are recommended to upgrade to version 9.2.13 or 10.1.2, which fix the issue.

thehackerwire@mastodon.social at 2026-04-03T04:00:46.000Z ##

🟠 CVE-2025-65114 - High (7.5)

Apache Traffic Server allows request smuggling if chunked messages are malformed. 

This issue affects Apache Traffic Server: from 9.0.0 through 9.2.12, from 10.0.0 through 10.1.1.

Users are recommended to upgrade to version 9.2.13 or 10.1.2, wh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35385
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:23.730000

2 posts

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

thehackerwire@mastodon.social at 2026-04-03T03:06:14.000Z ##

🟠 CVE-2026-35385 - High (7.5)

In OpenSSH before 10.3, a file downloaded by scp may be installed setuid or setgid, an outcome contrary to some users' expectations, if the download is performed as root with -O (legacy scp protocol) and without -p (preserve mode).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-04-02T18:24:41.000Z ##

Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.

openssh.org/txt/release-10.3

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388

##

CVE-2026-34577
(8.6 HIGH)

EPSS: 0.09%

updated 2026-04-03T16:10:23.730000

1 posts

Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /public/stream endpoint in PublicController accepts a user-supplied url query parameter and proxies the full HTTP response back to the caller. The only validation is url.endsWith('mp4'), which is trivially bypassable by appending .mp4 as a query parameter value or URL fragment. The endpoint requires no authentication an

thehackerwire@mastodon.social at 2026-04-03T03:01:44.000Z ##

🟠 CVE-2026-34577 - High (8.6)

Postiz is an AI social media scheduling tool. Prior to version 2.21.3, the GET /public/stream endpoint in PublicController accepts a user-supplied url query parameter and proxies the full HTTP response back to the caller. The only validation is ur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34827
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:23.730000

1 posts

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." using repeated String#index searches combined with String#slice! prefix deletion. For escape-heavy quoted values, this causes super-linear processing. An una

thehackerwire@mastodon.social at 2026-04-03T03:01:25.000Z ##

🟠 CVE-2026-34827 - High (7.5)

Rack is a modular Ruby web server interface. From versions 3.0.0.beta1 to before 3.1.21, and 3.2.0 to before 3.2.6, Rack::Multipart::Parser#handle_mime_head parses quoted multipart parameters such as Content-Disposition: form-data; name="..." usin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34725
(8.2 HIGH)

EPSS: 0.02%

updated 2026-04-03T16:10:23.730000

1 posts

DbGate is cross-platform database manager. From version 7.0.0 to before version 7.1.5, a stored XSS vulnerability exists in DbGate because attacker-controlled SVG icon strings are rendered as raw HTML without sanitization. In the web UI this allows script execution in another user's browser; in the Electron desktop app this can escalate to local code execution because Electron is configured with n

thehackerwire@mastodon.social at 2026-04-03T02:30:46.000Z ##

🟠 CVE-2026-34725 - High (8.2)

DbGate is cross-platform database manager. From version 7.0.0 to before version 7.1.5, a stored XSS vulnerability exists in DbGate because attacker-controlled SVG icon strings are rendered as raw HTML without sanitization. In the web UI this allow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32173
(8.6 HIGH)

EPSS: 0.06%

updated 2026-04-03T16:10:23.730000

1 posts

Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-04-03T01:22:38.000Z ##

🟠 CVE-2026-32173 - High (8.6)

Improper authentication in Azure SRE Agent allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35386
(3.6 LOW)

EPSS: 0.01%

updated 2026-04-03T16:10:23.730000

1 posts

In OpenSSH before 10.3, command execution can occur via shell metacharacters in a username within a command line. This requires a scenario where the username on the command line is untrusted, and also requires a non-default configurations of % in ssh_config.

cR0w@infosec.exchange at 2026-04-02T18:24:41.000Z ##

Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.

openssh.org/txt/release-10.3

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388

##

CVE-2026-3502
(7.8 HIGH)

EPSS: 1.32%

updated 2026-04-03T11:40:57.390000

5 posts

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

2 repos

https://github.com/fevar54/CVE-2026-3502-Scanner---TrueConf-Vulnerability-Detection-Tool

https://github.com/fevar54/CVE-2026-3502---TrueConf-Client-Update-Hijacking-PoC

youranonnewsirc@nerdculture.de at 2026-04-03T03:43:09.000Z ##

Geopolitical tensions escalate between Algeria and Morocco, impacting European security and energy stability. In technology, IBM and Arm announced a strategic collaboration on new dual-architecture hardware for future AI and data-intensive workloads. On the cybersecurity front, CISA added a new exploited vulnerability (CVE-2026-3502) to its catalog, while L.A. Metro confirmed a mid-March hack, with systems still being restored.

#AnonNews_irc #Cybersecurity #News

##

secdb@infosec.exchange at 2026-04-02T22:00:15.000Z ##

🚨 [CISA-2026:0402] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-3502 (secdb.nttzen.cloud/cve/detail/)
- Name: TrueConf Client Download of Code Without Integrity Check Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: TrueConf
- Product: Client
- Notes: trueconf.com/blog/update/truec ; trueconf.com/downloads/windows ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260402 #cisa20260402 #cve_2026_3502 #cve20263502

##

cisakevtracker@mastodon.social at 2026-04-02T21:00:59.000Z ##

CVE ID: CVE-2026-3502
Vendor: TrueConf
Product: Client
Date Added: 2026-04-02
Notes: trueconf.com/blog/update/truec ; trueconf.com/downloads/windows ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2026-04-02T20:01:26.000Z ##

TrueConf Zero-Day Exploited in Targeted Government Attacks

China-nexus attackers exploited a zero-day vulnerability (CVE-2026-3502) in TrueConf's update mechanism to deploy the Havoc C2 framework across Southeast Asian government networks. The flaw allows attackers who compromise an on-premises server to push malicious updates to all connected clients without verification.

**If you use TrueConf for videoconferencing, update all Windows clients to version 8.5.3 immediately. Also check your systems for signs of compromise. Look for files like poweriso.exe or iscsiexe.dll in unexpected folders, and make sure any trueconf_windows_update.exe file has a valid digital signature before allowing it to run.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-04-02T17:22:57.000Z ##

Broadcom has several advisories today, three critical and one high-severity, plus more support.broadcom.com/web/ecx/s #Broadcom

CISA has added to the KEV catalogue:

- CVE-2026-3502: TrueConf Client Download of Code Without Integrity Check Vulnerability cve.org/CVERecord?id=CVE-2026-

- Three industrial vulnerabilities added cisa.gov/ #CISA

Cisco has tagged Apple for zero-day reports talosintelligence.com/vulnerab @TalosSecurity #Cisco #Apple #infosec #vulnerability

##

CVE-2026-4350
(8.1 HIGH)

EPSS: 0.10%

updated 2026-04-03T09:30:21

1 posts

The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without any sanitization, authorization check, or nonce verification. The unsanitized filename is concatenated with the storage directory path and passed to `unli

thehackerwire@mastodon.social at 2026-04-04T04:00:29.000Z ##

🟠 CVE-2026-4350 - High (8.1)

The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28815(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-04-03T03:39:42

1 posts

### Summary The X-Wing decapsulation path accepts attacker-controlled encapsulated ciphertext bytes without enforcing the required fixed ciphertext length. The decapsulation call is forwarded into a C API, which expects a compile-time fixed-size ciphertext buffer of 1120 bytes. This creates an FFI memory-safety boundary issue when a shorter `Data` value is passed in, because the C code may read b

thehackerwire@mastodon.social at 2026-04-04T04:00:39.000Z ##

🟠 CVE-2026-28815 - High (7.5)

A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34774
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-03T02:42:31

1 posts

### Impact Apps that use offscreen rendering and allow child windows via `window.open()` may be vulnerable to a use-after-free. If the parent offscreen `WebContents` is destroyed while a child window remains open, subsequent paint frames on the child dereference freed memory, which may lead to a crash or memory corruption. Apps are only affected if they use offscreen rendering (`webPreferences.of

thehackerwire@mastodon.social at 2026-04-04T01:14:42.000Z ##

🟠 CVE-2026-34774 - High (8.1)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 39.8.1, 40.7.0, and 41.0.0, apps that use offscreen rendering and allow child windows via window.open() may be vulnerable to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34771
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T02:40:26

1 posts

### Impact Apps that register an asynchronous `session.setPermissionRequestHandler()` may be vulnerable to a use-after-free when handling fullscreen, pointer-lock, or keyboard-lock permission requests. If the requesting frame navigates or the window closes while the permission handler is pending, invoking the stored callback dereferences freed memory, which may lead to a crash or memory corruption

thehackerwire@mastodon.social at 2026-04-04T01:15:00.000Z ##

🟠 CVE-2026-34771 - High (7.5)

Electron is a framework for writing cross-platform desktop applications using JavaScript, HTML and CSS. Prior to versions 38.8.6, 39.8.0, 40.7.0, and 41.0.0-beta.8, apps that register an asynchronous session.setPermissionRequestHandler() may be vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32213
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T00:31:15

2 posts

Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.

offseq@infosec.exchange at 2026-04-03T07:30:27.000Z ##

🛑 CRITICAL: CVE-2026-32213 impacts Azure AI Foundry. Improper authorization lets remote attackers fully compromise systems — no auth needed! Restrict access, enhance monitoring, & prep IR now. radar.offseq.com/threat/cve-20 #OffSeq #Azure #Cloud #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-04-03T01:22:58.000Z ##

🔴 CVE-2026-32213 - Critical (10)

Improper authorization in Azure AI Foundry allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33107
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T00:31:15

1 posts

Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-04-03T01:02:35.000Z ##

🔴 CVE-2026-33107 - Critical (10)

Server-side request forgery (ssrf) in Azure Databricks allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32211
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T00:31:14

1 posts

Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-04-03T01:22:48.000Z ##

🔴 CVE-2026-32211 - Critical (9.1)

Missing authentication for critical function in Azure MCP Server allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26135
(9.6 CRITICAL)

EPSS: 0.05%

updated 2026-04-03T00:31:14

1 posts

Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-04-03T01:02:44.000Z ##

🔴 CVE-2026-26135 - Critical (9.6)

Server-side request forgery (ssrf) in Azure Custom Locations Resource Provider (RP) allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-58136
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-02T21:34:00

1 posts

A bug in POST request handling causes a crash under a certain condition. This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12. Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the issue. A workaround for older versions is to set proxy.config.http.request_buffer_enabled to 0 (the default value is 0).

thehackerwire@mastodon.social at 2026-04-03T04:02:26.000Z ##

🟠 CVE-2025-58136 - High (7.5)

A bug in POST request handling causes a crash under a certain condition.

This issue affects Apache Traffic Server: from 10.0.0 through 10.1.1, from 9.0.0 through 9.2.12.

Users are recommended to upgrade to version 10.1.2 or 9.2.13, which fix the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5429
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-02T21:33:03

1 posts

Unsanitized input during web page generation in the Kiro Agent webview in Kiro IDE before version 0.8.140 allows a remote unauthenticated threat actor to execute arbitrary code via a potentially damaging crafted color theme name when a local user opens the workspace. This issue requires the user to trust the workspace when prompted. To remediate this issue, users should upgrade to version 0.8.140

thehackerwire@mastodon.social at 2026-04-03T02:00:29.000Z ##

🟠 CVE-2026-5429 - High (7.8)

Unsanitized input during web page generation in the Kiro Agent webview in Kiro IDE before version 0.8.140 allows a remote unauthenticated threat actor to execute arbitrary code via a potentially damaging crafted color theme name when a local user ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43257
(8.7 HIGH)

EPSS: 0.01%

updated 2026-04-02T21:33:02

1 posts

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.6. An app may be able to break out of its sandbox.

thehackerwire@mastodon.social at 2026-04-03T02:21:47.000Z ##

🟠 CVE-2025-43257 - High (8.7)

This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Sequoia 15.6. An app may be able to break out of its sandbox.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34426
(7.6 HIGH)

EPSS: 0.04%

updated 2026-04-02T21:33:02

1 posts

OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables into execution without approval system validation. Attackers can exploit differing normalization logic to discard non-portable keys during approval proce

thehackerwire@mastodon.social at 2026-04-03T02:21:28.000Z ##

🟠 CVE-2026-34426 - High (7.6)

OpenClaw versions prior to commit b57b680 contain an approval bypass vulnerability due to inconsistent environment variable normalization between approval and execution paths, allowing attackers to inject attacker-controlled environment variables...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34829
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-02T20:34:49

1 posts

## Summary `Rack::Multipart::Parser` only wraps the request body in a `BoundedIO` when `CONTENT_LENGTH` is present. When a `multipart/form-data` request is sent without a `Content-Length` header, such as with HTTP chunked transfer encoding, multipart parsing continues until end-of-stream with no total size limit. For file parts, the uploaded body is written directly to a temporary file on disk r

thehackerwire@mastodon.social at 2026-04-03T03:06:25.000Z ##

🟠 CVE-2026-34829 - High (7.5)

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Multipart::Parser only wraps the request body in a BoundedIO when CONTENT_LENGTH is present. When a multipart/form-data request is sent without a Conte...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34785
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-02T18:44:26

1 posts

## Summary `Rack::Static` determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as `"/css"`, it matches any request path that begins with that string, including unrelated paths such as `"/css-config.env"` or `"/css-backup.sql"`. As a result, files under the static root whose names merely share the configured pref

thehackerwire@mastodon.social at 2026-04-03T03:06:44.000Z ##

🟠 CVE-2026-34785 - High (7.5)

Rack is a modular Ruby web server interface. Prior to versions 2.2.23, 3.1.21, and 3.2.6, Rack::Static determines whether a request should be served as a static file using a simple string prefix check. When configured with URL prefixes such as "/c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34876
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-02T18:31:45

1 posts

An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_len parameter. This is caused by missing validation of the tag_len parameter against the size of the internal 16-byte authentication buffer. The issue aff

thehackerwire@mastodon.social at 2026-04-03T05:00:12.000Z ##

🟠 CVE-2026-34876 - High (7.5)

An issue was discovered in Mbed TLS 3.x before 3.6.6. An out-of-bounds read vulnerability in mbedtls_ccm_finish() in library/ccm.c allows attackers to obtain adjacent CCM context data via invocation of the multipart CCM API with an oversized tag_l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5349
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-02T18:31:45

1 posts

A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor confirms, that "[t]he product in question (...) has been discontinued and end of li

thehackerwire@mastodon.social at 2026-04-03T04:02:34.000Z ##

🟠 CVE-2026-5349 - High (8.8)

A vulnerability was identified in Trendnet TEW-657BRM 1.00.1. The affected element is the function add_apcdb of the file /setup.cgi. The manipulation of the argument mac_pc_dba leads to stack-based buffer overflow. The attack can be initiated remo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34877
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-02T18:31:45

1 posts

An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, leading to arbitrary code execution. This is caused by Incorrect Use of Privileged APIs.

thehackerwire@mastodon.social at 2026-04-03T03:06:34.000Z ##

🔴 CVE-2026-34877 - Critical (9.8)

An issue was discovered in Mbed TLS versions from 2.19.0 up to 3.6.5, Mbed TLS 4.0.0. Insufficient protection of serialized SSL context or session structures allows an attacker who can modify the serialized structures to induce memory corruption, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35388
(2.5 LOW)

EPSS: 0.01%

updated 2026-04-02T18:31:45

1 posts

OpenSSH before 10.3 omits connection multiplexing confirmation for proxy-mode multiplexing sessions.

cR0w@infosec.exchange at 2026-04-02T18:24:41.000Z ##

Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.

openssh.org/txt/release-10.3

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388

##

CVE-2026-35387
(3.1 LOW)

EPSS: 0.03%

updated 2026-04-02T18:31:45

1 posts

OpenSSH before 10.3 can use unintended ECDSA algorithms. Listing of any ECDSA algorithm in PubkeyAcceptedAlgorithms or HostbasedAcceptedAlgorithms is misinterpreted to mean all ECDSA algorithms.

cR0w@infosec.exchange at 2026-04-02T18:24:41.000Z ##

Anyone have time to look through the vuln fixes for OpenSSH today? I haven't yet because I'm trying not to care about it but there are at least four CVEs apparently.

openssh.org/txt/release-10.3

CVE-2026-35385
CVE-2026-35386
CVE-2026-35387
CVE-2026-35388

##

CVE-2026-34792
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-02T15:31:49

2 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:05:25.000Z ##

🟠 CVE-2026-34792 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-03T06:01:11.000Z ##

🟠 CVE-2026-34792 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_clamav.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34796
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-02T15:31:49

2 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:05:07.000Z ##

🟠 CVE-2026-34796 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-03T06:00:53.000Z ##

🟠 CVE-2026-34796 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_openvpn.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34793
(8.8 HIGH)

EPSS: 0.24%

updated 2026-04-02T15:31:49

1 posts

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() call, which allows command injection due to an incomplete regular expression validation.

thehackerwire@mastodon.social at 2026-04-03T06:01:19.000Z ##

🟠 CVE-2026-34793 - High (8.8)

Endian Firewall version 3.3.25 and prior allow authenticated users to execute arbitrary OS commands via the DATE parameter to /cgi-bin/logs_firewall.cgi. The DATE parameter value is used to construct a file path that is passed to a Perl open() cal...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2701
(9.1 CRITICAL)

EPSS: 0.19%

updated 2026-04-02T15:31:41

7 posts

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

thehackerwire@mastodon.social at 2026-04-05T02:00:17.000Z ##

🔴 CVE-2026-2701 - Critical (9.1)

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T02:00:17.000Z ##

🔴 CVE-2026-2701 - Critical (9.1)

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-04-04T08:01:27.000Z ##

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller

Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.

**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-04-02T17:18:17.000Z ##

New.

WatchTower: You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) labs.watchtowr.com/youre-not-s

Recorded Future: Latin America and the Caribbean Cybercrime Landscape recordedfuture.com/research/la

Mandiant: vSphere and BRICKSTORM Malware: A Defender's Guide cloud.google.com/blog/topics/t

Cisco: UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications blog.talosintelligence.com/uat

Threat Fabric: The Malware Gap: Why Fraud & Security Controls Still Miss Mobile Malware threatfabric.com/blogs/the-mal

Abnormal Security: Meet VENOM: The PhaaS Platform That Neutralizes MFA abnormal.ai/blog/venom-phishin

From yesterday:

Zscaler: Anthropic Claude Code Leak zscaler.com/blogs/security-res #infosec #threatresearch #vulnerability #malware #threatintel #threatintelligence

##

sambowne@infosec.exchange at 2026-04-02T14:50:15.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 and CVE-2026-2701) labs.watchtowr.com/youre-not-s

##

threatcodex@infosec.exchange at 2026-04-02T14:33:27.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701)
#CVE_2026_2699 #CVE_2026_2701
labs.watchtowr.com/youre-not-s

##

_r_netsec@infosec.exchange at 2026-04-02T11:13:05.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) - watchTowr Labs labs.watchtowr.com/youre-not-s

##

CVE-2026-2699
(9.8 CRITICAL)

EPSS: 0.41%

updated 2026-04-02T15:31:40

7 posts

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-Progress-ShareFile-CVE-2026-2699

thehackerwire@mastodon.social at 2026-04-05T02:00:07.000Z ##

🔴 CVE-2026-2699 - Critical (9.8)

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T02:00:07.000Z ##

🔴 CVE-2026-2699 - Critical (9.8)

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-04-04T08:01:27.000Z ##

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller

Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.

**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

AAKL@infosec.exchange at 2026-04-02T17:18:17.000Z ##

New.

WatchTower: You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) labs.watchtowr.com/youre-not-s

Recorded Future: Latin America and the Caribbean Cybercrime Landscape recordedfuture.com/research/la

Mandiant: vSphere and BRICKSTORM Malware: A Defender's Guide cloud.google.com/blog/topics/t

Cisco: UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications blog.talosintelligence.com/uat

Threat Fabric: The Malware Gap: Why Fraud & Security Controls Still Miss Mobile Malware threatfabric.com/blogs/the-mal

Abnormal Security: Meet VENOM: The PhaaS Platform That Neutralizes MFA abnormal.ai/blog/venom-phishin

From yesterday:

Zscaler: Anthropic Claude Code Leak zscaler.com/blogs/security-res #infosec #threatresearch #vulnerability #malware #threatintel #threatintelligence

##

sambowne@infosec.exchange at 2026-04-02T14:50:15.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 and CVE-2026-2701) labs.watchtowr.com/youre-not-s

##

threatcodex@infosec.exchange at 2026-04-02T14:33:27.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701)
#CVE_2026_2699 #CVE_2026_2701
labs.watchtowr.com/youre-not-s

##

_r_netsec@infosec.exchange at 2026-04-02T11:13:05.000Z ##

You’re Not Supposed To ShareFile With Everyone (Progress ShareFile Pre-Auth RCE Chain CVE-2026-2699 & CVE-2026-2701) - watchTowr Labs labs.watchtowr.com/youre-not-s

##

CVE-2026-26928(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-04-02T15:31:40

1 posts

SzafirHost downloads necessary files in the context of the initiating web page. When called, SzafirHost updates its dynamic library. JAR files are correctly verified based on a list of trusted file hashes, and if a file was not on that list, it was checked to see if it had been digitally signed by the vendor. The application doesn't verify hash or vendor's digital signature of uploaded DLL, SO, JN

bezpieka@infosec.exchange at 2026-04-03T10:18:10.000Z ##

Ciekawy błąd, 0/1 click RCE w oprogramowaniu związanym z Szafir/KIR służącym do elektronicznych podpisów, używanym przez 900k użytkowników.
Tldr: wchodzisz w link, (niekoniecznie) klikasz "ok" w zespoofowanym okienku, dostajesz malware.
Research: Michał Leszczyński
cve.org/CVERecord?id=CVE-2026-

##

CVE-2026-34952
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-04-01T23:28:05

3 posts

### Summary The PraisonAI Gateway server accepts WebSocket connections at `/ws` and serves agent topology at `/info` with no authentication. Any network client can connect, enumerate registered agents, and send arbitrary messages to agents and their tool sets. ### Details `gateway/server.py:242` (source) -> `gateway/server.py:250` (sink) ```python # source -- /info leaks all agent IDs with no a

Matchbook3469@mastodon.social at 2026-04-05T13:48:14.000Z ##

⛔ New security advisory:

CVE-2026-34952 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

offseq@infosec.exchange at 2026-04-04T03:00:27.000Z ##

🚨 CVE-2026-34952 (CRITICAL): PraisonAI < 4.5.97 lets unauthenticated users access /ws & /info — enumerate agents & send arbitrary messages. High confidentiality & integrity risk. Patch to 4.5.97+ now! radar.offseq.com/threat/cve-20 #OffSeq #PraisonAI #Vuln #Cybersecurity

##

thehackerwire@mastodon.social at 2026-04-04T01:15:17.000Z ##

🔴 CVE-2026-34952 - Critical (9.1)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, the PraisonAI Gateway server accepts WebSocket connections at /ws and serves agent topology at /info with no authentication. Any network client can connect, enumerate registered age...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34954
(8.6 HIGH)

EPSS: 0.03%

updated 2026-04-01T23:27:07

1 posts

### Summary `FileTools.download_file()` in `praisonaiagents` validates the destination path but performs no validation on the `url` parameter, passing it directly to `httpx.stream()` with `follow_redirects=True`. An attacker who controls the URL can reach any host accessible from the server including cloud metadata services and internal network services. ### Details `file_tools.py:259` (source)

thehackerwire@mastodon.social at 2026-04-04T01:22:11.000Z ##

🟠 CVE-2026-34954 - High (8.6)

PraisonAI is a multi-agent teams system. Prior to version 1.5.95, FileTools.download_file() in praisonaiagents validates the destination path but performs no validation on the url parameter, passing it directly to httpx.stream() with follow_redire...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34955
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-01T23:26:02

1 posts

### Summary `SubprocessSandbox` in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls `subprocess.run()` with `shell=True` and relies solely on string-pattern matching to block dangerous commands. The blocklist does not include `sh` or `bash` as standalone executables, allowing trivial sandbox escape in STRICT mode via `sh -c '<command>'`. ### Details `sandbox_executor.py:179` (source) -> `sandb

thehackerwire@mastodon.social at 2026-04-04T01:10:45.000Z ##

🟠 CVE-2026-34955 - High (8.8)

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, SubprocessSandbox in all modes (BASIC, STRICT, NETWORK_ISOLATED) calls subprocess.run() with shell=True and relies solely on string-pattern matching to block dangerous commands. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34936
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-01T23:21:46

1 posts

### Summary `passthrough()` and `apassthrough()` in `praisonai` accept a caller-controlled `api_base` parameter that is concatenated with `endpoint` and passed directly to `httpx.Client.request()` when the litellm primary path raises `AttributeError`. No URL scheme validation, private IP filtering, or domain allowlist is applied, allowing requests to any host reachable from the server. ### Detai

thehackerwire@mastodon.social at 2026-04-04T01:24:18.000Z ##

🟠 CVE-2026-34936 - High (7.7)

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, passthrough() and apassthrough() in praisonai accept a caller-controlled api_base parameter that is concatenated with endpoint and passed directly to httpx.Client.request() when the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34934
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-01T23:20:34

2 posts

## Summary The `get_all_user_threads` function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via `update_thread`. When the application loads the thread list, the injected payload executes and grants full database access. --- ## Details **File Path:** `src/praisonai/praisonai/ui/sql_alchemy.py` **Flow:

offseq@infosec.exchange at 2026-04-04T06:00:26.000Z ##

🚨 CVE-2026-34934: PraisonAI <4.5.90 affected by CRITICAL SQL injection (CVSS 9.8). Unauthenticated attackers can gain full DB access via unsanitized thread IDs. Upgrade to 4.5.90+ ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #SQLInjection #PraisonAI

##

thehackerwire@mastodon.social at 2026-04-04T01:22:29.000Z ##

🔴 CVE-2026-34934 - Critical (9.8)

PraisonAI is a multi-agent teams system. Prior to version 4.5.90, the get_all_user_threads function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via update...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34937
(7.8 HIGH)

EPSS: 0.03%

updated 2026-04-01T23:18:18

2 posts

### Summary `run_python()` in `praisonai` constructs a shell command string by interpolating user-controlled code into `python3 -c "<code>"` and passing it to `subprocess.run(..., shell=True)`. The escaping logic only handles `\` and `"`, leaving `$()` and backtick substitutions unescaped, allowing arbitrary OS command execution before Python is invoked. ### Details `execute_command.py:290` (so

thehackerwire@mastodon.social at 2026-04-04T01:16:39.000Z ##

🟠 CVE-2026-34937 - High (7.8)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-04T01:15:02.000Z ##

🟠 CVE-2026-34937 - High (7.8)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, run_python() in praisonai constructs a shell command string by interpolating user-controlled code into python3 -c "" and passing it to subprocess.run(..., shell=True). The escaping ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34938
(10.0 CRITICAL)

EPSS: 0.10%

updated 2026-04-01T23:17:49

2 posts

### Summary `execute_code()` in `praisonai-agents` runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a `str` subclass with an overridden `startswith()` method to the `_safe_getattr` wrapper, achieving arbitrary OS command execution on the host. ### Details `python_tools.py:20` (source) -> `python_tools.py:22` (guard bypass) -> `python_tools.py:16

offseq@infosec.exchange at 2026-04-04T04:30:26.000Z ##

🚨 CRITICAL: CVE-2026-34938 in PraisonAI <1.5.90 lets attackers bypass sandbox protections and achieve arbitrary OS command execution. Immediate upgrade to v1.5.90+ required. Full system compromise possible. radar.offseq.com/threat/cve-20 #OffSeq #CVE202634938 #infosec #PraisonAI

##

thehackerwire@mastodon.social at 2026-04-04T01:15:09.000Z ##

🔴 CVE-2026-34938 - Critical (10)

PraisonAI is a multi-agent teams system. Prior to version 1.5.90, execute_code() in praisonai-agents runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a str subclass with an overridden startswith() ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34522
(8.1 HIGH)

EPSS: 0.06%

updated 2026-04-01T21:36:44

1 posts

### Summary A path traversal vulnerability in `/api/chats/import` allows an authenticated attacker to write attacker-controlled files outside the intended chats directory by injecting traversal sequences into `character_name`. ### Details `character_name` is used unsafely as part of the destination filename and then passed into `path.join(...)` without sanitization. Evidence: - Import handler en

thehackerwire@mastodon.social at 2026-04-03T03:05:54.000Z ##

🟠 CVE-2026-34522 - High (8.1)

SillyTavern is a locally installed user interface that allows users to interact with text generation large language models, image generation engines, and text-to-speech voice models. Prior to version 1.17.0, a path traversal vulnerability in /api/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5281
(8.8 HIGH)

EPSS: 3.03%

updated 2026-04-01T21:30:28

8 posts

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

1 repos

https://github.com/umair-aziz025/CVE-2026-5281-Research-Toolkit

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

cktodon@mas.to at 2026-04-04T19:00:10.000Z ##

#Google parchea un zero-day de #Chrome en #WebGPU (CVE-2026-5281) que ya se está explotando

unaaldia.hispasec.com/2026/04/

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

youranonnewsirc@nerdculture.de at 2026-04-04T11:43:10.000Z ##

Geopolitical: US-Israel/Iran conflict intensifies; F-15E reportedly downed. UN debates Strait of Hormuz access.
Technology: 6G networks raise significant AI-driven cybersecurity risks. Apple plans to open Siri to rival AI in iOS 27. NASA's Artemis II mission launched astronauts to the Moon.
Cybersecurity: Google Chrome zero-day (CVE-2026-5281) actively exploited. Odido Telecom suffered a breach exposing 6 million identities. Lapsus$ claimed a supply chain attack on LiteLLM. Texas hospital hit by ransomware, affecting 250,000 patients.
#AnonNews_irc #Cybersecurity #News

##

steelefortress@infosec.exchange at 2026-04-04T11:00:13.000Z ##

CISA just added CVE-2026-5281, a vulnerability in Google Dawn, to its Known Exploited Vulnerabilities catalog. Dawn is the WebGPU implementation used across Chromium-based browsers, which means this flaw has a wide attack surface touching Chrome, Edge, and other...

Read more: steelefortress.com/jycnya

Cybersecurity #CyberDefense #DataPrivacy

##

youranonnewsirc@nerdculture.de at 2026-04-04T03:43:04.000Z ##

Geopolitical tensions rise as Iran's Strait of Hormuz blockade severely disrupts shipping, causing global oil price surges. In cybersecurity, Google issued an emergency patch for a Chrome zero-day (CVE-2026-5281) actively exploited, alongside critical F5 BIG-IP and Citrix NetScaler vulnerabilities under exploitation. The tech sector saw OpenAI secure $122B in funding, with Oracle cutting jobs for AI infrastructure investments. Social media companies face new addiction lawsuits.

#Cybersecurity #Geopolitics #TechNews

##

LLMs@activitypub.awakari.com at 2026-04-02T18:34:08.000Z ## CISA warns of actively exploited Chrome zero-day as Google ships fix CISA has added a newly exploited Chrome vulnerability, CVE-2026-5281, to its Known Exploited Vulnerabilities catalog and ordered...

#News

Origin | Interest | Match ##

hackmag@infosec.exchange at 2026-04-03T05:00:02.000Z ##

⚪️ Google Chrome patches fourth actively exploited zero‑day vulnerability

🗨️ Google developers have released an emergency update for the Chrome browser that fixes the 0‑day vulnerability CVE-2026-5281, which has already been exploited in real-world attacks. The vulnerability tracked as CVE-2026-5281 is related to a use-after-free issue in Dawn, the cross-platform…

🔗 hackmag.com/news/cve-2026-5281

#news

##

CVE-2026-34742(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-01T21:09:10

1 posts

The Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with `StreamableHTTPHandler` or `SSEHandler`, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to

thehackerwire@mastodon.social at 2026-04-04T05:00:36.000Z ##

🟠 CVE-2026-34742 - High (8.1)

The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34581
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-01T20:58:51

1 posts

### Summary When using the `Share Token` it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. ### Details The `BasicAuthMiddleware` checks for a `?token=` parameter **before** checking credentials. If the token exists in `SharedLinks`, the request passes through with **no auth check at all**. The handler then processes all query para

thehackerwire@mastodon.social at 2026-04-03T02:03:38.000Z ##

🟠 CVE-2026-34581 - High (8.1)

goshs is a SimpleHTTPServer written in Go. From version 1.1.0 to before version 2.0.0-beta.2, when using the Share Token it is possible to bypass the limited selected file download with all the gosh functionalities, including code exec. This issue...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33544
(7.7 HIGH)

EPSS: 0.04%

updated 2026-04-01T19:52:05

1 posts

### Summary All three OAuth service implementations (`GenericOAuthService`, `GithubOAuthService`, `GoogleOAuthService`) store PKCE verifiers and access tokens as mutable struct fields on singleton instances shared across all concurrent requests. When two users initiate OAuth login for the same provider concurrently, a race condition between `VerifyCode()` and `Userinfo()` causes one user to recei

thehackerwire@mastodon.social at 2026-04-03T07:00:59.000Z ##

🟠 CVE-2026-33544 - High (7.7)

Tinyauth is an authentication and authorization server. Prior to version 5.0.5, all three OAuth service implementations (GenericOAuthService, GithubOAuthService, GoogleOAuthService) store PKCE verifiers and access tokens as mutable struct fields o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28805
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-01T19:46:02

2 posts

## Description Multiple AJAX select handlers in OpenSTAManager <= 2.10.1 are vulnerable to Time-Based Blind SQL Injection through the `options[stato]` GET parameter. The user-supplied value is read from `$superselect['stato']` and concatenated directly into SQL WHERE clauses as a bare expression, without any sanitization, parameterization, or allowlist validation. An authenticated attacker can i

thehackerwire@mastodon.social at 2026-04-05T03:00:55.000Z ##

🟠 CVE-2026-28805 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-05T03:00:55.000Z ##

🟠 CVE-2026-28805 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33579
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-01T19:07:04.223000

10 posts

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and

1 repos

https://github.com/atalovesyou/openclaw-security-checker

newsyc500@toot.community at 2026-04-05T06:43:29.000Z ##

OpenClaw privilege escalation vulnerability: nvd.nist.gov/vuln/detail/CVE-2

Discussion: news.ycombinator.com/item?id=4

##

cwebber@social.coop at 2026-04-04T15:49:02.000Z ##

OpenClaw also got a terrifying privilege escalation vulnerability nvd.nist.gov/vuln/detail/CVE-2

Meanwhile the OpenClaw founder is claiming shush, it's no big deal, probably most of these aren't really exploitable! (There's good business interest reasons to argue that, since OpenClaw's founders got acquired by OpenAI) news.ycombinator.com/item?id=4

Okay. I know I have more than a few security researchers following me. There's a public list of literally hundreds of thousands of publicly accessible OpenClaw instances right here: openclaw.allegro.earth/

Anyone try taking a sampling of them and testing how vulnerable against recent escalation CVEs they are? Could be a rather juicy writeup!

##

cwebber@social.coop at 2026-04-04T15:49:02.000Z ##

OpenClaw also got a terrifying privilege escalation vulnerability nvd.nist.gov/vuln/detail/CVE-2

Meanwhile the OpenClaw founder is claiming shush, it's no big deal, probably most of these aren't really exploitable! (There's good business interest reasons to argue that, since OpenClaw's founders got acquired by OpenAI) news.ycombinator.com/item?id=4

Okay. I know I have more than a few security researchers following me. There's a public list of literally hundreds of thousands of publicly accessible OpenClaw instances right here: openclaw.allegro.earth/

Anyone try taking a sampling of them and testing how vulnerable against recent escalation CVEs they are? Could be a rather juicy writeup!

##

hnbest@mastodon.social at 2026-04-04T07:00:02.000Z ##

OpenClaw privilege escalation vulnerability
nvd.nist.gov/vuln/detail/CVE-2
Discussion: news.ycombinator.com/item?id=4

##

hn250@social.lansky.name at 2026-04-04T01:55:12.000Z ##

OpenClaw privilege escalation vulnerability

Link: nvd.nist.gov/vuln/detail/CVE-2
Discussion: news.ycombinator.com/item?id=4

##

CuratedHackerNews@mastodon.social at 2026-04-04T00:05:04.000Z ##

OpenClaw privilege escalation vulnerability

nvd.nist.gov/vuln/detail/CVE-2

#gov

##

jesterchen@social.tchncs.de at 2026-04-03T20:27:32.000Z ##

@masek Thanks for the screenshot and the reference to CVE-2026-33579 - the reddit comment has been removed. 🙏

##

nyanbinary@infosec.exchange at 2026-04-03T18:44:03.000Z ##

Also, is it possible the github commit links for the patch for CVE-2026-33579 are... just wrong? That commit doesnt really seem to match the description? (Didnt fully check it yet)

##

dangoodin@infosec.exchange at 2026-04-03T18:27:11.000Z ##

I'm trying to understand a bit more about CVE-2026-33579, the critical vulnerability in OpenClaw. To exploit, an attacker needs low-level paring privilege permissions. How does one acquire such privileges? Can anyone do it? I'm asking because I want to understand what's required for an attacker to exploit.

Feel free to ping me at DanArs.82, or drop an answer here.

##

_r_netsec@infosec.exchange at 2026-04-03T13:43:05.000Z ##

If you're running OpenClaw, you probably got hacked in the last week blink.new/blog/cve-2026-33579-

##

CVE-2026-4747
(8.8 HIGH)

EPSS: 0.18%

updated 2026-04-01T15:23:23.797000

2 posts

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerabl

grahamperrin@bsd.cafe at 2026-04-05T17:56:39.000Z ##

CVE-2026-4747

Re what's quoted in the opening post at <forums.freebsd.org/threads/102>, please note that Nicholas Carlini has not yet made a public statement about findings.

(I should not treat notebookcheck.net as an authoritative source on this matter.)

#FreeBSD #security

##

grahamperrin@bsd.cafe at 2026-04-05T17:56:39.000Z ##

CVE-2026-4747

Re what's quoted in the opening post at <forums.freebsd.org/threads/102>, please note that Nicholas Carlini has not yet made a public statement about findings.

(I should not treat notebookcheck.net as an authoritative source on this matter.)

#FreeBSD #security

##

CVE-2026-5176
(7.3 HIGH)

EPSS: 2.96%

updated 2026-04-01T14:24:02.583000

2 posts

A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. Affected is the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument provided results in command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-34601
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-01T00:19:07

1 posts

## Summary `@xmldom/xmldom` allows attacker-controlled strings containing the CDATA terminator `]]>` to be inserted into a `CDATASection` node. During serialization, `XMLSerializer` emitted the CDATA content verbatim without rejecting or safely splitting the terminator. As a result, data intended to remain text-only became **active XML markup** in the serialized output, enabling XML structure inj

thehackerwire@mastodon.social at 2026-04-03T03:01:34.000Z ##

🟠 CVE-2026-34601 - High (7.5)

xmldom is a pure JavaScript W3C standard-based (XML DOM Level 2 Core) `DOMParser` and `XMLSerializer` module. In xmldom versions 0.6.0 and prior and @xmldom/xmldom prior to versions 0.8.12 and 0.9.9, xmldom/xmldom allows attacker-controlled string...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34453
(7.5 HIGH)

EPSS: 2.67%

updated 2026-03-31T23:30:05

2 posts

### Summary The publish service exposes bookmarked blocks from password-protected documents to unauthenticated visitors. In publish/read-only mode, `/api/bookmark/getBookmark` filters bookmark results by calling `FilterBlocksByPublishAccess(nil, ...)`. Because the filter treats a `nil` context as authorized, it skips the publish password check and returns bookmarked blocks from documents configure

Nuclei template

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-34156
(10.0 CRITICAL)

EPSS: 5.19%

updated 2026-03-31T18:50:36

2 posts

`##` Summary NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js `vm` sandbox with a custom `require` allowlist (controlled by `WORKFLOW_SCRIPT_MODULES` env var). However, the `console` object passed into the sandbox context exposes host-realm `WritableWorkerStdio` stream objects via `console._stdout` and `console._stderr`. An authenticated attacker can traverse th

Nuclei template

1 repos

https://github.com/0xBlackash/CVE-2026-34156

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4020
(7.5 HIGH)

EPSS: 4.66%

updated 2026-03-31T03:31:35

2 posts

The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4. This is due to a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data with a permission_callback that unconditionally returns true, allowing any unauthenticated visitor to access it. When the ?page=gravitysmtp-settings query parameter is appended, th

Nuclei template

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4257
(9.8 CRITICAL)

EPSS: 19.61%

updated 2026-03-31T00:31:19

2 posts

The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig

Nuclei template

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5105
(6.3 MEDIUM)

EPSS: 2.16%

updated 2026-03-30T18:32:18

2 posts

A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affected element is the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument pptpPassThru results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5104
(6.3 MEDIUM)

EPSS: 2.16%

updated 2026-03-30T18:31:16

2 posts

A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Impacted is the function setStaticRoute of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument ip leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5103
(6.3 MEDIUM)

EPSS: 2.16%

updated 2026-03-30T18:31:16

2 posts

A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This issue affects the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument enable causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33645
(7.1 HIGH)

EPSS: 0.07%

updated 2026-03-30T18:12:01.663000

1 posts

Fireshare facilitates self-hosted media and link sharing. In version 1.5.1, an authenticated path traversal vulnerability in Fireshare’s chunked upload endpoint allows an attacker to write arbitrary files outside the intended upload directory. The `checkSum` multipart field is used directly in filesystem path construction without sanitization or containment checks. This enables unauthorized file w

thehackerwire@mastodon.social at 2026-04-03T02:03:19.000Z ##

🔴 CVE-2026-34745 - Critical (9.1)

Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33641
(7.8 HIGH)

EPSS: 0.02%

updated 2026-03-30T17:01:32

1 posts

## Summary Glances supports dynamic configuration values in which substrings enclosed in backticks are executed as system commands during configuration parsing. This behavior occurs in Config.get_value() and is implemented without validation or restriction of the executed commands. If an attacker can modify or influence configuration files, arbitrary commands will execute automatically with the p

thehackerwire@mastodon.social at 2026-04-03T07:00:37.000Z ##

🟠 CVE-2026-33641 - High (7.8)

Glances is an open-source system cross-platform monitoring tool. Prior to version 4.5.3, Glances supports dynamic configuration values in which substrings enclosed in backticks are executed as system commands during configuration parsing. This beh...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4415
(8.1 HIGH)

EPSS: 0.48%

updated 2026-03-30T13:26:07.647000

1 posts

Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.

thecybermind@infosec.exchange at 2026-04-02T11:57:05.000Z ##

INTEL ALERT] CVE-2026-4425 is live. Is your GIGABYTE Control Center (GCC) acting as a backdoor for digital decay? I’m breaking down the forensic evidence and showing you how to harden your precinct. Don't let unpatched utilities breach your perimeter.

Read the full brief at The Cyber Mind Co.

thecybermind.co/2026/04/02/gig

##

CVE-2026-4425(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-03-30T12:32:36

1 posts

Rejected reason: Reserved for EastLink case, but no need for CVE anymore

thecybermind@infosec.exchange at 2026-04-02T11:57:05.000Z ##

INTEL ALERT] CVE-2026-4425 is live. Is your GIGABYTE Control Center (GCC) acting as a backdoor for digital decay? I’m breaking down the forensic evidence and showing you how to harden your precinct. Don't let unpatched utilities breach your perimeter.

Read the full brief at The Cyber Mind Co.

thecybermind.co/2026/04/02/gig

##

CVE-2026-5102
(6.3 MEDIUM)

EPSS: 2.16%

updated 2026-03-30T00:31:08

2 posts

A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. This vulnerability affects the function setSmartQosCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument qos_up_bw results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

secdb at 2026-04-06T00:00:56.255Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-21536
(9.8 CRITICAL)

EPSS: 0.40%

updated 2026-03-16T15:40:44.357000

1 posts

Microsoft Devices Pricing Program Remote Code Execution Vulnerability

vitobotta@mastodon.social at 2026-04-03T16:59:27.000Z ##

XBOW autonomous AI found 3 critical RCEs in Microsoft Cloud - first time AI discovered production vulnerabilities without source code access. CVE-2026-21536 was flagged as one of March Patch Tuesday's most severe issues. The arms race between researchers and hackers has shifted.

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 66.27%

updated 2025-12-09T16:53:25

4 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/sumanrox/rschunter

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/emredavut/CVE-2025-55182

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/jctommasi/react2shellVulnApp

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/Archerkong/CVE-2025-55182

https://github.com/Updatelap/CVE-2025-55182

https://github.com/Faithtiannn/CVE-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/hoosin/CVE-2025-55182

https://github.com/alptexans/RSC-Detect-CVE-2025-55182

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/theman001/CVE-2025-55182

https://github.com/zzhorc/CVE-2025-55182

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/mrknow001/RSC_Detector

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/xalgord/React2Shell

https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/surajhacx/react2shellpoc

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/Syrins/CVE-2025-55182-React2Shell-RCE

https://github.com/hualy13/CVE-2025-55182

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/shamo0/react2shell-PoC

https://github.com/assetnote/react2shell-scanner

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/msanft/CVE-2025-55182

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/shyambhanushali/React2Shell

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/LucasPDiniz/CVE-2025-55182

https://github.com/freeqaz/react2shell

https://github.com/BlackTechX011/React2Shell

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/kavienanj/CVE-2025-55182

https://github.com/ynsmroztas/NextRce

https://github.com/alsaut1/react2shell-lab

https://github.com/snipevx/React2Shell-POC

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/gensecaihq/react2shell-scanner

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/zr0n/react2shell

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/vulncheck-oss/cve-2025-55182

https://github.com/theori-io/reactguard

https://github.com/sickwell/CVE-2025-55182

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/nehkark/CVE-2025-55182

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/MemerGamer/CVE-2025-55182

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

oversecurity@mastodon.social at 2026-04-05T14:40:05.000Z ##

Hackers exploit React2Shell in automated credential theft campaign

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable...

🔗️ [Bleepingcomputer] link.is.it/7WBrWn

##

oversecurity@mastodon.social at 2026-04-05T14:40:05.000Z ##

Hackers exploit React2Shell in automated credential theft campaign

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable...

🔗️ [Bleepingcomputer] link.is.it/7WBrWn

##

jbz@indieweb.social at 2026-04-03T21:18:00.000Z ##

⚠️ Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

「 The campaign is assessed to be targeting Next.js applications that are vulnerable to CVE-2025-55182 (CVSS score: 10.0), a critical flaw in React Server Components and Next.js App Router that could result in remote code execution, for initial access, and then dropping the NEXUS Listener collection framework 」

thehackernews.com/2026/04/hack

#nextjs #infosec #react2shell #CVE202555182

##

hackerworkspace@infosec.exchange at 2026-04-02T22:23:28.000Z ##

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials

thehackernews.com/2026/04/hack

Read on HackerWorkspace: hackerworkspace.com/article/ha

#databreach #cybersecurity #vulnerability

##

CVE-2025-50286
(8.1 HIGH)

EPSS: 62.34%

updated 2025-11-07T19:18:37.380000

1 posts

A Remote Code Execution (RCE) vulnerability in Grav CMS v1.7.48 allows an authenticated admin to upload a malicious plugin via the /admin/tools/direct-install interface. Once uploaded, the plugin is automatically extracted and loaded, allowing arbitrary PHP code execution and reverse shell access.

2 repos

https://github.com/x1o3/CVE-2025-50286

https://github.com/binneko/CVE-2025-50286

metasploit@infosec.exchange at 2026-04-03T20:06:32.000Z ##

Metasploit Framework is here with 5 new modules! Exploits for FreeScout (CVE-2026-28289) and Grav CMS (CVE-2025-50286) RCEs, plus a generic HTTP command execution module and a new Windows persistence technique. We also have a slew of bug fixes and enhancements including SOCKS proxy performance improvements #Metasploit rapid7.com/blog/post/pt-metasp

##

CVE-2025-30208
(5.3 MEDIUM)

EPSS: 88.96%

updated 2025-03-25T14:00:04

1 posts

### Summary The contents of arbitrary files can be returned to the browser. ### Impact Only apps explicitly exposing the Vite dev server to the network (using `--host` or [`server.host` config option](https://vitejs.dev/config/server-options.html#server-host)) are affected. ### Details `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL

Nuclei template

23 repos

https://github.com/iSee857/CVE-2025-30208-PoC

https://github.com/ThumpBo/CVE-2025-30208-EXP

https://github.com/sumeet-darekar/CVE-2025-30208

https://github.com/sadhfdw129/CVE-2025-30208-Vite

https://github.com/marino-admin/Vite-CVE-2025-30208-Scanner

https://github.com/4xura/CVE-2025-30208

https://github.com/xuemian168/CVE-2025-30208

https://github.com/HaGsec/CVE-2025-30208

https://github.com/lilil3333/Vite-CVE-2025-30208-EXP

https://github.com/jackieya/ViteVulScan

https://github.com/HazaVVIP/CVE-2025-30208

https://github.com/TH-SecForge/CVE-2025-30208

https://github.com/keklick1337/CVE-2025-30208-ViteVulnScanner

https://github.com/ThemeHackers/CVE-2025-30208

https://github.com/kk12-30/CVE-2025-30208

https://github.com/nkuty/CVE-2025-30208-31125-31486-32395

https://github.com/4m3rr0r/CVE-2025-30208-PoC

https://github.com/MiclelsonCN/CVE-2025-30208_POC

https://github.com/imbas007/CVE-2025-30208-template

https://github.com/Lusensec/CVE-2025-30208

https://github.com/0xshaheen/CVE-2025-30208

https://github.com/r0ngy40/CVE-2025-30208-Series

https://github.com/On1onss/CVE-2025-30208

sans_isc@infosec.exchange at 2026-04-02T14:51:18.000Z ##

Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208) isc.sans.edu/diary/32860

##

CVE-2025-70951
(0 None)

EPSS: 0.00%

3 posts

N/A

campuscodi@mastodon.social at 2026-04-05T16:04:41.000Z ##

There's a new unauth remote code execution bug in the CentOS Control Web Panel web hosting toolkit, tracked as CVE-2025-70951, that will need patching in the coming days

fenrisk.com/rce-centos-webpane

##

campuscodi@mastodon.social at 2026-04-05T16:04:41.000Z ##

There's a new unauth remote code execution bug in the CentOS Control Web Panel web hosting toolkit, tracked as CVE-2025-70951, that will need patching in the coming days

fenrisk.com/rce-centos-webpane

##

_r_netsec@infosec.exchange at 2026-04-03T08:28:05.000Z ##

New RCE in Control Web Panel (CVE-2025-70951) fenrisk.com/rce-centos-webpane

##

CVE-2026-26026
(0 None)

EPSS: 0.00%

2 posts

N/A

decio at 2026-04-04T23:18:23.813Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille , à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

CVE-2026-26027

##

decio@infosec.exchange at 2026-04-04T23:18:23.000Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

#CyberVeille #CVE_2026_26026 CVE-2026-26027

##

CVE-2026-26027
(0 None)

EPSS: 0.00%

2 posts

N/A

decio at 2026-04-04T23:18:23.813Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille , à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

CVE-2026-26027

##

decio@infosec.exchange at 2026-04-04T23:18:23.000Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

#CyberVeille #CVE_2026_26026 CVE-2026-26027

##

CVE-2026-31931
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T05:09:37.000Z ##

🟠 CVE-2026-31931 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28798
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T03:00:12.000Z ##

🔴 CVE-2026-28798 - Critical (9)

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Clo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27833
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T01:53:40.000Z ##

🟠 CVE-2026-27833 - High (7.5)

Piwigo is an open source photo gallery application for the web. Prior to version 16.3.0, the pwg.history.search API method in Piwigo is registered without the admin_only option, allowing unauthenticated users to access the full browsing history of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28289
(0 None)

EPSS: 17.68%

1 posts

N/A

1 repos

https://github.com/0xBlackash/CVE-2026-28289

metasploit@infosec.exchange at 2026-04-03T20:06:32.000Z ##

Metasploit Framework is here with 5 new modules! Exploits for FreeScout (CVE-2026-28289) and Grav CMS (CVE-2025-50286) RCEs, plus a generic HTTP command execution module and a new Windows persistence technique. We also have a slew of bug fixes and enhancements including SOCKS proxy performance improvements #Metasploit rapid7.com/blog/post/pt-metasp

##

CVE-2026-34745
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq@infosec.exchange at 2026-04-03T10:30:27.000Z ##

🚨 CRITICAL: CVE-2026-34745 in ShaneIsrael fireshare (<1.5.3) enables unauth’d file writes to any server path via /api/uploadChunked/public. Upgrade to 1.5.3 ASAP or restrict access. Full details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202634745 #infosec #patchnow

##

thehackerwire@mastodon.social at 2026-04-03T02:03:19.000Z ##

🔴 CVE-2026-34745 - Critical (9.1)

Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix for CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to the unauthenticated /api/uploadChunked/public endpoint...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31937
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T07:09:12.000Z ##

🟠 CVE-2026-31937 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to version 7.0.15, inefficiency in DCERPC buffering can lead to a performance degradation. This issue has been patched in version 7.0.15.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31935
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T07:09:02.000Z ##

🟠 CVE-2026-31935 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, flooding of craft HTTP2 continuation frames can lead to memory exhaustion, usually resulting in the Suricata process being shut down by the operating system. This i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33746
(0 None)

EPSS: 0.08%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T05:00:33.000Z ##

🔴 CVE-2026-33746 - Critical (9.8)

Convoy is a KVM server management panel for hosting businesses. From version 3.9.0-beta to before version 4.5.1, the JWTService::decode() method did not verify the cryptographic signature of JWT tokens. While the method configured a symmetric HMAC...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34717
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T02:30:36.000Z ##

🔴 CVE-2026-34717 - Critical (9.9)

OpenProject is an open-source, web-based project management software. Prior to version 17.2.3, the =n operator in modules/reporting/lib/report/operator.rb:177 embeds user input directly into SQL WHERE clauses without parameterization. This issue h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34840
(0 None)

EPSS: 0.05%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-03T02:00:16.000Z ##

🟠 CVE-2026-34840 - High (8.1)

OneUptime is an open-source monitoring and observability platform. Prior to version 10.0.42, OneUptime's SAML SSO implementation (App/FeatureSet/Identity/Utils/SSO.ts) has decoupled signature verification and identity extraction. isSignatureValid(...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites