##
Updated at UTC 2026-04-10T04:14:33.241508
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-5997 | 9.8 | 0.00% | 4 | 0 | 2026-04-10T02:16:04.247000 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impac | |
| CVE-2026-5996 | 9.8 | 0.00% | 2 | 0 | 2026-04-10T02:16:04.043000 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191 | |
| CVE-2026-4351 | 8.1 | 0.00% | 2 | 0 | 2026-04-10T02:16:03.553000 | The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite v | |
| CVE-2026-3360 | 7.5 | 0.00% | 2 | 0 | 2026-04-10T02:16:03.073000 | The Tutor LMS – eLearning and online course solution plugin for WordPress is vul | |
| CVE-2026-25203 | 7.8 | 0.00% | 2 | 0 | 2026-04-10T02:16:02.767000 | Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalat | |
| CVE-2026-5995 | 9.8 | 0.00% | 4 | 0 | 2026-04-10T01:16:42.490000 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Impacte | |
| CVE-2026-5994 | 9.8 | 0.00% | 2 | 0 | 2026-04-10T01:16:42.280000 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th | |
| CVE-2026-5993 | 9.8 | 0.00% | 2 | 0 | 2026-04-10T01:16:41.743000 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This vu | |
| CVE-2026-29146 | None | 0.00% | 1 | 0 | 2026-04-10T00:30:29 | Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default | |
| CVE-2026-5989 | 8.8 | 0.00% | 2 | 0 | 2026-04-10T00:16:36.170000 | A flaw has been found in Tenda F451 1.0.0.7. Affected is the function fromRouteS | |
| CVE-2026-34424 | 9.8 | 0.00% | 2 | 0 | 2026-04-09T23:17:00.540000 | Smart Slider 3 Pro version 3.5.1.35 for WordPress and Joomla contains a multi-st | |
| CVE-2026-35471 | 9.8 | 0.07% | 1 | 0 | 2026-04-09T21:20:35.993000 | goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() | |
| CVE-2026-39987 | None | 0.00% | 1 | 0 | template | 2026-04-09T19:06:18 | ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal |
| CVE-2026-35575 | 8.0 | 0.04% | 1 | 0 | 2026-04-09T18:47:25.823000 | ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored C | |
| CVE-2026-39344 | 8.1 | 0.03% | 1 | 0 | 2026-04-09T18:42:28.200000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a | |
| CVE-2026-1342 | 8.5 | 0.01% | 2 | 0 | 2026-04-09T18:29:07.290000 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify | |
| CVE-2026-39318 | 8.8 | 0.03% | 1 | 0 | 2026-04-09T18:17:01.647000 | ChurchCRM is an open-source church management system. Versions prior to 7.1.0 ha | |
| CVE-2026-39890 | 9.8 | 0.29% | 1 | 0 | 2026-04-09T17:16:29.663000 | PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.load | |
| CVE-2026-39885 | 7.5 | 0.03% | 1 | 0 | 2026-04-09T14:29:54 | ## Summary The `mcp-from-openapi` library uses `@apidevtools/json-schema-ref-pa | |
| CVE-2026-39889 | 7.5 | 0.04% | 2 | 0 | 2026-04-09T14:29:17 | The A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activ | |
| CVE-2026-39429 | 8.2 | 0.07% | 1 | 0 | 2026-04-09T14:28:53 | ### Summary The cache server is directly exposed by the root shard and has no a | |
| CVE-2026-40035 | 9.1 | 0.10% | 2 | 0 | 2026-04-09T14:16:32.387000 | Unfurl through 2025.08 contains an improper input validation vulnerability in co | |
| CVE-2026-39891 | 8.8 | 0.05% | 2 | 0 | 2026-04-09T14:16:31.537000 | PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_cent | |
| CVE-2024-1490 | 7.2 | 0.23% | 1 | 0 | 2026-04-09T12:31:22 | An authenticated remote attacker with high privileges can exploit the OpenVPN co | |
| CVE-2026-5853 | 9.8 | 0.89% | 1 | 0 | 2026-04-09T09:31:57 | A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191 | |
| CVE-2026-5852 | 9.8 | 0.89% | 1 | 0 | 2026-04-09T09:31:56 | A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affecte | |
| CVE-2026-5854 | 9.8 | 0.23% | 1 | 0 | 2026-04-09T09:31:56 | A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected | |
| CVE-2026-5850 | 9.8 | 0.89% | 2 | 0 | 2026-04-09T06:30:36 | A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This af | |
| CVE-2026-5851 | 9.8 | 0.89% | 2 | 0 | 2026-04-09T06:30:35 | A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. Th | |
| CVE-2026-5844 | 7.2 | 0.19% | 1 | 0 | 2026-04-09T05:16:06.653000 | A vulnerability was found in D-Link DIR-882 1.01B02. Impacted is the function sp | |
| CVE-2026-1830 | 9.8 | 0.18% | 2 | 0 | 2026-04-09T05:16:03.420000 | The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution | |
| CVE-2026-5830 | 8.8 | 0.05% | 1 | 0 | 2026-04-09T03:31:24 | A vulnerability was identified in Tenda AC15 15.03.05.18. This affects the funct | |
| CVE-2026-4326 | 8.8 | 0.08% | 1 | 0 | 2026-04-09T02:16:16.530000 | The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Au | |
| CVE-2026-5173 | 8.5 | 0.02% | 1 | 1 | 2026-04-09T00:32:08 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9. | |
| CVE-2026-5815 | 8.8 | 0.08% | 1 | 0 | 2026-04-09T00:32:08 | A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the f | |
| CVE-2026-40031 | 7.8 | 0.01% | 2 | 0 | 2026-04-09T00:32:07 | MemProcFS before 5.17 contains multiple unsafe library-loading patterns that ena | |
| CVE-2026-40032 | 7.8 | 0.02% | 1 | 0 | 2026-04-09T00:32:07 | UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injectio | |
| CVE-2026-40030 | 7.8 | 0.02% | 1 | 0 | 2026-04-09T00:32:07 | parseusbs before 1.9 contains an OS command injection vulnerability where the vo | |
| CVE-2026-40036 | 7.5 | 0.10% | 1 | 0 | 2026-04-09T00:32:07 | Unfurl before 2026.04 contains an unbounded zlib decompression vulnerability in | |
| CVE-2026-5859 | None | 0.03% | 1 | 0 | 2026-04-09T00:32:07 | Integer overflow in WebML in Google Chrome prior to 147.0.7727.55 allowed a remo | |
| CVE-2025-12664 | 7.5 | 0.02% | 1 | 0 | 2026-04-09T00:32:01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0 | |
| CVE-2026-1092 | 7.5 | 0.02% | 1 | 0 | 2026-04-09T00:32:01 | GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.10 | |
| CVE-2026-3199 | 0 | 0.07% | 1 | 0 | 2026-04-08T23:16:59.160000 | A vulnerability in the task management component of Sonatype Nexus Repository ve | |
| CVE-2026-40029 | 7.8 | 0.02% | 1 | 0 | 2026-04-08T22:16:23.303000 | parseusbs before 1.9 contains an OS command injection vulnerability in parseUSBs | |
| CVE-2026-1340 | 9.8 | 73.80% | 5 | 2 | 2026-04-08T21:34:17 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2026-5436 | 8.1 | 0.18% | 1 | 0 | 2026-04-08T21:33:45 | The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in | |
| CVE-2026-2942 | 9.8 | 0.13% | 1 | 0 | 2026-04-08T21:33:41 | The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file u | |
| CVE-2026-35457 | 8.2 | 0.04% | 1 | 0 | 2026-04-08T21:27:15.610000 | libp2p-rust is the official rust language Implementation of the libp2p networkin | |
| CVE-2026-5627 | 9.1 | 0.03% | 2 | 0 | 2026-04-08T21:27:15.610000 | A path traversal vulnerability exists in mintplex-labs/anything-llm versions up | |
| CVE-2026-24146 | 7.5 | 0.04% | 1 | 0 | 2026-04-08T21:27:00.663000 | NVIDIA Triton Inference Server contains a vulnerability where insufficient input | |
| CVE-2026-39328 | 8.9 | 0.04% | 1 | 0 | 2026-04-08T21:27:00.663000 | ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored c | |
| CVE-2026-39355 | 9.9 | 0.04% | 1 | 0 | 2026-04-08T21:27:00.663000 | Genealogy is a family tree PHP application. Prior to 5.9.1, a critical broken ac | |
| CVE-2026-32864 | 7.8 | 0.01% | 1 | 0 | 2026-04-08T21:27:00.663000 | There is a memory corruption vulnerability due to an out-of-bounds read in mgcor | |
| CVE-2026-39371 | 8.1 | 0.01% | 1 | 1 | 2026-04-08T21:27:00.663000 | RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver | |
| CVE-2026-29181 | 7.5 | 0.04% | 1 | 0 | 2026-04-08T21:27:00.663000 | OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40. | |
| CVE-2026-5373 | 8.1 | 0.03% | 1 | 0 | 2026-04-08T21:27:00.663000 | An issue that allowed all-organization administrators to promote accounts to sup | |
| CVE-2026-25776 | 9.8 | 0.05% | 2 | 0 | 2026-04-08T21:26:35.910000 | Movable Type provided by Six Apart Ltd. contains a code injection vulnerability | |
| CVE-2026-24913 | 8.8 | 0.03% | 1 | 0 | 2026-04-08T21:26:35.910000 | SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this | |
| CVE-2026-4003 | 9.8 | 0.42% | 2 | 0 | 2026-04-08T21:26:35.910000 | The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalatio | |
| CVE-2026-39846 | 9.0 | 0.14% | 2 | 0 | 2026-04-08T21:26:35.910000 | SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious no | |
| CVE-2026-3357 | 8.8 | 0.07% | 1 | 0 | 2026-04-08T21:26:35.910000 | IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated u | |
| CVE-2026-5208 | 8.2 | 0.05% | 1 | 0 | 2026-04-08T21:26:13.410000 | Command injection in alerts in CoolerControl/coolercontrold <4.0.0 allows authen | |
| CVE-2026-28261 | 7.8 | 0.01% | 1 | 0 | 2026-04-08T21:26:13.410000 | Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, ver | |
| CVE-2026-39393 | 8.1 | 0.01% | 1 | 0 | 2026-04-08T21:26:13.410000 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo | |
| CVE-2026-4498 | 7.7 | 0.05% | 1 | 0 | 2026-04-08T21:26:13.410000 | Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug r | |
| CVE-2026-35478 | 8.3 | 0.07% | 1 | 0 | 2026-04-08T21:26:13.410000 | InvenTree is an Open Source Inventory Management System. From 0.16.0 to before 1 | |
| CVE-2026-33229 | 0 | 0.03% | 1 | 0 | 2026-04-08T21:26:13.410000 | XWiki Platform is a generic wiki platform offering runtime services for applicat | |
| CVE-2026-39888 | 9.9 | 0.08% | 1 | 0 | 2026-04-08T21:25:14.927000 | PraisonAI is a multi-agent teams system. Prior to 1.5.115, execute_code() in pra | |
| CVE-2026-39394 | 8.1 | 0.02% | 1 | 0 | 2026-04-08T19:16:14 | ## Summary The `Install::index()` controller reads the `host` POST parameter wi | |
| CVE-2026-4740 | 8.3 | 0.01% | 1 | 0 | 2026-04-08T19:13:59 | A flaw was found in Open Cluster Management (OCM), the technology underlying Red | |
| CVE-2026-4338 | 7.5 | 0.04% | 1 | 0 | 2026-04-08T18:35:58 | The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to | |
| CVE-2026-33466 | 8.1 | 0.28% | 1 | 0 | 2026-04-08T18:34:20 | Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash | |
| CVE-2026-33461 | 7.7 | 0.06% | 1 | 0 | 2026-04-08T18:34:08 | Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure v | |
| CVE-2026-27806 | 7.8 | 0.01% | 1 | 0 | 2026-04-08T18:03:54 | ## Summary The Orbit agent's FileVault disk encryption key rotation flow on col | |
| CVE-2026-5301 | 7.6 | 0.02% | 1 | 0 | 2026-04-08T15:31:50 | Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4.0.0 allows unauthe | |
| CVE-2026-3396 | 7.5 | 0.08% | 1 | 0 | 2026-04-08T12:31:36 | WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL I | |
| CVE-2026-3243 | 8.8 | 0.20% | 1 | 0 | 2026-04-08T12:31:36 | The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary fil | |
| CVE-2026-39847 | 9.1 | 0.05% | 2 | 0 | 2026-04-08T11:57:19 | The RSGI static handler for Emmett's internal assets (`/__emmett__` paths) is vu | |
| CVE-2026-3535 | 9.8 | 0.28% | 2 | 0 | 2026-04-08T09:31:42 | The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary | |
| CVE-2026-5726 | 7.8 | 0.01% | 1 | 0 | 2026-04-08T03:32:18 | ASDA-Soft Stack-based Buffer Overflow Vulnerability | |
| CVE-2026-1346 | 9.4 | 0.01% | 3 | 0 | 2026-04-08T03:32:18 | IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify | |
| CVE-2026-4788 | 8.4 | 0.01% | 1 | 0 | 2026-04-08T03:32:18 | IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information | |
| CVE-2026-3499 | 8.8 | 0.02% | 1 | 0 | 2026-04-08T03:32:18 | The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce | |
| CVE-2026-3296 | 9.8 | 0.02% | 1 | 0 | 2026-04-08T03:32:18 | The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in | |
| CVE-2026-39933 | None | 0.05% | 1 | 0 | 2026-04-08T00:30:33 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2026-39397 | 9.4 | 0.04% | 1 | 0 | 2026-04-08T00:15:54 | ### Impact All `/api/puck/*` CRUD endpoint handlers registered by `createPuckPl | |
| CVE-2026-39356 | 7.5 | 0.03% | 1 | 0 | 2026-04-08T00:14:59 | ### Summary Drizzle ORM improperly escaped quoted SQL identifiers in its dialec | |
| CVE-2026-39376 | 7.5 | 0.04% | 1 | 0 | 2026-04-08T00:12:27 | ### Summary When `parse()` fetches a URL that returns an HTML page containing a | |
| CVE-2026-39369 | 7.6 | 0.05% | 1 | 0 | 2026-04-08T00:08:46 | ## Summary `objects/aVideoEncoderReceiveImage.json.php` allowed an authenticate | |
| CVE-2026-35533 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T22:16:56 | ### Summary `mise` loads trust-control settings from a local project `.mise.tom | |
| CVE-2026-32862 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T21:32:46 | There is a memory corruption vulnerability due to an out-of-bounds write in ResF | |
| CVE-2026-32861 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T21:32:46 | There is a memory corruption vulnerability due to an out-of-bounds write when lo | |
| CVE-2026-32860 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T21:32:46 | There is a memory corruption vulnerability due to an out-of-bounds write when lo | |
| CVE-2026-32863 | 7.8 | 0.01% | 1 | 0 | 2026-04-07T21:32:46 | There is a memory corruption vulnerability due to an out-of-bounds read in sentr | |
| CVE-2026-35464 | 7.5 | 0.08% | 1 | 0 | 2026-04-07T20:00:07 | ## Summary The fix for CVE-2026-33509 (GHSA-r7mc-x6x7-cqxx) added an `ADMIN_ONL | |
| CVE-2026-35463 | 8.8 | 0.26% | 1 | 0 | 2026-04-07T19:59:57 | ### Summary The `ADMIN_ONLY_OPTIONS` protection mechanism restricts security-cr | |
| CVE-2026-35405 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T19:59:37 | ### Summary The`libp2p-rendezvous` server has no limit on how many namespaces a | |
| CVE-2026-24660 | 8.1 | 0.04% | 1 | 0 | 2026-04-07T18:32:41 | A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functi | |
| CVE-2026-24173 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T18:31:45 | NVIDIA Triton Inference Server contains a vulnerability where an attacker could | |
| CVE-2026-24175 | 7.5 | 0.04% | 1 | 0 | 2026-04-07T18:31:45 | NVIDIA Triton Inference Server contains a vulnerability where an attacker could | |
| CVE-2026-24450 | 8.1 | 0.04% | 1 | 0 | 2026-04-07T18:31:35 | An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw fun | |
| CVE-2026-34989 | 0 | 0.05% | 1 | 0 | 2026-04-07T17:16:29.093000 | CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo | |
| CVE-2026-20432 | 8.0 | 0.05% | 1 | 0 | 2026-04-07T15:31:49 | In Modem, there is a possible out of bounds write due to a missing bounds check. | |
| CVE-2026-23818 | 8.8 | 0.04% | 1 | 0 | 2026-04-07T15:30:58 | A vulnerability has been identified in the graphical user interface (GUI) of HPE | |
| CVE-2026-22679 | 9.8 | 0.31% | 1 | 0 | 2026-04-07T15:30:53 | Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthentica | |
| CVE-2026-34197 | 8.8 | 5.60% | 4 | 6 | template | 2026-04-07T15:30:49 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti |
| CVE-2026-20433 | 8.8 | 0.05% | 1 | 0 | 2026-04-07T15:30:48 | In Modem, there is a possible out of bounds write due to a missing bounds check. | |
| CVE-2026-1114 | 9.8 | 0.04% | 2 | 0 | 2026-04-07T14:16:18.567000 | In parisneo/lollms version 2.1.0, the application's session management is vulner | |
| CVE-2026-34904 | 7.5 | 0.02% | 1 | 0 | 2026-04-07T13:20:11.643000 | Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media | |
| CVE-2026-31842 | 7.5 | 0.05% | 1 | 0 | 2026-04-07T12:31:21 | Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization | |
| CVE-2026-34896 | 7.5 | 0.02% | 1 | 0 | 2026-04-07T09:31:28 | Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, | |
| CVE-2026-5465 | 8.8 | 0.05% | 1 | 1 | 2026-04-07T09:31:28 | The Booking for Appointments and Events Calendar – Amelia plugin for WordPress i | |
| CVE-2026-0740 | 9.8 | 0.08% | 1 | 1 | 2026-04-07T06:30:28 | The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary f | |
| CVE-2025-65115 | 8.8 | 0.07% | 1 | 0 | 2026-04-07T06:30:28 | Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on | |
| CVE-2026-35393 | 9.8 | 0.07% | 1 | 0 | 2026-04-06T23:43:51 | ### Summary * POST multipart upload directory not sanitized | `httpserver/updown | |
| CVE-2026-33579 | None | 0.02% | 1 | 1 | 2026-04-06T23:39:45 | ## Summary The `/pair approve` command path called device approval without forw | |
| CVE-2026-34976 | 10.0 | 0.03% | 1 | 0 | 2026-04-06T23:26:04 | The `restoreTenant` admin mutation is missing from the authorization middleware | |
| CVE-2026-35616 | 9.8 | 5.95% | 5 | 5 | template | 2026-04-06T18:33:04 | A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through |
| CVE-2026-3184 | 3.7 | 0.10% | 1 | 1 | 2026-04-03T21:31:49 | A flaw was found in util-linux. Improper hostname canonicalization in the `login | |
| CVE-2026-34040 | 8.8 | 0.01% | 3 | 0 | 2026-04-03T16:51:28.670000 | Moby is an open source container framework. Prior to version 29.3.1, a security | |
| CVE-2026-1668 | 9.8 | 0.37% | 1 | 1 | 2026-04-02T15:32:40 | The web interface on multiple Omada switches does not adequately validate certai | |
| CVE-2025-59032 | 7.5 | 0.07% | 1 | 0 | 2026-03-27T09:31:18 | ManageSieve AUTHENTICATE command crashes when using literal as SASL initial resp | |
| CVE-2026-33509 | 7.5 | 0.08% | 1 | 0 | 2026-03-26T20:47:02.337000 | pyLoad is a free and open-source download manager written in Python. From versio | |
| CVE-2026-3497 | None | 0.03% | 1 | 0 | 2026-03-18T21:34:00 | Vulnerability in the OpenSSH GSSAPI delta included in various Linux distribution | |
| CVE-2026-23060 | 5.5 | 0.01% | 1 | 0 | 2026-03-13T21:32:48 | In the Linux kernel, the following vulnerability has been resolved: crypto: aut | |
| CVE-2025-66614 | 9.1 | 0.04% | 1 | 0 | 2026-03-11T20:38:07 | Improper Input Validation vulnerability. This issue affects Apache Tomcat: from | |
| CVE-2025-66168 | 5.4 | 0.04% | 1 | 0 | 2026-03-04T22:19:26 | Apache ActiveMQ does not properly validate the remaining length field which may | |
| CVE-2026-1281 | 9.8 | 71.80% | 1 | 2 | 2026-01-30T00:31:29 | A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve | |
| CVE-2025-59718 | 9.8 | 7.62% | 1 | 2 | 2025-12-16T21:30:51 | A improper verification of cryptographic signature vulnerability in Fortinet For | |
| CVE-2025-55182 | 10.0 | 66.27% | 4 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2023-48788 | 9.8 | 94.13% | 1 | 1 | template | 2025-10-24T12:54:49.670000 | A improper neutralization of special elements used in an sql command ('sql injec |
| CVE-2025-59528 | 10.0 | 82.39% | 6 | 1 | template | 2025-09-23T16:45:09.443000 | Flowise is a drag & drop user interface to build a customized large language mod |
| CVE-2025-4870 | 7.3 | 0.20% | 1 | 4 | 2025-05-21T21:32:25 | A vulnerability classified as critical was found in itsourcecode Restaurant Mana | |
| CVE-2016-2183 | 7.5 | 40.99% | 1 | 1 | 2025-04-12T10:46:40.837000 | The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and | |
| CVE-2020-8562 | 2.2 | 0.06% | 1 | 0 | 2024-11-21T05:39:02.180000 | As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to p | |
| CVE-2024-34359 | 9.7 | 56.67% | 1 | 0 | 2024-05-28T17:58:37 | ## Description `llama-cpp-python` depends on class `Llama` in `llama.py` to loa | |
| CVE-2023-38766 | 5.4 | 0.21% | 1 | 0 | 2024-04-04T06:40:24 | Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote at | |
| CVE-2025-65027 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-0234 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-0233 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-30461 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-34179 | 0 | 0.09% | 1 | 0 | N/A | ||
| CVE-2026-33756 | 0 | 0.08% | 1 | 0 | N/A | ||
| CVE-2026-34392 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-33350 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-35401 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-35169 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-35446 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-23869 | 0 | 0.32% | 1 | 0 | N/A | ||
| CVE-2026-39863 | 0 | 0.11% | 1 | 0 | N/A | ||
| CVE-2026-39860 | 0 | 0.02% | 1 | 0 | N/A | ||
| CVE-2024-27297 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-0232 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-32251 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-35573 | 0 | 0.24% | 1 | 0 | N/A | ||
| CVE-2026-39319 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39317 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-35576 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39327 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39326 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39323 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-39333 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39332 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39331 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-39330 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39329 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39339 | 0 | 0.10% | 1 | 0 | N/A | ||
| CVE-2026-39337 | 0 | 0.27% | 1 | 0 | N/A | ||
| CVE-2026-39334 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39341 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39340 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-39361 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-34045 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-5747 | 0 | 0.01% | 1 | 0 | N/A | ||
| CVE-2026-35485 | 0 | 0.37% | 1 | 0 | N/A |
updated 2026-04-10T02:16:04.247000
4 posts
🔴 CVE-2026-5997 - Critical (9.8)
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass results in os c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5997/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Totolink A7100RU (7.4cu.2313_b20191024) hit by CRITICAL OS command injection (CVE-2026-5997) — remote, unauthenticated code execution possible. No patch yet. Disable remote management & limit access! https://radar.offseq.com/threat/cve-2026-5997-os-command-injection-in-totolink-a71-76c83173 #OffSeq #CVE20265997 #RouterSecurity #Vuln
##🔴 CVE-2026-5997 - Critical (9.8)
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The impacted element is the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass results in os c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5997/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Totolink A7100RU (7.4cu.2313_b20191024) hit by CRITICAL OS command injection (CVE-2026-5997) — remote, unauthenticated code execution possible. No patch yet. Disable remote management & limit access! https://radar.offseq.com/threat/cve-2026-5997-os-command-injection-in-totolink-a71-76c83173 #OffSeq #CVE20265997 #RouterSecurity #Vuln
##updated 2026-04-10T02:16:04.043000
2 posts
🔴 CVE-2026-5996 - Critical (9.8)
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tty_serve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5996/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-5996 - Critical (9.8)
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tty_serve...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5996/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T02:16:03.553000
2 posts
🟠 CVE-2026-4351 - High (8.1)
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the `PMCS::action_handler()` method processing the bulk action `activate`/`deactivate` ha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4351/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4351 - High (8.1)
The Perfmatters plugin for WordPress is vulnerable to arbitrary file overwrite via path traversal in all versions up to, and including, 2.5.9. This is due to the `PMCS::action_handler()` method processing the bulk action `activate`/`deactivate` ha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4351/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T02:16:03.073000
2 posts
🟠 CVE-2026-3360 - High (7.5)
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to an Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authentication and authorization checks in the `pa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3360/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3360 - High (7.5)
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to an Insecure Direct Object Reference in all versions up to, and including, 3.9.7. This is due to missing authentication and authorization checks in the `pa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3360/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T02:16:02.767000
2 posts
🟠 CVE-2026-25203 - High (7.8)
Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability
This issue affects MagicINFO 9 Server: less than 21.1091.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25203/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25203 - High (7.8)
Samsung MagicINFO 9 Server Incorrect Default Permissions Local Privilege Escalation Vulnerability
This issue affects MagicINFO 9 Server: less than 21.1091.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25203/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T01:16:42.490000
4 posts
🔴 CVE-2026-5995 - Critical (9.8)
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument lan_info can lead to os...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛑 CRITICAL: CVE-2026-5995 in Totolink A7100RU (7.4cu.2313_b20191024) enables remote, unauthenticated OS command injection via /cgi-bin/cstecgi.cgi. No patch yet — disable remote mgmt & restrict access. https://radar.offseq.com/threat/cve-2026-5995-os-command-injection-in-totolink-a71-27cc3191 #OffSeq #Infosec #Vulnerability
##🔴 CVE-2026-5995 - Critical (9.8)
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Impacted is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument lan_info can lead to os...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛑 CRITICAL: CVE-2026-5995 in Totolink A7100RU (7.4cu.2313_b20191024) enables remote, unauthenticated OS command injection via /cgi-bin/cstecgi.cgi. No patch yet — disable remote mgmt & restrict access. https://radar.offseq.com/threat/cve-2026-5995-os-command-injection-in-totolink-a71-27cc3191 #OffSeq #Infosec #Vulnerability
##updated 2026-04-10T01:16:42.280000
2 posts
🔴 CVE-2026-5994 - Critical (9.8)
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument telnet_enabled resu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5994/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-5994 - Critical (9.8)
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This issue affects the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument telnet_enabled resu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5994/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T01:16:41.743000
2 posts
🔴 CVE-2026-5993 - Critical (9.8)
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setWiFiGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument wifiOff leads to os c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-5993 - Critical (9.8)
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This vulnerability affects the function setWiFiGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument wifiOff leads to os c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-10T00:30:29
1 posts
🚨 EUVD-2026-21056
📊 Score: n/a
📦 Product: Apache Tomcat, Apache Tomcat, Apache Tomcat
🏢 Vendor: Apache Software Foundation
📅 Updated: 2026-04-09
📝 Missing Encryption of Sensitive Data vulnerability in Apache Tomcat due to the fix for CVE-2026-29146 allowing the bypass of the EncryptInterceptor.
This issue affects Apache Tomcat: 11.0.20, 10.1.53, 9.0.116.
Users ...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21056
##updated 2026-04-10T00:16:36.170000
2 posts
🟠 CVE-2026-5989 - High (8.8)
A flaw has been found in Tenda F451 1.0.0.7. Affected is the function fromRouteStatic of the file /goform/RouteStatic. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack can be launched remotely. The ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5989 - High (8.8)
A flaw has been found in Tenda F451 1.0.0.7. Affected is the function fromRouteStatic of the file /goform/RouteStatic. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack can be launched remotely. The ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T23:17:00.540000
2 posts
⚠️ CVE-2026-34424 (CRITICAL): Smart Slider 3 Pro 3.5.1.35 for WordPress/Joomla has embedded malicious code via a compromised update system. Unauth RCE, backdoors, hidden admins, data exfil possible. Remove plugin & monitor. No fix yet. https://radar.offseq.com/threat/cve-2026-34424-cwe-506-embedded-malicious-code-in--565778ad #OffSeq #WordPress #Infosec
##⚠️ CVE-2026-34424 (CRITICAL): Smart Slider 3 Pro 3.5.1.35 for WordPress/Joomla has embedded malicious code via a compromised update system. Unauth RCE, backdoors, hidden admins, data exfil possible. Remove plugin & monitor. No fix yet. https://radar.offseq.com/threat/cve-2026-34424-cwe-506-embedded-malicious-code-in--565778ad #OffSeq #WordPress #Infosec
##updated 2026-04-09T21:20:35.993000
1 posts
🚨 CRITICAL: goshs (<2.0.0-beta.3) vulnerable to path traversal (CVE-2026-35471). Remote attackers can access/delete files outside restricted dirs. Patch with 2.0.0-beta.3 ASAP! https://radar.offseq.com/threat/cve-2026-35471-cwe-22-improper-limitation-of-a-pat-515b5296 #OffSeq #infosec #golang #CVE202635471
##updated 2026-04-09T19:06:18
1 posts
One missed auth check on a WebSocket = full shell. The #Marimo vuln (CVE-2026-39987) was exploited in ~10 hours.
Upgrade to 0.23.0+, enforce auth on every WebSocket, and keep terminals off the public internet—WebSockets don’t inherit security.
https://www.endorlabs.com/learn/root-in-one-request-marimos-critical-pre-auth-rce-cve-2026-39987
updated 2026-04-09T18:47:25.823000
1 posts
🟠 CVE-2026-35575 - High (8)
ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored Cross-Site Scripting (Stored XSS) vulnerability in the admin panel’s group-creation feature allows any user with group-creation privileges to inject malicious JavaScr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35575/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T18:42:28.200000
1 posts
🟠 CVE-2026-39344 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a Reflected Cross-Site Scripting (XSS) vulnerability on the login page, which is caused by the lack of sanitization or encoding of the username parameter received from ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39344/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T18:29:07.290000
2 posts
🟠 CVE-2026-1342 - High (8.5)
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1342/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-1342 - High (8.5)
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1342/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T18:17:01.647000
1 posts
🟠 CVE-2026-39318 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, the GroupPropsFormRowOps.php file contains a SQL injection vulnerability. User input in the Field parameter is directly inserted into SQL queries without proper sanitization. Th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39318/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T17:16:29.663000
1 posts
🔴 CVE-2026-39890 - Critical (9.8)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the AgentService.loadAgentFromFile method uses the js-yaml library to parse YAML files without disabling dangerous tags (such as !!js/function and !!js/undefined). This allows an attacker ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T14:29:54
1 posts
🟠 CVE-2026-39885 - High (7.5)
FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39885/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T14:29:17
2 posts
🟠 CVE-2026-39889 - High (7.5)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. The create_a2u_routes() function registers the following endpoints with NO authe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39889 - High (7.5)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the A2U (Agent-to-User) event stream server in PraisonAI exposes all agent activity without authentication. The create_a2u_routes() function registers the following endpoints with NO authe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39889/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T14:28:53
1 posts
🟠 CVE-2026-39429 - High (8.2)
kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.30.3 and 0.29.3, the cache server is directly exposed by the root shard and has no authentication or authorization in place...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39429/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T14:16:32.387000
2 posts
🔴 CVE-2026-40035 - Critical (9.1)
Unfurl through 2025.08 contains an improper input validation vulnerability in config parsing that enables Flask debug mode by default. The debug configuration value is read as a string and passed directly to app.run(), causing any non-empty string...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40035/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: obsidianforensics unfurl up to 2025.08 enables Flask debug mode by default. Attackers can exploit CVE-2026-40035 for RCE & info disclosure. Avoid production use, disable debug mode, monitor for fixes. https://radar.offseq.com/threat/cve-2026-40035-cwe-489-active-debug-code-in-obsidi-883d1265 #OffSeq #Vuln #Flask #CVE202640035
##updated 2026-04-09T14:16:31.537000
2 posts
🟠 CVE-2026-39891 - High (8.8)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly int...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39891/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39891 - High (8.8)
PraisonAI is a multi-agent teams system. Prior to 4.5.115, the create_agent_centric_tools() function returns tools (like acp_create_file) that process file content using template rendering. When user input from agent.start() is passed directly int...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39891/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T12:31:22
1 posts
#OT #Advisory VDE-2024-008
Wago: Vulnerability in WBM through Open VPN
A security vulnerability has been identified in the Web-Based Management (WBM) function when OpenVPN is enabled.
#CVE CVE-2024-1490
https://certvde.com/en/advisories/vde-2024-008/
#oCSAF
#CSAF https://wago.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2024-008.json
updated 2026-04-09T09:31:57
1 posts
🔴 CVE-2026-5853 - Critical (9.8)
A security vulnerability has been detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument addr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5853/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T09:31:56
1 posts
🔴 CVE-2026-5852 - Critical (9.8)
A weakness has been identified in Totolink A7100RU 7.4cu.2313_b20191024. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument igmpVer causes os command injection. The ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5852/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T09:31:56
1 posts
🔴 CVE-2026-5854 - Critical (9.8)
A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument merge results in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5854/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T06:30:36
2 posts
🛑 CRITICAL: CVE-2026-5850 in Totolink A7100RU (fw 7.4cu.2313_b20191024) enables unauthenticated OS command injection via pptpPassThru. No patch yet — restrict access & monitor advisories. https://radar.offseq.com/threat/cve-2026-5850-os-command-injection-in-totolink-a71-c437d074 #OffSeq #CVE20265850 #RouterSecurity #Infosec
##🔴 CVE-2026-5850 - Critical (9.8)
A vulnerability was identified in Totolink A7100RU 7.4cu.2313_b20191024. This affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru leads to os command injec...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5850/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T06:30:35
2 posts
🔒 CVE-2026-5851: CRITICAL OS command injection in Totolink A7100RU (7.4cu.2313_b20191024). Remote, unauthenticated RCE possible via /cgi-bin/cstecgi.cgi. Exploit public, no patch. Isolate device and check for updates! https://radar.offseq.com/threat/cve-2026-5851-os-command-injection-in-totolink-a71-cec71662 #OffSeq #CVE20265851 #IoTSec
##🔴 CVE-2026-5851 - Critical (9.8)
A security flaw has been discovered in Totolink A7100RU 7.4cu.2313_b20191024. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injecti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5851/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T05:16:06.653000
1 posts
🔒 CVE-2026-5844: HIGH-severity OS command injection in D-Link DIR-882 (v1.01B02). Remote attackers can execute arbitrary OS commands. No official fix — upgrade or restrict remote access. Details: https://radar.offseq.com/threat/cve-2026-5844-os-command-injection-in-d-link-dir-8-643de94e #OffSeq #DLink #Vuln #RouterSecurity
##updated 2026-04-09T05:16:03.420000
2 posts
🔴 CVE-2026-1830 - Critical (9.8)
The Quick Playground plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.3.1. This is due to insufficient authorization checks on REST API endpoints that expose a sync code and allow arbitrary file u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-1830: CRITICAL RCE in davidfcarr Quick Playground (WordPress ≤1.3.1). Unauthenticated users can upload PHP files via REST API flaw — patch or disable plugin now! https://radar.offseq.com/threat/cve-2026-1830-cwe-862-missing-authorization-in-dav-233f04bb #OffSeq #WordPress #Infosec #CVE20261830
##updated 2026-04-09T03:31:24
1 posts
🟠 CVE-2026-5830 - High (8.8)
A vulnerability was identified in Tenda AC15 15.03.05.18. This affects the function websGetVar of the file /goform/SysToolChangePwd. Such manipulation of the argument oldPwd/newPwd/cfmPwd leads to stack-based buffer overflow. The attack can be exe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5830/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T02:16:16.530000
1 posts
🟠 CVE-2026-4326 - High (8.8)
The Vertex Addons for Elementor plugin for WordPress is vulnerable to Missing Authorization in all versions up to and including 1.6.4. This is due to improper authorization enforcement in the activate_required_plugins() function. Specifically, the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4326/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:08
1 posts
1 repos
🟠 CVE-2026-5173 - High (8.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 16.9.6 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an authenticated user to invoke unintended server-side methods through websocket ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5173/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:08
1 posts
🟠 CVE-2026-5815 - High (8.8)
A vulnerability was detected in D-Link DIR-645 1.01/1.02/1.03. Impacted is the function hedwigcgi_main of the file /cgi-bin/hedwig.cgi. The manipulation results in stack-based buffer overflow. The attack can be launched remotely. The exploit is no...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:07
2 posts
🟠 CVE-2026-40031 - High (7.8)
MemProcFS before 5.17 contains multiple unsafe library-loading patterns that enable DLL and shared-library hijacking across six attack surfaces, including bare-name LoadLibraryU and dlopen calls without path qualification for vmmpyc, libMSCompress...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40031/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40031 - High (7.8)
MemProcFS before 5.17 contains multiple unsafe library-loading patterns that enable DLL and shared-library hijacking across six attack surfaces, including bare-name LoadLibraryU and dlopen calls without path qualification for vmmpyc, libMSCompress...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40031/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:07
1 posts
🟠 CVE-2026-40032 - High (7.8)
UAC (Unix-like Artifacts Collector) before 3.3.0-rc1 contains a command injection vulnerability in the placeholder substitution and command execution pipeline where the _run_command() function passes constructed command strings directly to eval wi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40032/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:07
1 posts
🟠 CVE-2026-40030 - High (7.8)
parseusbs before 1.9 contains an OS command injection vulnerability where the volume listing path argument (-v flag) is passed unsanitized into an os.popen() shell command with ls, allowing arbitrary command injection via crafted volume path argum...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40030/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:07
1 posts
🟠 CVE-2026-40036 - High (7.5)
Unfurl before 2026.04 contains an unbounded zlib decompression vulnerability in parse_compressed.py that allows remote attackers to cause denial of service. Attackers can submit highly compressed payloads via URL parameters to the /json/visjs end...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40036/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:07
1 posts
⚠️ CRITICAL: CVE-2026-5859 in Chrome WebML (<147.0.7727.55) allows heap corruption via integer overflow. Remote code execution possible if exploited. Patch not fully confirmed — check vendor advisory for updates: https://radar.offseq.com/threat/cve-2026-5859-integer-overflow-in-google-chrome-baee9cba #OffSeq #Chrome #Vuln #InfoSec
##updated 2026-04-09T00:32:01
1 posts
🟠 CVE-2025-12664 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.0 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an unauthenticated user to cause denial of service by sending repeated GraphQL quer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-12664/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T00:32:01
1 posts
🟠 CVE-2026-1092 - High (7.5)
GitLab has remediated an issue in GitLab CE/EE affecting all versions from 12.10 before 18.8.9, 18.9 before 18.9.5, and 18.10 before 18.10.3 that could have allowed an unauthenticated user to cause denial of service due to improper input validatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1092/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T23:16:59.160000
1 posts
⚠️ CRITICAL: CVE-2026-3199 in Sonatype Nexus Repository (3.22.1-3.90.2) enables arbitrary code execution via task deserialization by authenticated users. Restrict permissions & monitor activity. Patch pending. https://radar.offseq.com/threat/cve-2026-3199-cwe-502-deserialization-of-untrusted-067114aa #OffSeq #Vuln #Nexus #Infosec
##updated 2026-04-08T22:16:23.303000
1 posts
🟠 CVE-2026-40029 - High (7.8)
parseusbs before 1.9 contains an OS command injection vulnerability in parseUSBs.py where LNK file paths are passed unsanitized into an os.popen() shell command, allowing arbitrary command execution via crafted .lnk filenames containing shell meta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40029/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:34:17
5 posts
2 repos
https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
CISA adds CVE-2026-1340 (Ivanti EPMM) to KEV ⚠️
Active exploitation confirmed
Known vulns = real attack surface
Are KEVs in your patch priority?
💬 Engage
🔔 Follow TechNadu
CISA adds CVE-2026-1340 (Ivanti EPMM) to KEV ⚠️
Active exploitation confirmed
Known vulns = real attack surface
Are KEVs in your patch priority?
💬 Engage
🔔 Follow TechNadu
CISA has added two industrial advisories today: https://www.cisa.gov/
An Ivanti vulnerability was added yesterday:
CVE-2026-1340: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-1340 #infosec #CISA #Ivanti #vulenrability
##🚨 [CISA-2026:0408] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0408)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-1340 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1340)
- Name: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager Mobile (EPMM)
- Notes: Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please see: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1340
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260408 #cisa20260408 #cve_2026_1340 #cve20261340
##CVE ID: CVE-2026-1340
Vendor: Ivanti
Product: Endpoint Manager Mobile (EPMM)
Date Added: 2026-04-08
Vulnerability: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-1340
updated 2026-04-08T21:33:45
1 posts
🟠 CVE-2026-5436 - High (8.1)
The MW WP Form plugin for WordPress is vulnerable to Arbitrary File Move/Read in all versions up to and including 5.1.1. This is due to insufficient validation of the $name parameter (upload field key) passed to the generate_user_file_dirpath() fu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5436/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:33:41
1 posts
🔴 CVE-2026-2942 - Critical (9.8)
The ProSolution WP Client plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'proSol_fileUploadProcess' function in all versions up to, and including, 1.9.9. This makes it possible for unauthent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2942/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:27:15.610000
1 posts
🟠 CVE-2026-35457 - High (8.2)
libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, the rendezvous server stores pagination cookies without bounds. An unauthenticated peer can repeatedly issue DISCOVER requests and force unbo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35457/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:27:15.610000
2 posts
🔴 CVE-2026-5627 - Critical (9.1)
A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5627/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-5627: Critical path traversal in mintplex-labs/anything-llm (<=1.9.1). Attackers with high privileges can access/delete sensitive .json files. Upgrade to 1.12.1. https://radar.offseq.com/threat/cve-2026-5627-cwe-29-path-traversal-filename-in-mi-9e476f7c #OffSeq #Vuln #PathTraversal #Security
##updated 2026-04-08T21:27:00.663000
1 posts
🟠 CVE-2026-24146 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability where insufficient input validation and a large number of outputs could cause a server crash. A successful exploit of this vulnerability might lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24146/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:27:00.663000
1 posts
🟠 CVE-2026-39328 - High (8.9)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored cross-site scripting vulnerability exists in ChurchCRM's person profile editing functionality. Non-administrative users who have the EditSelf permission can inject mali...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39328/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:27:00.663000
1 posts
🔴 CVE-2026-39355 - Critical (9.9)
Genealogy is a family tree PHP application. Prior to 5.9.1, a critical broken access control vulnerability in the genealogy application allows any authenticated user to transfer ownership of arbitrary non-personal teams to themselves. This enables...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39355/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:27:00.663000
1 posts
🟠 CVE-2026-32864 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds read in mgcore_SH_25_3!aligned_free() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32864/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:27:00.663000
1 posts
1 repos
🟠 CVE-2026-39371 - High (8.1)
RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39371/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:27:00.663000
1 posts
🟠 CVE-2026-29181 - High (7.5)
OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-29181/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:27:00.663000
1 posts
🟠 CVE-2026-5373 - High (8.1)
An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:35.910000
2 posts
🔴 CVE-2026-25776 - Critical (9.8)
Movable Type provided by Six Apart Ltd. contains a code injection vulnerability which may allow an attacker to execute arbitrary Perl script.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25776/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-25776 impacts Six Apart Movable Type ≤9.1.0. Unauthenticated code injection enables remote Perl script execution. No patch yet — restrict access & monitor. More info: https://radar.offseq.com/threat/cve-2026-25776-code-injection-in-six-apart-ltd-mov-c0a38b7e #OffSeq #Vuln #InfoSec #CVE #WebSecurity
##updated 2026-04-08T21:26:35.910000
1 posts
🟠 CVE-2026-24913 - High (8.8)
SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this vulnerability is exploited, information stored in the database may be obtained or altered by a user who can log in to the product.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24913/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:35.910000
2 posts
🔴 CVE-2026-4003 - Critical (9.8)
The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalation via Arbitrary User Meta Update in all versions up to and including 1.1.15. This is due to a flawed authorization logic check in the userspn_ajax_nopriv_server() fu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 CRITICAL: CVE-2026-4003 in Users manager – PN for WordPress allows unauthenticated attackers to escalate privileges via arbitrary user meta updates. Disable plugin ASAP and monitor for patches. https://radar.offseq.com/threat/cve-2026-4003-cwe-862-missing-authorization-in-fel-3d2461b4 #OffSeq #WordPress #Vuln #PrivilegeEscalation
##updated 2026-04-08T21:26:35.910000
2 posts
🔴 CVE-2026-39846 - Critical (9)
SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39846/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-39846 | CRITICAL: SiYuan < 3.6.4 vulnerable to stored XSS in table captions. Exploit enables RCE via Electron’s Node.js access — patch to 3.6.4 ASAP! Details: https://radar.offseq.com/threat/cve-2026-39846-cwe-79-improper-neutralization-of-i-d77ddc8a #OffSeq #SiYuan #vuln #infosec
##updated 2026-04-08T21:26:35.910000
1 posts
🟠 CVE-2026-3357 - High (8.8)
IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3357/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-5208 - High (8.2)
Command injection in alerts in CoolerControl/coolercontrold <4.0.0 allows authenticated attackers to execute arbitrary code as root via injected bash commands in alert names
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-28261 - High (7.8)
Dell Elastic Cloud Storage, version 3.8.1.7 and prior, and Dell ObjectScale, versions prior to 4.1.0.3 and version 4.2.0.0, contains an Insertion of Sensitive Information into Log File vulnerability. A low privileged attacker with local access co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28261/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-39393 - High (8.1)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the install route guard in ci4ms relies solely on a volatile cache check (cache('setti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39393/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-4498 - High (7.7)
Execution with Unnecessary Privileges (CWE-250) in Kibana’s Fleet plugin debug route handlers can lead reading index data beyond their direct Elasticsearch RBAC scope via Privilege Abuse (CAPEC-122). This requires an authenticated Kibana user wi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4498/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🟠 CVE-2026-35478 - High (8.3)
InvenTree is an Open Source Inventory Management System. From 0.16.0 to before 1.2.7, any authenticated InvenTree user can create a valid API token attributed to any other user in the system — including administrators and superusers — by suppl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35478/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T21:26:13.410000
1 posts
🚨 CVE-2026-33229 (HIGH): XWiki Platform (17.0.0-rc-1 <17.4.8, 17.5.0-rc-1 <17.10.1) allows users with script rights to bypass sandboxing & execute arbitrary Python code. Patch to 17.4.8/17.10.1 now! https://radar.offseq.com/threat/cve-2026-33229-cwe-862-missing-authorization-in-xw-2e4740d9 #OffSeq #XWiki #infosec #vulnerability
##updated 2026-04-08T21:25:14.927000
1 posts
🔴 CVE-2026-39888 - Critical (9.9)
PraisonAI is a multi-agent teams system. Prior to 1.5.115, execute_code() in praisonaiagents.tools.python_tools defaults to sandbox_mode="sandbox", which runs user code in a subprocess wrapped with a restricted __builtins__ dict and an AST-based b...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39888/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T19:16:14
1 posts
🟠 CVE-2026-39394 - High (8.1)
CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 0.31.4.0, the Install::index() controller reads the host POST parameter without any validation a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39394/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T19:13:59
1 posts
🟠 CVE-2026-4740 - High (8.2)
A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certifica...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4740/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:35:58
1 posts
🟠 CVE-2026-4338 - High (7.5)
The ActivityPub WordPress plugin before 8.0.2 does not properly filter posts to be displayed, allowed unauthenticated users to access drafts/scheduled/pending posts
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4338/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:34:20
1 posts
🟠 CVE-2026-33466 - High (8.1)
Improper Limitation of a Pathname to a Restricted Directory (CWE-22) in Logstash can lead to arbitrary file write and potentially remote code execution via Relative Path Traversal (CAPEC-139). The archive extraction utilities used by Logstash do n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:34:08
1 posts
🟠 CVE-2026-33461 - High (7.7)
Incorrect Authorization (CWE-863) in Kibana can lead to information disclosure via Privilege Abuse (CAPEC-122). A user with limited Fleet privileges can exploit an internal API endpoint to retrieve sensitive configuration data, including private k...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T18:03:54
1 posts
🟠 CVE-2026-27806 - High (7.8)
Fleet is open source device management software. Prior to 4.81.1, the Orbit agent's FileVault disk encryption key rotation flow on collects a local user's password via a GUI dialog and interpolates it directly into a Tcl/expect script executed via...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27806/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T15:31:50
1 posts
🟠 CVE-2026-5301 - High (7.6)
Stored XSS in log viewer in CoolerControl/coolercontrol-ui <4.0.0 allows unauthenticated attackers to take over the service via malicious JavaScript in poisoned log entries
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T12:31:36
1 posts
🟠 CVE-2026-3396 - High (7.5)
WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection via the 'post-author' parameter in all versions up to, and including, 4.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficie...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3396/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T12:31:36
1 posts
🟠 CVE-2026-3243 - High (8.8)
The Advanced Members for ACF plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the create_crop function in all versions up to, and including, 1.2.5. This makes it possible for authenticated a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3243/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T11:57:19
2 posts
🔴 CVE-2026-39847 - Critical (9.1)
Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39847/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ Emmett framework (2.5.0 – <2.8.1) suffers from a CRITICAL path traversal (CVE-2026-39847). Attackers can remotely read files outside the asset directory. Patch by upgrading to 2.8.1+. Details: https://radar.offseq.com/threat/cve-2026-39847-cwe-22-improper-limitation-of-a-pat-645f3706 #OffSeq #Emmett #PathTraversal #CVE202639847
##updated 2026-04-08T09:31:42
2 posts
🔴 CVE-2026-3535 - Critical (9.8)
The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the `DSGVOGWPdownloadGoogleFonts()` function in all versions up to, and including, 1.1. The function is exposed via ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3535/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-3535: CRITICAL RCE in DSGVO Google Web Fonts GDPR (WordPress). Unauthenticated file upload lets attackers drop PHP shells via AJAX. No patch — disable plugin or block endpoint if using affected themes. More: https://radar.offseq.com/threat/cve-2026-3535-cwe-434-unrestricted-upload-of-file--f7fa2474 #OffSeq #WordPress #Infosec
##updated 2026-04-08T03:32:18
1 posts
🟠 CVE-2026-5726 - High (7.8)
ASDA-Soft Stack-based Buffer Overflow Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5726/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T03:32:18
3 posts
🔴 CVE-2026-1346 - Critical (9.3)
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-1346 - Critical (9.3)
IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔎 CRITICAL: CVE-2026-1346 in IBM Verify Identity Access Container (10.0 – 11.0.2) allows local privilege escalation to root. No patch available. Restrict access & monitor IBM advisories. https://radar.offseq.com/threat/cve-2026-1346-cwe-250-execution-with-unnecessary-p-0c7a9e3f #OffSeq #IBMSecurity #CVE20261346 #InfoSec
##updated 2026-04-08T03:32:18
1 posts
🟠 CVE-2026-4788 - High (8.4)
IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files that could be read by a local user.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4788/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T03:32:18
1 posts
🟠 CVE-2026-3499 - High (8.8)
The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13.4.6 through 13.5.2.1. This is due to missing or incorrect nonce validation on the aj...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3499/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T03:32:18
1 posts
🔴 CVE-2026-3296 - Critical (9.8)
The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.4.3 via deserialization of untrusted input from form entry metadata. This is due to the html-admin-page-entries-view.php file call...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3296/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:30:33
1 posts
🚨 CVE-2026-39933: CRITICAL XSS (CVSS 10) in Mediawiki - GlobalWatchlist Extension. Non-release branches vulnerable to input neutralization flaw (CWE-79). Audit deployments urgently! More info: https://radar.offseq.com/threat/cve-2026-39933-cwe-79-improper-neutralization-of-i-01337219 #OffSeq #XSS #Mediawiki #Security
##updated 2026-04-08T00:15:54
1 posts
🔴 CVE-2026-39397 - Critical (9.4)
@delmaredigital/payload-puck is a PayloadCMS plugin for integrating Puck visual page builder. Prior to 0.6.23, all /api/puck/* CRUD endpoint handlers registered by createPuckPlugin() called Payload's local API with the default overrideAccess: true...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39397/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:14:59
1 posts
🟠 CVE-2026-39356 - High (7.5)
Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific escapeName() implementations. In affected versions, embedded identifier delimiters were not escape...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39356/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:12:27
1 posts
🟠 CVE-2026-39376 - High (7.5)
FastFeedParser is a high performance RSS, Atom and RDF parser. Prior to 0.5.10, when parse() fetches a URL that returns an HTML page containing a tag, it recursively calls itself with the redirect URL — with no depth limit, no visited-URL dedup...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39376/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-08T00:08:46
1 posts
🟠 CVE-2026-39369 - High (7.6)
WWBN AVideo is an open source video platform. In versions 26.0 and prior, objects/aVideoEncoderReceiveImage.json.php allowed an authenticated uploader to fetch attacker-controlled same-origin /videos/... URLs, bypass traversal scrubbing, and expos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T22:16:56
1 posts
🟠 CVE-2026-35533 - High (7.7)
mise manages dev tools like node, python, cmake, and terraform. From 2026.2.18 through 2026.4.5, mise loads trust-control settings from a local project .mise.toml before the trust check runs. An attacker who can place a malicious .mise.toml in a r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35533/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:32:46
1 posts
🟠 CVE-2026-32862 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds write in ResFileFactory::InitResourceMgr() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32862/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:32:46
1 posts
🟠 CVE-2026-32861 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVCLASS file in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32861/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:32:46
1 posts
🟠 CVE-2026-32860 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVLIB file in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T21:32:46
1 posts
🟠 CVE-2026-32863 - High (7.8)
There is a memory corruption vulnerability due to an out-of-bounds read in sentry_transaction_context_set_operation() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation req...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32863/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T20:00:07
1 posts
🟠 CVE-2026-35464 - High (7.5)
pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T19:59:57
1 posts
🟠 CVE-2026-35463 - High (8.8)
pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to ad...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35463/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T19:59:37
1 posts
🟠 CVE-2026-35405 - High (7.5)
libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:32:41
1 posts
🟠 CVE-2026-24660 - High (8.1)
A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24660/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:31:45
1 posts
🟠 CVE-2026-24173 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request to the server. A successful exploit of this vulnerability might lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24173/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:31:45
1 posts
🟠 CVE-2026-24175 - High (7.5)
NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request header to the server. A successful exploit of this vulnerability might lead to denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24175/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T18:31:35
1 posts
🟠 CVE-2026-24450 - High (8.1)
An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vu...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24450/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T17:16:29.093000
1 posts
⚠️ CRITICAL: Stored XSS in ci4-cms-erp ci4ms (<31.0.0.0) lets attackers inject JS via profile names, risking user sessions. Fixed in 31.0.0.0. Patch now! CVE-2026-34989 https://radar.offseq.com/threat/cve-2026-34989-cwe-79-improper-neutralization-of-i-bdfd6b20 #OffSeq #XSS #WebSecurity #CVE202634989
##updated 2026-04-07T15:31:49
1 posts
🟠 CVE-2026-20432 - High (8)
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:58
1 posts
🟠 CVE-2026-23818 - High (8.8)
A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23818/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:53
1 posts
🔴 CVE-2026-22679 - Critical (9.8)
Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invokin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:49
4 posts
6 repos
https://github.com/0xBlackash/CVE-2026-34197
https://github.com/dinosn/CVE-2026-34197
https://github.com/DEVSECURITYSPRO/CVE-2026-34197
https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE
PoC for the ActiveMQ RCE as per Horizon3 post https://github.com/dinosn/CVE-2026-34197
##10 Minutes with Claude: Remote Code Execution in Apache ActiveMQ (CVE-2026-34197) https://horizon3.ai/attack-research/disclosures/cve-2026-34197-activemq-rce-jolokia/
##CVE-2026-34197: ActiveMQ RCE via Jolokia API https://horizon3.ai/intelligence/blogs/cve-2026-34197-activemq-rce-jolokia/
##🟠 CVE-2026-34197 - High (8.8)
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.
Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34197/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T15:30:48
1 posts
🟠 CVE-2026-20433 - High (8.8)
In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20433/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T14:16:18.567000
2 posts
🔴 CVE-2026-1114 - Critical (9.8)
In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1114/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CRITICAL: CVE-2026-1114 in parisneo/lollms v2.1.0 — weak JWT secret lets attackers brute-force, forge admin tokens & escalate privileges. Patch to v2.2.0 now! https://radar.offseq.com/threat/cve-2026-1114-cwe-284-improper-access-control-in-p-40f6ba09 #OffSeq #CVE20261114 #AppSec #infosec
##updated 2026-04-07T13:20:11.643000
1 posts
🟠 CVE-2026-34904 - High (7.5)
Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T12:31:21
1 posts
🟠 CVE-2026-31842 - High (7.5)
Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31842/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T09:31:28
1 posts
🟠 CVE-2026-34896 - High (7.5)
Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, Coming Soon & Maintenance Mode allows Cross Site Request Forgery.This issue affects Under Construction, Coming Soon & Maintenance Mode: from n/a through 2.1.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34896/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T09:31:28
1 posts
1 repos
🟠 CVE-2026-5465 - High (8.8)
The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-07T06:30:28
1 posts
1 repos
Critical File Upload Vulnerability Reported in Ninja Forms Plugin for WordPress
A critical unauthenticated arbitrary file upload vulnerability in the Ninja Forms – File Upload plugin (CVE-2026-0740) allows attackers to achieve remote code execution.
**If you are using the Ninja Forms File Upload plugin, this is urgent! Immediately update to version 3.3.27. You can't hide WordPress from the internet, it's made to be visible online. Since this flaw is being actively scanned for, any delay in patching leaves your site exposed to automated attacks. After the update, review server logs for suspicious requests targeting the handle_upload action.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-file-upload-vulnerability-in-ninja-forms-plugin-exposes-50000-wordpress-sites-j-m-6-0-i/gD2P6Ple2L
updated 2026-04-07T06:30:28
1 posts
🟠 CVE-2025-65115 - High (8.8)
Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Managemen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65115/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-06T23:43:51
1 posts
🚨 CRITICAL: CVE-2026-35393 in goshs (<2.0.0-beta.3) allows unauthenticated path traversal via POST uploads. Remote attackers can write files anywhere on disk. Upgrade to 2.0.0-beta.3 now! https://radar.offseq.com/threat/cve-2026-35393-cwe-22-improper-limitation-of-a-pat-b57d1ba3 #OffSeq #Infosec #Vulnerability
##updated 2026-04-06T23:39:45
1 posts
1 repos
Critical Privilege Escalation Vulnerabilities Patched in OpenClaw AI Agent
OpenClaw patched eight vulnerabilities, including a critical privilege escalation flaw (CVE-2026-33579) that allows attackers to gain full administrative control over AI agent instances.
**If you use OpenClaw, firs, why? It's a terrible and extremely insecure tool. If you insist on using it, update immediately to version 2026.3.28 or later and enable mandatory authentication by setting auth.enabled to true. Most instances run wide open by default. Audit your device lists for any unauthorized admin accounts, review recent pairing approval logs, and rotate all API keys and credentials if you find anything suspicious.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-privilege-escalation-vulnerabilities-patched-in-openclaw-ai-agent-o-1-t-f-q/gD2P6Ple2L
updated 2026-04-06T23:26:04
1 posts
Critical Authentication Bypass in Dgraph Database Allows Remote Takeover
Dgraph disclosed a critical authentication bypass vulnerability (CVE-2026-34976) in its administrative API that allows unauthenticated attackers to overwrite databases and read sensitive server files.
**If you are using Dgraph, this is urgent. Immediately make sure that public access to Dgraph's administration port 8080 is blocked, and add restoreTenant to adminMutationMWConfig: "restoreTenant": gogMutMWs.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-authentication-bypass-in-dgraph-database-allows-remote-takeover-a-s-2-r-4/gD2P6Ple2L
updated 2026-04-06T18:33:04
5 posts
5 repos
https://github.com/BishopFox/CVE-2026-35616-check
https://github.com/fevar54/CVE-2026-35616-detector.py
https://github.com/fevar54/forticlient_ems_cve_2026_35616_poc.py
CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS
#CVE_2026_35616
https://arcticwolf.com/resources/blog/cve-2026-35616/
Geopolitical tensions rise as Trump issues a Strait of Hormuz ultimatum amidst Middle East oil disruptions (Apr 7). In cybersecurity, North Korea's UNC4736 is linked to a $285M crypto heist (Apr 6), and a critical Fortinet zero-day (CVE-2026-35616) is under active exploitation (Apr 6-7). Technology advances with Fortrea launching AI-enhanced clinical trial solutions (Apr 7).
##The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild. https://www.darkreading.com/vulnerabilities-threats/fortinet-emergency-patch-forticlient-zero-day
##CVE-2026-35616 : déjà exploitée, cette faille Fortinet a été patchée en urgence ! https://www.it-connect.fr/cve-2026-35616-deja-exploitee-cette-faille-fortinet-a-ete-patchee-en-urgence/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
##Fortinet customers confront actively exploited zero-day, with a full patch still pending https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/
##updated 2026-04-03T21:31:49
1 posts
1 repos
updated 2026-04-03T16:51:28.670000
3 posts
Docker : la faille CVE-2026-34040 permet d’obtenir un accès root sur l’hôte ! https://www.it-connect.fr/docker-la-faille-cve-2026-34040-permet-dobtenir-un-acces-root-sur-lhote/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Docker
##⚠️ SECURITY ALERT: Docker CVE-2026-34040 — CVSS 8.8 Critical authorization bypass.
Affects Docker Engine 24.x–26.1.7 and Docker Desktop up to 4.39.2. A race condition allows privilege escalation to full Docker daemon access.
✅ Fix: Update to Docker Engine 26.1.8+ or Docker Desktop 4.39.3+
📋 CISA added it to KEV Catalog — deadline April 30.
Step-by-step guide: https://newsgroup.site/docker-cve-2026-34040-authorization-bypass-fix/
##Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access
#CVE_2026_34040
https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html
updated 2026-04-02T15:32:40
1 posts
1 repos
Getting root on on TP-Link Smart Switches using CVE-2026-1668 https://lobste.rs/s/kgbtwo #networking #reversing #security
https://blog.tangrs.id.au/2026/04/06/exploiting-cve-2026-1668-part-3/
updated 2026-03-27T09:31:18
1 posts
updated 2026-03-26T20:47:02.337000
1 posts
🟠 CVE-2026-35464 - High (7.5)
pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-03-18T21:34:00
1 posts
updated 2026-03-13T21:32:48
1 posts
updated 2026-03-11T20:38:07
1 posts
🚨 EUVD-2026-21018
📊 Score: n/a
📦 Product: Apache Tomcat, Apache Tomcat, Apache Tomcat
🏢 Vendor: Apache Software Foundation
📅 Updated: 2026-04-09
📝 Improper Input Validation vulnerability in Apache Tomcat due to an incomplete fix of CVE-2025-66614.
This issue affects Apache Tomcat: from 11.0.15 through 11.0.19, from 10.1.50 through 10.1.52, from 9.0.113 through 9...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-21018
##updated 2026-03-04T22:19:26
1 posts
🚨 EUVD-2026-20956
📊 Score: n/a
📦 Product: Apache ActiveMQ All, Apache ActiveMQ, Apache ActiveMQ MQTT
🏢 Vendor: Apache Software Foundation
📅 Updated: 2026-04-09
📝 Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.
The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly valida...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-20956
##updated 2026-01-30T00:31:29
1 posts
2 repos
https://github.com/YunfeiGE18/CVE-2026-1281-CVE-2026-1340-Ivanti-EPMM-RCE
https://github.com/MehdiLeDeaut/CVE-2026-1281-Ivanti-EPMM-RCE
🚨 [CISA-2026:0408] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0408)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-1340 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-1340)
- Name: Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Ivanti
- Product: Endpoint Manager Mobile (EPMM)
- Notes: Please adhere to Ivanti's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Ivanti products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as possible. For more information please see: https://hub.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0S-5.noarch.rpm ; https://support.mobileiron.com/mi/vsp/AB1786671/ivanti-security-update-1761642-1.1.0L-5.noarch.rpm ; https://nvd.nist.gov/vuln/detail/CVE-2026-1340
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260408 #cisa20260408 #cve_2026_1340 #cve20261340
##updated 2025-12-16T21:30:51
1 posts
2 repos
CVE-2025-59718 analysis shows attackers bypassing FortiGate SSO, exfiltrating configs, and establishing persistent VPN access over 2 weeks of dwell time. They targeted hypervisors, DCs, and backup infrastructure—classic pre-ransomware reconnaissance. Detection gaps: firewall config changes blend into routine admin tasks. #CVE202559718 #ransomware #firewall #incidentresponse #threatintel
##updated 2025-12-09T16:53:25
4 posts
100 repos
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/zr0n/react2shell
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/emredavut/CVE-2025-55182
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/shyambhanushali/React2Shell
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
https://github.com/gensecaihq/react2shell-scanner
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/msanft/CVE-2025-55182
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/sumanrox/rschunter
https://github.com/hualy13/CVE-2025-55182
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/sickwell/CVE-2025-55182
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
https://github.com/BlackTechX011/React2Shell
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/theori-io/reactguard
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/Archerkong/CVE-2025-55182
https://github.com/assetnote/react2shell-scanner
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
https://github.com/theman001/CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/freeqaz/react2shell
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/Updatelap/CVE-2025-55182
https://github.com/shamo0/react2shell-PoC
https://github.com/surajhacx/react2shellpoc
https://github.com/mrknow001/RSC_Detector
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/zzhorc/CVE-2025-55182
https://github.com/alsaut1/react2shell-lab
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/kavienanj/CVE-2025-55182
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/hoosin/CVE-2025-55182
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/xalgord/React2Shell
https://github.com/vulncheck-oss/cve-2025-55182
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/jctommasi/react2shellVulnApp
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/nehkark/CVE-2025-55182
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/snipevx/React2Shell-POC
https://github.com/hexsh1dow/CVE-2025-55182
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/rix4uni/CVE-2025-55182
⚪️ React2Shell vulnerability used for automated credential theft
🗨️ Cisco Talos researchers have discovered a large-scale campaign for automated credential theft exploiting the React2Shell vulnerability (CVE-2025-55182). In just 24 hours, the attackers managed to compromise 766 hosts across various cloud providers worldwide and steal database passwords, AWS keys,…
##🚨 New Exploit: React Server 19.2.0 - Remote Code Execution
📋 CVE: CVE-2025-55182
👤 Author: danieljavanrad
🔗 https://www.exploit-db.com/exploits/52506
#ExploitDB #InfoSec #CyberSecurity #CVE-2025-55182
##⚪️ React2Shell vulnerability used for automated credential theft
🗨️ Cisco Talos researchers have discovered a large-scale campaign for automated credential theft exploiting the React2Shell vulnerability (CVE-2025-55182). In just 24 hours, the attackers managed to compromise 766 hosts across various cloud providers worldwide and steal database passwords, AWS keys,…
##CVE-2025-55182 Exploitation Hits the Smart Home
Shortly after details of CVE-2025-55182 became public, we began noticing large volumes of exploitation attempts across our endpoint and network...
🔗️ [Bitdefender] https://link.is.it/jU5kX8
##updated 2025-10-24T12:54:49.670000
1 posts
1 repos
CISA just added CVE-2023-48788 to its Known Exploited Vulnerabilities catalog and is giving federal agencies until Friday to patch FortiClient EMS.
Read more: https://steelefortress.com/nuy028
##updated 2025-09-23T16:45:09.443000
6 posts
1 repos
Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk
A critical Flowise RCE vulnerability is now being actively exploited. The flaw, tracked as CVE-2025-59528, carries a maximum severity rating and...
🔗️ [Thecyberexpress] https://link.is.it/xZ20c1
##Flowise AI Platform Targeted by Active Exploitation of Critical RCE Flaw
Flowise is facing active exploitation of CVE-2025-59528, a critical vulnerability that allows attackers to execute arbitrary JavaScript and take full control of AI workflow servers.
**If you're running Flowise, this is urgent. Your tool is being attacked. Make sure Flowise is isolated from the internet unless absolutely necessary, and update to version 3.0.6 ASAP. Until you can update, restrict access to trusted IPs only. After isolating or patching (whichever comes first), rotate all API tokens and credential.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/flowise-ai-platform-targeted-by-active-exploitation-of-critical-rce-flaw-c-6-9-l-n/gD2P6Ple2L
Max severity Flowise RCE vulnerability now exploited in attacks
Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flowise for building custom LLM...
🔗️ [Bleepingcomputer] https://link.is.it/LhP5de
##updated 2025-05-21T21:32:25
1 posts
4 repos
https://github.com/B1tBreaker/CVE-2025-48708
https://github.com/itstarsec/CVE-2025-48703
updated 2025-04-12T10:46:40.837000
1 posts
1 repos
#OT #Advisory VDE-2026-013
Helmholz: Use of a Broken or Risky Cryptographic Algorithm
Vulnerabilities in PROFINET-Switch devices with firmware <= V1.12.010 that allow an attacker to gain control over the device.
#CVE CVE-2016-2183
https://certvde.com/en/advisories/vde-2026-013/
#oCSAF
#CSAF https://helmholz.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-013.json
updated 2024-11-21T05:39:02.180000
1 posts
Next in my series of blogs on unpatchable Kubernetes vulnerabilities is out. This time it's about TOCTOUs and SSRF
https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2020-8562/
##updated 2024-05-28T17:58:37
1 posts
Llama Drama:AIアプリ開発用Pythonパッケージに重大な欠陥 システムやデータが侵害される恐れ(CVE-2024-34359) | Codebook|Security News https://www.yayafa.com/2776397/ #AgenticAi #AI #ArtificialGeneralIntelligence #ArtificialIntelligence #LLAMA #Meta #MetaAI #エージェント型AI #人工知能 #汎用人工知能
##updated 2024-04-04T06:40:24
1 posts
🟠 CVE-2026-35576 - High (8.7)
ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored cross-site scripting (XSS) vulnerability exists in ChurchCRM within the Person Property Management subsystem. This issue persists in versions patched for CVE-2023-38766...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35576/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 New Exploit: RomM 4.4.0 - XSS_CSRF Chain
📋 CVE: CVE-2025-65027
👤 Author: mmohammedheshamm
🔗 https://www.exploit-db.com/exploits/52505
#ExploitDB #InfoSec #CyberSecurity #CVE-2025-65027
##Palo Alto posted several advisories yesterday, if you missed them:
- Critical: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration https://security.paloaltonetworks.com/CVE-2026-0234
- PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026) https://security.paloaltonetworks.com/PAN-SA-2026-0004
- CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate https://security.paloaltonetworks.com/CVE-2026-0233 #PaloAlto #infosec #vulnerability #Chromium
##Palo Alto posted several advisories yesterday, if you missed them:
- Critical: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration https://security.paloaltonetworks.com/CVE-2026-0234
- PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026) https://security.paloaltonetworks.com/PAN-SA-2026-0004
- CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate https://security.paloaltonetworks.com/CVE-2026-0233 #PaloAlto #infosec #vulnerability #Chromium
##Palo Alto posted several advisories yesterday, if you missed them:
- Critical: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration https://security.paloaltonetworks.com/CVE-2026-0234
- PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026) https://security.paloaltonetworks.com/PAN-SA-2026-0004
- CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate https://security.paloaltonetworks.com/CVE-2026-0233 #PaloAlto #infosec #vulnerability #Chromium
##Palo Alto posted several advisories yesterday, if you missed them:
- Critical: CVE-2026-0234 Cortex XSOAR: Improper Verification of Cryptographic Signature in Microsoft Teams integration https://security.paloaltonetworks.com/CVE-2026-0234
- PAN-SA-2026-0004 Chromium: Monthly Vulnerability Update (April 2026) https://security.paloaltonetworks.com/PAN-SA-2026-0004
- CVE-2026-0233 Autonomous Digital Experience Manager: Improper validation of ADEM certificate https://security.paloaltonetworks.com/CVE-2026-0233 #PaloAlto #infosec #vulnerability #Chromium
##"It's just dev mode."
PTT-2025-028 / CVE-2026-30461 disagrees. Any authenticated user on a FuelCMS dev instance can drop a PHP shell via git submodule and call it from the browser. One HTTP request. Full RCE. CVSS 8.8 High.
No patch coming. Project's been dormant for almost 4 years.
Found by Raul Bledea and Matei "Mal" Bădănoiu.
Full PoC: https://pentest-tools.com/research
##🚨 CRITICAL: CVE-2026-34179 in Canonical LXD 4.12 – 6.7 enables privilege escalation from restricted TLS cert user to cluster admin (CVSS 9.1). No patch yet — restrict access & monitor API activity. https://radar.offseq.com/threat/cve-2026-34179-cwe-915-improperly-controlled-modif-752fa0b8 #OffSeq #LXD #PrivilegeEscalation #Vuln
##🟠 CVE-2026-33756 - High (7.5)
Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, Saleor supports query batching by submitting multiple GraphQL operations in a single HTTP request as a JSON array but wasn't enforcing any upper limit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33756/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34392 - High (7.5)
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 20.0.0 to before 27.0.3 and 28.0.1, a bug in the static file router can allow an at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34392/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33350 - High (7.5)
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. Prior to 27.0.3 and 28.0.1, a SQL injection has been identified in some code sections fo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35401 - High (7.5)
Saleor is an e-commerce platform. From 2.0.0 to before 3.23.0a3, 3.22.47, 3.21.54, and 3.20.118, a malicious actor can include many GraphQL mutations or queries in a single API call using aliases or chaining multiple mutations, resulting in resour...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35401/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35169 - High (8.7)
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From to before 27.0.3 and 28.0.1, the help_editor module of LORIS did not properly sani...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35169/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35446 - High (7.7)
LORIS (Longitudinal Online Research and Imaging System) is a self-hosted web application that provides data- and project-management for neuroimaging research. From 24.0.0 to before 27.0.3 and 28.0.1, an incorrect order of operations in the FilesDo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35446/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23869 - High (7.5)
A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23869/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39863 - High (7.5)
Kamailio is an open source implementation of a SIP Signaling Server. Prior to 6.1.1, 6.0.6, and 5.8.8, an out-of-bounds access in the core of Kamailio (formerly OpenSER and SER) allows remote attackers to cause a denial of service (process crash) ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39863/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39860 - Critical (9)
Nix is a package manager for Linux and other Unix systems. A bug in the fix for CVE-2024-27297 allowed for arbitrary overwrites of files writable by the Nix process orchestrating the builds (typically the Nix daemon running as root in multi-user i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39860 - Critical (9)
Nix is a package manager for Linux and other Unix systems. A bug in the fix for CVE-2024-27297 allowed for arbitrary overwrites of files writable by the Nix process orchestrating the builds (typically the Nix daemon running as root in multi-user i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CVE-2026-0232 Cortex XDR Agent: Local Administrator can disable the agent on Windows
https://security.paloaltonetworks.com/CVE-2026-0232
Read on HackerWorkspace: https://hackerworkspace.com/article/cve-2026-0232-cortex-xdr-agent-local-administrator-can-disable-the-agent-on-windows
##Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3) https://simonkoeck.com/writeups/tolgee-xxe-translation-import
##🔴 CVE-2026-35573 - Critical (9.1)
ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by ove...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35573/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39319 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a second order SQL injection vulnerability was found in the endpoint /FundRaiserEditor.php in ChurchCRM. A user has to be authenticated but doesn't need any privileges. These us...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39319/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39317 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in ChurchCRM's SettingsIndividual.php where user-controlled array keys from the type POST parameter are used directly in SQL queries without...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39317/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35576 - High (8.7)
ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored cross-site scripting (XSS) vulnerability exists in ChurchCRM within the Person Property Management subsystem. This issue persists in versions patched for CVE-2023-38766...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35576/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39327 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /MemberRoleChange.php in ChurchCRM 7.0.5. Authenticated users with the role Manage Groups & Roles (ManageGroups) can inj...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39327/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39326 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyTypeEditor.php in ChurchCRM. Authenticated users with the role isMenuOptionsEnabled can inject arbitrary SQL st...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39326/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39323 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical SQL injection vulnerability exists in ChurchCRM's PropertyTypeEditor.php where the Name and Description POST parameters are sanitized only with strip_tags() before di...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39323/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39333 - High (8.7)
ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFundRaiser.php endpoint reflects user-supplied input (DateStart and DateEnd) into HTML input field attributes without proper output encoding for the HTML attribute contex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39333/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39332 - High (8.7)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a reflected Cross-Site Scripting (XSS) vulnerability in GeoPage.php allows any authenticated user to inject arbitrary JavaScript into the browser of another authenticated user. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39332/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39331 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an authenticated API user can modify any family record's state without proper authorization by simply changing the {familyId} parameter in requests, regardless of whether they p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39330 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyAssign.php in ChurchCRM. Authenticated users with the role Manage Groups & Roles (ManageGroups) and Edit Record...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39330/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39329 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was identified in /EventNames.php in ChurchCRM. Authenticated users with AddEvent privileges can inject SQL via the newEvtTypeCntLst parameter dur...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39329/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39339 - Critical (9.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical authentication bypass vulnerability in ChurchCRM's API middleware (ChurchCRM/Slim/Middleware/AuthMiddleware.php) allows unauthenticated attackers to access all prote...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39339/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39337 - Critical (10)
ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial inst...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39337/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39334 - High (8.8)
ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /SettingsIndividual.php in ChurchCRM 7.0.5. Authenticated users without any specific privileges can inject arbitrary SQL...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39334/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39341 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, The application is vulnerable to time-based SQL injection due to an improper input validation. Endpoint Reports/ConfirmReportEmail.php?familyId= is not correctly sanitising user...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39341/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39340 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in PropertyTypeEditor.php, part of the administration functionality for managing property type categories (People → Person Properties / Fa...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39340/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39361 - High (7.7)
OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surround...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39361/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34045 - High (8.2)
Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger denial-of-service conditions and extract sens...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34045/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5747 - High (7.5)
An out-of-bounds write issue in the virtio PCI transport in Amazon Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecracker VMM process or potentially execute a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5747/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35485 - High (7.5)
text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##