## Updated at UTC 2026-04-08T17:53:17.348907

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-39846 9.0 0.14% 2 0 2026-04-08T16:16:27.537000 SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious no
CVE-2026-34045 8.2 0.06% 1 0 2026-04-08T16:16:24.043000 Podman Desktop is a graphical tool for developing on containers and Kubernetes.
CVE-2026-33229 0 0.00% 2 0 2026-04-08T16:16:23.430000 XWiki Platform is a generic wiki platform offering runtime services for applicat
CVE-2026-31790 7.5 0.01% 1 0 2026-04-08T15:16:11.967000 Issue summary: Applications using RSASVE key encapsulation to establish a secret
CVE-2026-39847 9.1 0.05% 2 0 2026-04-08T11:57:19 The RSGI static handler for Emmett's internal assets (`/__emmett__` paths) is vu
CVE-2026-35039 9.1 0.02% 2 0 2026-04-08T11:54:57 _NOTE_: While the library exposes a mechanism which could introduce the vulnerab
CVE-2026-3535 9.8 0.28% 2 0 2026-04-08T09:31:42 The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary
CVE-2026-25776 9.8 0.05% 2 0 2026-04-08T09:16:20.360000 Movable Type provided by Six Apart Ltd. contains a code injection vulnerability
CVE-2026-24913 8.8 0.03% 1 0 2026-04-08T06:31:38 SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this
CVE-2026-4003 9.8 0.42% 2 0 2026-04-08T06:31:38 The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalatio
CVE-2026-1346 9.4 0.01% 3 0 2026-04-08T03:32:18 IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify
CVE-2026-4788 8.4 0.01% 1 0 2026-04-08T03:32:18 IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information
CVE-2026-3499 8.8 0.02% 1 0 2026-04-08T03:32:18 The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce
CVE-2026-5726 7.8 0.01% 1 0 2026-04-08T03:16:07.700000 ASDA-Soft Stack-based Buffer Overflow Vulnerability
CVE-2026-3296 9.8 0.02% 1 0 2026-04-08T02:16:04.067000 The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in
CVE-2026-3357 8.8 0.07% 1 0 2026-04-08T01:16:41.057000 IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated u
CVE-2026-39933 None 0.05% 1 0 2026-04-08T00:30:33 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-1342 8.4 0.01% 2 0 2026-04-08T00:30:32 IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify
CVE-2026-5747 7.5 0.01% 1 0 2026-04-08T00:16:05.657000 An out-of-bounds write issue in the virtio PCI transport in Amazon Firecracker 1
CVE-2026-39397 9.4 0.04% 1 0 2026-04-08T00:15:54 ### Impact All `/api/puck/*` CRUD endpoint handlers registered by `createPuckPl
CVE-2026-39356 7.5 0.03% 1 0 2026-04-08T00:14:59 ### Summary Drizzle ORM improperly escaped quoted SQL identifiers in its dialec
CVE-2026-39376 7.5 0.04% 1 0 2026-04-08T00:12:27 ### Summary When `parse()` fetches a URL that returns an HTML page containing a
CVE-2026-39371 8.1 0.01% 1 1 2026-04-08T00:12:07 **Summary** Server functions exported from `"use server"` files could be invoke
CVE-2026-39369 7.6 0.05% 1 0 2026-04-08T00:08:46 ## Summary `objects/aVideoEncoderReceiveImage.json.php` allowed an authenticate
CVE-2026-35533 7.8 0.01% 1 0 2026-04-07T22:16:56 ### Summary `mise` loads trust-control settings from a local project `.mise.tom
CVE-2026-32862 7.8 0.01% 1 0 2026-04-07T21:32:46 There is a memory corruption vulnerability due to an out-of-bounds write in ResF
CVE-2026-32861 7.8 0.01% 1 0 2026-04-07T21:32:46 There is a memory corruption vulnerability due to an out-of-bounds write when lo
CVE-2026-32864 7.8 0.01% 1 0 2026-04-07T21:32:46 There is a memory corruption vulnerability due to an out-of-bounds read in mgcor
CVE-2026-32863 7.8 0.01% 1 0 2026-04-07T21:32:46 There is a memory corruption vulnerability due to an out-of-bounds read in sentr
CVE-2026-29181 7.5 0.04% 1 0 2026-04-07T21:17:16.003000 OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.
CVE-2026-39361 7.7 0.03% 1 0 2026-04-07T20:16:29.837000 OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the
CVE-2026-39329 8.8 0.03% 1 0 2026-04-07T20:16:29.047000 ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj
CVE-2026-39326 8.8 0.03% 1 0 2026-04-07T20:16:28.927000 ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj
CVE-2026-39317 8.8 0.03% 1 0 2026-04-07T20:16:28.580000 ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL inje
CVE-2026-32860 7.8 0.01% 1 0 2026-04-07T20:16:24.040000 There is a memory corruption vulnerability due to an out-of-bounds write when lo
CVE-2026-35464 7.5 0.08% 1 0 2026-04-07T20:00:07 ## Summary The fix for CVE-2026-33509 (GHSA-r7mc-x6x7-cqxx) added an `ADMIN_ONL
CVE-2026-35463 8.8 0.26% 1 0 2026-04-07T19:59:57 ### Summary The `ADMIN_ONLY_OPTIONS` protection mechanism restricts security-cr
CVE-2026-35457 8.2 0.04% 1 0 2026-04-07T19:59:52 ### Summary The rendezvous server stores pagination cookies without bounds. An u
CVE-2026-5735 9.8 0.04% 1 0 2026-04-07T19:16:48.023000 Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of t
CVE-2026-24146 7.5 0.04% 1 0 2026-04-07T18:31:45 NVIDIA Triton Inference Server contains a vulnerability where insufficient input
CVE-2026-24175 7.5 0.04% 1 0 2026-04-07T18:31:45 NVIDIA Triton Inference Server contains a vulnerability where an attacker could
CVE-2026-24450 8.1 0.04% 1 0 2026-04-07T18:31:35 An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw fun
CVE-2026-39340 8.1 0.03% 1 0 2026-04-07T18:16:46.010000 ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL inje
CVE-2026-39337 10.0 0.27% 1 0 2026-04-07T18:16:45.630000 ChurchCRM is an open-source church management system. Prior to 7.1.0, critical p
CVE-2026-39333 8.7 0.03% 1 0 2026-04-07T18:16:44.997000 ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFun
CVE-2026-39327 8.8 0.03% 1 0 2026-04-07T18:16:43.883000 ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL inj
CVE-2026-39323 8.8 0.03% 1 0 2026-04-07T18:16:43.240000 ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical
CVE-2026-39319 8.8 0.03% 1 0 2026-04-07T18:16:42.950000 ChurchCRM is an open-source church management system. Prior to 7.1.0, a second o
CVE-2026-35576 8.7 0.03% 1 0 2026-04-07T18:16:42.273000 ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored c
CVE-2026-35575 8.0 0.04% 1 0 2026-04-07T18:16:42.077000 ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored C
CVE-2026-35573 9.1 0.24% 1 0 2026-04-07T18:16:41.760000 ChurchCRM is an open-source church management system. Prior to 6.5.3, a path tra
CVE-2026-24173 7.5 0.04% 1 0 2026-04-07T18:16:39.787000 NVIDIA Triton Inference Server contains a vulnerability where an attacker could
CVE-2026-34148 7.5 0.04% 1 0 2026-04-07T18:04:11 ### Summary `@fedify/fedify` follows HTTP redirects recursively in its remote d
CVE-2025-57834 7.5 0.08% 1 0 2026-04-07T17:31:20.270000 An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Mod
CVE-2025-54328 10.0 0.05% 1 0 2026-04-07T17:28:19.270000 An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor,
CVE-2026-35485 7.5 0.37% 1 0 2026-04-07T17:16:31.243000 text-generation-webui is an open-source web interface for running Large Language
CVE-2026-35042 7.5 0.01% 2 0 2026-04-07T17:16:29.590000 fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier
CVE-2026-24660 8.1 0.04% 1 0 2026-04-07T17:16:27.583000 A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functi
CVE-2026-35394 8.3 0.04% 1 0 2026-04-07T16:16:25.893000 Mobile Next is an MCP server for mobile development and automation. Prior to 0.0
CVE-2026-26026 9.1 0.04% 1 0 2026-04-07T16:03:34.597000 GLPI is a free asset and IT management software package. From 11.0.0 to before 1
CVE-2026-26263 8.1 0.03% 1 0 2026-04-07T16:02:38.350000 GLPI is a free asset and IT management software package. From 11.0.0 to before 1
CVE-2026-20432 8.0 0.05% 1 0 2026-04-07T15:31:49 In Modem, there is a possible out of bounds write due to a missing bounds check.
CVE-2026-5373 8.1 0.03% 1 0 2026-04-07T15:30:58 An issue that allowed all-organization administrators to promote accounts to sup
CVE-2026-22679 9.8 0.31% 1 0 2026-04-07T15:30:53 Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthentica
CVE-2026-34197 8.8 0.10% 2 2 template 2026-04-07T15:30:49 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-20433 8.8 0.05% 1 0 2026-04-07T15:30:48 In Modem, there is a possible out of bounds write due to a missing bounds check.
CVE-2026-4740 8.2 0.01% 1 0 2026-04-07T15:17:46.797000 A flaw was found in Open Cluster Management (OCM), the technology underlying Red
CVE-2026-35405 7.5 0.04% 1 0 2026-04-07T15:17:43.367000 libp2p-rust is the official rust language Implementation of the libp2p networkin
CVE-2026-35395 8.8 0.03% 1 0 2026-04-07T15:17:43.230000 WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web g
CVE-2026-35043 7.8 0.07% 1 0 2026-04-07T15:17:41.963000 BentoML is a Python library for building online serving systems optimized for AI
CVE-2026-35036 7.5 0.03% 1 0 2026-04-07T15:17:41.730000 Ech0 is an open-source, self-hosted publishing platform for personal idea sharin
CVE-2026-34783 8.1 0.16% 1 0 2026-04-07T15:17:40.383000 Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4
CVE-2026-35409 7.7 0.03% 1 0 2026-04-07T14:20:08 ### Summary A Server-Side Request Forgery (SSRF) protection bypass has been iden
CVE-2026-35408 8.7 0.01% 1 0 2026-04-07T14:19:50 ## Summary Directus's Single Sign-On (SSO) login pages lacked a `Cross-Origin-O
CVE-2026-5627 9.1 0.03% 2 0 2026-04-07T14:16:24.460000 A path traversal vulnerability exists in mintplex-labs/anything-llm versions up
CVE-2026-23818 8.8 0.04% 1 0 2026-04-07T14:16:20.830000 A vulnerability has been identified in the graphical user interface (GUI) of HPE
CVE-2026-28797 8.8 0.07% 1 0 2026-04-07T13:20:55.200000 RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versio
CVE-2025-47391 7.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory corruption while processing a frame request from user.
CVE-2025-47392 8.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory corruption when decoding corrupted satellite data files with invalid sign
CVE-2026-21373 7.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory Corruption when accessing an output buffer without validating its size du
CVE-2026-21376 7.8 0.01% 2 0 2026-04-07T13:20:35.010000 Memory Corruption when accessing an output buffer without validating its size du
CVE-2026-21380 7.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memor
CVE-2026-21378 7.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory Corruption when accessing an output buffer without validating its size du
CVE-2026-21375 7.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory Corruption when accessing an output buffer without validating its size du
CVE-2026-33540 7.5 0.03% 2 0 2026-04-07T13:20:35.010000 Distribution is a toolkit to pack, ship, store, and deliver container content. P
CVE-2026-5612 8.8 0.04% 1 0 2026-04-07T13:20:35.010000 A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability aff
CVE-2026-5628 8.8 0.04% 2 0 2026-04-07T13:20:35.010000 A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted i
CVE-2026-5629 8.8 0.04% 2 0 2026-04-07T13:20:35.010000 A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is
CVE-2026-0740 9.8 0.08% 4 1 2026-04-07T13:20:11.643000 The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary f
CVE-2026-31842 7.5 0.05% 1 0 2026-04-07T13:20:11.643000 Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization
CVE-2026-34896 7.5 0.02% 1 0 2026-04-07T13:20:11.643000 Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction,
CVE-2026-35471 9.8 0.07% 3 0 2026-04-07T13:20:11.643000 goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile()
CVE-2026-5465 8.8 0.05% 1 1 2026-04-07T13:20:11.643000 The Booking for Appointments and Events Calendar – Amelia plugin for WordPress i
CVE-2026-35171 9.8 0.30% 2 0 2026-04-07T13:20:11.643000 Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allo
CVE-2026-35021 7.8 0.03% 1 0 2026-04-07T13:20:11.643000 Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
CVE-2026-35203 7.5 0.04% 1 0 2026-04-07T13:20:11.643000 ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in
CVE-2026-35442 8.1 0.04% 1 0 2026-04-07T13:20:11.643000 Directus is a real-time API and App dashboard for managing SQL database content.
CVE-2026-5686 8.8 0.02% 1 0 2026-04-07T13:20:11.643000 A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerabili
CVE-2026-5709 8.8 0.07% 1 0 2026-04-07T13:20:11.643000 Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio
CVE-2026-5687 8.8 0.05% 1 0 2026-04-07T13:20:11.643000 A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects th
CVE-2026-35050 9.1 0.06% 1 0 2026-04-07T13:20:11.643000 text-generation-webui is an open-source web interface for running Large Language
CVE-2026-35045 8.1 0.03% 1 1 2026-04-07T13:20:11.643000 Tandoor Recipes is an application for managing recipes, planning meals, and buil
CVE-2026-34975 8.5 0.03% 2 0 2026-04-07T13:20:11.643000 Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0,
CVE-2026-34208 10.0 0.06% 1 0 2026-04-07T13:20:11.643000 SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks
CVE-2026-34950 9.1 0.02% 2 0 2026-04-07T13:20:11.643000 fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier
CVE-2026-33752 8.6 0.01% 1 1 2026-04-07T13:20:11.643000 curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not
CVE-2026-34402 8.1 0.02% 1 0 2026-04-07T13:20:11.643000 ChurchCRM is an open-source church management system. Prior to 7.1.0, authentica
CVE-2026-34904 7.5 0.02% 1 0 2026-04-07T09:31:28 Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media
CVE-2026-1114 9.8 0.04% 2 0 2026-04-07T09:31:22 In parisneo/lollms version 2.1.0, the application's session management is vulner
CVE-2025-65115 8.8 0.07% 1 0 2026-04-07T06:30:28 Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on
CVE-2026-5708 8.8 0.12% 1 0 2026-04-07T00:30:28 Unsanitized control of user-modifiable attributes in the session creation compon
CVE-2026-5707 8.8 0.21% 1 0 2026-04-07T00:30:28 Unsanitized input in an OS command in the virtual desktop session name handling
CVE-2026-5685 8.8 0.05% 1 0 2026-04-07T00:30:27 A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the func
CVE-2026-5684 8.0 0.03% 1 0 2026-04-07T00:30:27 A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issu
CVE-2026-35393 9.8 0.07% 3 0 2026-04-06T23:43:51 ### Summary * POST multipart upload directory not sanitized | `httpserver/updown
CVE-2026-35392 9.8 0.07% 2 0 2026-04-06T23:43:46 ### Summary * PUT upload has no path sanitization | `httpserver/updown.go:20-69`
CVE-2026-35187 7.7 0.03% 1 0 2026-04-06T23:43:26 ## Vulnerability Details **CWE-918**: Server-Side Request Forgery (SSRF) The `
CVE-2026-35209 7.5 0.03% 1 0 2026-04-06T23:42:30 ### Impact Applications that pass unsanitized user input (e.g. parsed JSON requ
CVE-2026-35044 8.8 0.04% 1 0 2026-04-06T23:42:10 ## Summary The Dockerfile generation function `generate_containerfile()` in `sr
CVE-2026-34841 9.8 0.02% 1 0 2026-04-06T23:41:04 ### **Impact** This is a **supply chain attack** involving compromised versions
CVE-2026-34989 None 0.05% 1 0 2026-04-06T23:40:25 ## Summary ### **Vulnerability 1: Stored DOM XSS via Profile Name Update (Persis
CVE-2026-34976 10.0 0.03% 2 0 2026-04-06T23:26:04 The `restoreTenant` admin mutation is missing from the authorization middleware
CVE-2026-33579 9.9 0.02% 2 1 2026-04-06T23:16:26.987000 OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /
CVE-2026-35172 7.5 0.03% 1 0 2026-04-06T23:14:52 ## summary: distribution can restore read access in `repo a` after an explicit d
CVE-2026-34986 7.5 0.01% 1 0 2026-04-06T23:11:46 ### Impact Decrypting a JSON Web Encryption (JWE) object will panic if the `alg
CVE-2026-35020 8.4 0.06% 1 0 2026-04-06T21:31:41 Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
CVE-2026-35022 9.8 0.25% 2 0 2026-04-06T21:31:41 Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
CVE-2025-47390 7.8 0.01% 1 0 2026-04-06T18:33:15 Memory corruption while preprocessing IOCTL request in JPEG driver.
CVE-2026-21372 7.8 0.01% 1 0 2026-04-06T18:33:15 Memory Corruption when sending IOCTL requests with invalid buffer sizes during m
CVE-2026-21367 7.7 0.04% 1 0 2026-04-06T18:33:15 Transient DOS when processing nonstandard FILS Discovery Frames with out-of-rang
CVE-2026-21382 7.8 0.01% 2 0 2026-04-06T18:33:15 Memory Corruption when handling power management requests with improperly sized
CVE-2026-21381 7.7 0.04% 1 0 2026-04-06T18:33:15 Transient DOS when receiving a service data frame with excessive length during d
CVE-2026-21374 7.8 0.01% 2 0 2026-04-06T18:33:07 Memory Corruption when processing auxiliary sensor input/output control commands
CVE-2026-21371 7.8 0.01% 1 0 2026-04-06T18:33:06 Memory Corruption when retrieving output buffer with insufficient size validatio
CVE-2025-47389 7.8 0.01% 1 0 2026-04-06T18:33:05 Memory corruption when buffer copy operation fails due to integer overflow durin
CVE-2026-35616 9.8 5.95% 11 5 2026-04-06T18:12:57.863000 A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through
CVE-2026-30078 7.5 0.06% 2 0 2026-04-06T15:31:34 OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invali
CVE-2026-34885 8.5 0.03% 1 0 template 2026-04-06T15:31:34 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-3524 8.8 0.01% 1 0 2026-04-06T15:31:34 Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing af
CVE-2026-35470 8.8 0.03% 2 0 2026-04-03T21:57:08 ## Description Six `confronta_righe.php` files across different modules in Open
CVE-2026-32186 6.5 0.09% 1 0 2026-04-03T21:32:44 Microsoft Bing Elevation of Privilege Vulnerability
CVE-2026-3184 3.7 0.08% 1 1 2026-04-03T21:31:49 A flaw was found in util-linux. Improper hostname canonicalization in the `login
CVE-2026-34040 8.8 0.01% 1 0 2026-04-03T16:51:28.670000 Moby is an open source container framework. Prior to version 29.3.1, a security
CVE-2026-1668 9.8 0.37% 1 1 2026-04-02T15:03:02.430000 The web interface on multiple Omada switches does not adequately validate certai
CVE-2026-33744 7.8 0.01% 1 0 2026-04-01T15:00:48.743000 BentoML is a Python library for building online serving systems optimized for AI
CVE-2025-59032 7.5 0.07% 1 0 2026-03-27T09:31:18 ManageSieve AUTHENTICATE command crashes when using literal as SASL initial resp
CVE-2026-33509 7.5 0.08% 1 0 2026-03-26T20:47:02.337000 pyLoad is a free and open-source download manager written in Python. From versio
CVE-2026-32251 6.5 0.03% 2 0 2026-03-20T15:57:42.580000 Tolgee is an open-source localization platform. Prior to 3.166.3, the XML parser
CVE-2025-59718 9.8 7.62% 2 2 2025-12-17T13:54:45.390000 A improper verification of cryptographic signature vulnerability in Fortinet For
CVE-2025-55182 10.0 66.27% 1 100 template 2025-12-10T02:00:02.557000 A pre-authentication remote code execution vulnerability exists in React Server
CVE-2025-11001 7.8 0.22% 1 6 2025-11-24T15:07:32.807000 7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability.
CVE-2025-64446 9.8 92.63% 1 14 template 2025-11-21T18:27:33.730000 A relative path traversal vulnerability in Fortinet FortiWeb 8.0.0 through 8.0.1
CVE-2025-6965 9.8 0.15% 1 0 2025-11-04T22:16:43.413000 There exists a vulnerability in SQLite versions before 3.50.2 where the number o
CVE-2025-26633 7.0 7.50% 1 2 2025-10-27T17:13:29.327000 Improper neutralization in Microsoft Management Console allows an unauthorized a
CVE-2023-48788 9.8 94.13% 1 1 template 2025-10-24T12:54:49.670000 A improper neutralization of special elements used in an sql command ('sql injec
CVE-2025-48868 7.2 0.95% 1 0 2025-09-29T14:06:57.020000 Horilla is a free and open source Human Resource Management System (HRMS). An au
CVE-2025-59528 10.0 82.39% 7 1 template 2025-09-23T16:45:09.443000 Flowise is a drag & drop user interface to build a customized large language mod
CVE-2025-4870 7.3 0.20% 1 4 2025-05-21T21:32:25 A vulnerability classified as critical was found in itsourcecode Restaurant Mana
CVE-2016-2183 7.5 40.99% 1 1 2025-04-12T10:46:40.837000 The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
CVE-2023-33177 8.8 3.76% 1 1 2024-11-21T08:05:03.337000 Xibo is a content management system (CMS). A path traversal vulnerability exists
CVE-2023-38766 5.4 0.21% 1 0 2024-04-04T06:40:24 Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote at
CVE-2026-39318 0 0.03% 1 0 N/A
CVE-2026-39332 0 0.03% 1 0 N/A
CVE-2026-39331 0 0.04% 1 0 N/A
CVE-2026-39330 0 0.03% 1 0 N/A
CVE-2026-39328 0 0.04% 1 0 N/A
CVE-2026-39339 0 0.10% 1 0 N/A
CVE-2026-39334 0 0.03% 1 0 N/A
CVE-2026-39344 0 0.03% 1 0 N/A
CVE-2026-39341 0 0.03% 1 0 N/A
CVE-2026-39355 0 0.04% 1 0 N/A
CVE-2026-34990 0 0.01% 1 0 N/A
CVE-2026-35164 0 0.21% 1 0 N/A
CVE-2026-35182 0 0.03% 1 0 N/A
CVE-2026-35174 0 0.35% 1 0 N/A
CVE-2026-34982 0 0.02% 1 0 N/A
CVE-2026-33510 0 0.04% 2 0 N/A
CVE-2026-26027 0 0.04% 1 0 N/A

CVE-2026-39846
(9.0 CRITICAL)

EPSS: 0.14%

updated 2026-04-08T16:16:27.537000

2 posts

SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe escaping and later unescaped into rendered HTML, creating a stored XSS sink. Because the desktop renderer runs with nodeIntegration enabled and contextIs

thehackerwire@mastodon.social at 2026-04-08T03:10:00.000Z ##

🔴 CVE-2026-39846 - Critical (9)

SiYuan is a personal knowledge management system. Prior to 3.6.4, a malicious note synced to another user can trigger remote code execution in the SiYuan Electron desktop client. The root cause is that table caption content is stored without safe ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-08T03:00:29.000Z ##

🚨 CVE-2026-39846 | CRITICAL: SiYuan < 3.6.4 vulnerable to stored XSS in table captions. Exploit enables RCE via Electron’s Node.js access — patch to 3.6.4 ASAP! Details: radar.offseq.com/threat/cve-20 #OffSeq #SiYuan #vuln #infosec

##

CVE-2026-34045
(8.2 HIGH)

EPSS: 0.06%

updated 2026-04-08T16:16:24.043000

1 posts

Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger denial-of-service conditions and extract sensitive information. By abusing missing connection limits and timeouts, an attacker can exhaust file descriptors and kernel memory, leading to application

thehackerwire@mastodon.social at 2026-04-08T03:54:14.000Z ##

🟠 CVE-2026-34045 - High (8.2)

Podman Desktop is a graphical tool for developing on containers and Kubernetes. Prior to 1.26.2, an unauthenticated HTTP server exposed by Podman Desktop allows any network attacker to remotely trigger denial-of-service conditions and extract sens...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33229
(0 None)

EPSS: 0.00%

updated 2026-04-08T16:16:23.430000

2 posts

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Prior to 17.4.8 and 17.10.1, an improperly protected scripting API allows any user with script right to bypass the sandboxing of the Velocity scripting API and execute, e.g., arbitrary Python scripts, allowing full access to the XWiki instance and thereby compromising the confidentiality, integ

offseq at 2026-04-08T16:00:19.931Z ##

🚨 CVE-2026-33229 (HIGH): XWiki Platform (17.0.0-rc-1 <17.4.8, 17.5.0-rc-1 <17.10.1) allows users with script rights to bypass sandboxing & execute arbitrary Python code. Patch to 17.4.8/17.10.1 now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-08T16:00:19.000Z ##

🚨 CVE-2026-33229 (HIGH): XWiki Platform (17.0.0-rc-1 <17.4.8, 17.5.0-rc-1 <17.10.1) allows users with script rights to bypass sandboxing & execute arbitrary Python code. Patch to 17.4.8/17.10.1 now! radar.offseq.com/threat/cve-20 #OffSeq #XWiki #infosec #vulnerability

##

CVE-2026-31790
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-08T15:16:11.967000

1 posts

Issue summary: Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer. Impact summary: The uninitialized buffer might contain sensitive data from the previous execution of the application process which leads to sensitive data leakage to an attacker. RSA_public_encrypt() returns the number of bytes w

undercodenews@mastodon.social at 2026-04-08T12:14:08.000Z ##

Critical OpenSSL Vulnerability Exposes Application Memory During RSA Operations

A newly revealed vulnerability in OpenSSL is sending shockwaves through the cybersecurity world. Experts warn that this flaw could allow attackers to extract sensitive data directly from application memory during cryptographic operations. The issue, tracked as CVE-2026-31790, targets the RSA Key Encapsulation Mechanism (KEM), specifically the RSASVE encapsulation process used to safely…

undercodenews.com/critical-ope

##

CVE-2026-39847
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-04-08T11:57:19

2 posts

The RSGI static handler for Emmett's internal assets (`/__emmett__` paths) is vulnerable to path traversal attacks. An attacker can use `../` sequences (eg `/__emmett__/../rsgi/handlers.py`) to read arbitrary files outside the assets directory.

thehackerwire@mastodon.social at 2026-04-08T03:10:11.000Z ##

🔴 CVE-2026-39847 - Critical (9.1)

Emmett is a full-stack Python web framework designed with simplicity. From 2.5.0 to before 2.8.1, the RSGI static handler for Emmett's internal assets (/__emmett__ paths) is vulnerable to path traversal attacks. An attacker can use ../ sequences (...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-08T00:00:37.000Z ##

⚠️ Emmett framework (2.5.0 – <2.8.1) suffers from a CRITICAL path traversal (CVE-2026-39847). Attackers can remotely read files outside the asset directory. Patch by upgrading to 2.8.1+. Details: radar.offseq.com/threat/cve-20 #OffSeq #Emmett #PathTraversal #CVE202639847

##

CVE-2026-35039
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-04-08T11:54:57

2 posts

_NOTE_: While the library exposes a mechanism which could introduce the vulnerability, this issue is created by developer-supplied code and not by the library itself. We will add a warning and some education for users around the possible issues however since the defaults work we will not be updating the library beyond that for this advisory. ## Impact Setting up a custom cacheKeyBuilder method w

thehackerwire@mastodon.social at 2026-04-06T17:21:05.000Z ##

🔴 CVE-2026-35039 - Critical (9.1)

fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.1.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause token...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T17:18:35.000Z ##

🔴 CVE-2026-35039 - Critical (9.1)

fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.1.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause token...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3535
(9.8 CRITICAL)

EPSS: 0.28%

updated 2026-04-08T09:31:42

2 posts

The DSGVO Google Web Fonts GDPR plugin for WordPress is vulnerable to arbitrary file upload due to missing file type validation in the `DSGVOGWPdownloadGoogleFonts()` function in all versions up to, and including, 1.1. The function is exposed via a `wp_ajax_nopriv_` hook, requiring no authentication. It fetches a user-supplied URL as a CSS file, extracts URLs from its content, and downloads those

offseq at 2026-04-08T08:30:27.767Z ##

⚠️ CVE-2026-3535: CRITICAL RCE in DSGVO Google Web Fonts GDPR (WordPress). Unauthenticated file upload lets attackers drop PHP shells via AJAX. No patch — disable plugin or block endpoint if using affected themes. More: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-08T08:30:27.000Z ##

⚠️ CVE-2026-3535: CRITICAL RCE in DSGVO Google Web Fonts GDPR (WordPress). Unauthenticated file upload lets attackers drop PHP shells via AJAX. No patch — disable plugin or block endpoint if using affected themes. More: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

CVE-2026-25776
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-08T09:16:20.360000

2 posts

Movable Type provided by Six Apart Ltd. contains a code injection vulnerability which may allow an attacker to execute arbitrary Perl script.

offseq at 2026-04-08T10:00:28.427Z ##

🚨 CRITICAL: CVE-2026-25776 impacts Six Apart Movable Type ≤9.1.0. Unauthenticated code injection enables remote Perl script execution. No patch yet — restrict access & monitor. More info: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-08T10:00:28.000Z ##

🚨 CRITICAL: CVE-2026-25776 impacts Six Apart Movable Type ≤9.1.0. Unauthenticated code injection enables remote Perl script execution. No patch yet — restrict access & monitor. More info: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #InfoSec #CVE #WebSecurity

##

CVE-2026-24913
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-08T06:31:38

1 posts

SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this vulnerability is exploited, information stored in the database may be obtained or altered by a user who can log in to the product.

thehackerwire@mastodon.social at 2026-04-08T06:19:26.000Z ##

🟠 CVE-2026-24913 - High (8.8)

SQL Injection vulnerability exists in MATCHA INVOICE 2.6.6 and earlier. If this vulnerability is exploited, information stored in the database may be obtained or altered by a user who can log in to the product.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4003
(9.8 CRITICAL)

EPSS: 0.42%

updated 2026-04-08T06:31:38

2 posts

The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalation via Arbitrary User Meta Update in all versions up to and including 1.1.15. This is due to a flawed authorization logic check in the userspn_ajax_nopriv_server() function within the 'userspn_form_save' case. The conditional only blocks unauthenticated users when the user_id is empty, but when a non-empty user_id is su

thehackerwire@mastodon.social at 2026-04-08T06:00:04.000Z ##

🔴 CVE-2026-4003 - Critical (9.8)

The Users manager – PN plugin for WordPress is vulnerable to Privilege Escalation via Arbitrary User Meta Update in all versions up to and including 1.1.15. This is due to a flawed authorization logic check in the userspn_ajax_nopriv_server() fu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-08T05:30:31.000Z ##

🔥 CRITICAL: CVE-2026-4003 in Users manager – PN for WordPress allows unauthenticated attackers to escalate privileges via arbitrary user meta updates. Disable plugin ASAP and monitor for patches. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #PrivilegeEscalation

##

CVE-2026-1346
(9.4 CRITICAL)

EPSS: 0.01%

updated 2026-04-08T03:32:18

3 posts

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to escalate their privileges to root due to execution with unnecessary privileges than required.

thehackerwire@mastodon.social at 2026-04-08T03:12:32.000Z ##

🔴 CVE-2026-1346 - Critical (9.3)

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-08T03:09:44.000Z ##

🔴 CVE-2026-1346 - Critical (9.3)

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-08T01:30:28.000Z ##

🔎 CRITICAL: CVE-2026-1346 in IBM Verify Identity Access Container (10.0 – 11.0.2) allows local privilege escalation to root. No patch available. Restrict access & monitor IBM advisories. radar.offseq.com/threat/cve-20 #OffSeq #IBMSecurity #CVE20261346 #InfoSec

##

CVE-2026-4788
(8.4 HIGH)

EPSS: 0.01%

updated 2026-04-08T03:32:18

1 posts

IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files that could be read by a local user.

thehackerwire@mastodon.social at 2026-04-08T03:09:35.000Z ##

🟠 CVE-2026-4788 - High (8.4)

IBM Tivoli Netcool Impact 7.1.0.0 through 7.1.0.37 stores sensitive information in log files that could be read by a local user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3499
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-08T03:32:18

1 posts

The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13.4.6 through 13.5.2.1. This is due to missing or incorrect nonce validation on the ajax_migrate_to_custom_post_type, ajax_adt_clear_custom_attributes_product_meta_keys, ajax_update_file_url_to_lower_case, ajax_use_legacy_filters_and_rules,

thehackerwire@mastodon.social at 2026-04-08T03:00:13.000Z ##

🟠 CVE-2026-3499 - High (8.8)

The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13.4.6 through 13.5.2.1. This is due to missing or incorrect nonce validation on the aj...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5726
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-08T03:16:07.700000

1 posts

ASDA-Soft Stack-based Buffer Overflow Vulnerability

CVE-2026-3296
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-04-08T02:16:04.067000

1 posts

The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.4.3 via deserialization of untrusted input from form entry metadata. This is due to the html-admin-page-entries-view.php file calling PHP's native unserialize() on stored entry meta values without passing the allowed_classes parameter. This makes it possible for unauthenticated atta

thehackerwire@mastodon.social at 2026-04-08T03:00:02.000Z ##

🔴 CVE-2026-3296 - Critical (9.8)

The Everest Forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.4.3 via deserialization of untrusted input from form entry metadata. This is due to the html-admin-page-entries-view.php file call...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3357
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-08T01:16:41.057000

1 posts

IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component.

thehackerwire@mastodon.social at 2026-04-08T03:00:23.000Z ##

🟠 CVE-2026-3357 - High (8.8)

IBM Langflow Desktop 1.6.0 through 1.8.2 Langflow could allow an authenticated user to execute arbitrary code on the system, caused by an insecure default setting which permits the deserialization of untrusted data in the FAISS component.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39933(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-08T00:30:33

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in The Wikimedia Foundation Mediawiki - GlobalWatchlist Extension allows Cross-Site Scripting (XSS).This issue affects non release branches.

offseq@infosec.exchange at 2026-04-07T22:30:12.000Z ##

🚨 CVE-2026-39933: CRITICAL XSS (CVSS 10) in Mediawiki - GlobalWatchlist Extension. Non-release branches vulnerable to input neutralization flaw (CWE-79). Audit deployments urgently! More info: radar.offseq.com/threat/cve-20 #OffSeq #XSS #Mediawiki #Security

##

CVE-2026-1342
(8.4 HIGH)

EPSS: 0.01%

updated 2026-04-08T00:30:32

2 posts

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally authenticated user to execute malicious scripts from outside of its control sphere.

thehackerwire@mastodon.social at 2026-04-08T03:48:46.000Z ##

🟠 CVE-2026-1342 - High (8.5)

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-08T03:09:55.000Z ##

🟠 CVE-2026-1342 - High (8.5)

IBM Verify Identity Access Container 11.0 through 11.0.2 and IBM Security Verify Access Container 10.0 through 10.0.9.1 and IBM Verify Identity Access 11.0 through 11.0.2 and IBM Security Verify Access 10.0 through 10.0.9.1 could allow a locally a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5747
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-08T00:16:05.657000

1 posts

An out-of-bounds write issue in the virtio PCI transport in Amazon Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecracker VMM process or potentially execute arbitrary code on the host via modification of virtio queue configuration registers after device activation. Achieving code execution on the host requires

thehackerwire@mastodon.social at 2026-04-08T03:09:50.000Z ##

🟠 CVE-2026-5747 - High (7.5)

An out-of-bounds write issue in the virtio PCI transport in Amazon Firecracker 1.13.0 through 1.14.3 and 1.15.0 on x86_64 and aarch64 might allow a local guest user with root privileges to crash the Firecracker VMM process or potentially execute a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39397
(9.4 CRITICAL)

EPSS: 0.04%

updated 2026-04-08T00:15:54

1 posts

### Impact All `/api/puck/*` CRUD endpoint handlers registered by `createPuckPlugin()` called Payload's local API with the default `overrideAccess: true`, bypassing all collection-level access control. The `access` option passed to `createPuckPlugin()` and any `access` rules defined on Puck-registered collections were silently ignored on these endpoints. An unauthenticated remote attacker could:

thehackerwire@mastodon.social at 2026-04-08T03:48:56.000Z ##

🔴 CVE-2026-39397 - Critical (9.4)

@delmaredigital/payload-puck is a PayloadCMS plugin for integrating Puck visual page builder. Prior to 0.6.23, all /api/puck/* CRUD endpoint handlers registered by createPuckPlugin() called Payload's local API with the default overrideAccess: true...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39356
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-08T00:14:59

1 posts

### Summary Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific `escapeName()` implementations. In affected versions, embedded identifier delimiters were not escaped before the identifier was wrapped in quotes or backticks. As a result, applications that pass attacker-controlled input to APIs that construct SQL identifiers or aliases, such as `sql.identifier()`, `.as()`

thehackerwire@mastodon.social at 2026-04-08T04:00:02.000Z ##

🟠 CVE-2026-39356 - High (7.5)

Drizzle is a modern TypeScript ORM. Prior to 0.45.2 and 1.0.0-beta.20, Drizzle ORM improperly escaped quoted SQL identifiers in its dialect-specific escapeName() implementations. In affected versions, embedded identifier delimiters were not escape...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39376
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-08T00:12:27

1 posts

### Summary When `parse()` fetches a URL that returns an HTML page containing a `<meta http-equiv="refresh">` tag, it recursively calls itself with the redirect URL — with no depth limit, no visited-URL deduplication, and no redirect count cap. An attacker-controlled server that returns an infinite chain of HTML meta-refresh responses causes unbounded recursion, exhausting the Python call stack an

thehackerwire@mastodon.social at 2026-04-08T03:54:48.000Z ##

🟠 CVE-2026-39376 - High (7.5)

FastFeedParser is a high performance RSS, Atom and RDF parser. Prior to 0.5.10, when parse() fetches a URL that returns an HTML page containing a tag, it recursively calls itself with the redirect URL — with no depth limit, no visited-URL dedup...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39371
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-08T00:12:07

1 posts

**Summary** Server functions exported from `"use server"` files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed cross-site GET navigations to trigger state-changing functions, because browsers send `SameSite=Lax` cookies on top-level GET requests. This affected all server functions -- both `serverAction()` handlers and b

1 repos

https://github.com/zebbernCVE/CVE-2026-39371

thehackerwire@mastodon.social at 2026-04-08T03:55:06.000Z ##

🟠 CVE-2026-39371 - High (8.1)

RedwoodSDK is a server-first React framework. From 1.0.0-beta.50 to 1.0.5, erver functions exported from "use server" files could be invoked via GET requests, bypassing their intended HTTP method. In cookie-authenticated applications, this allowed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39369
(7.6 HIGH)

EPSS: 0.05%

updated 2026-04-08T00:08:46

1 posts

## Summary `objects/aVideoEncoderReceiveImage.json.php` allowed an authenticated uploader to fetch attacker-controlled same-origin `/videos/...` URLs, bypass traversal scrubbing, and expose server-local files through the GIF poster storage path. The vulnerable GIF branch could be abused to read local files such as `/etc/passwd` or application source files and republish those bytes through a norm

thehackerwire@mastodon.social at 2026-04-08T03:54:57.000Z ##

🟠 CVE-2026-39369 - High (7.6)

WWBN AVideo is an open source video platform. In versions 26.0 and prior, objects/aVideoEncoderReceiveImage.json.php allowed an authenticated uploader to fetch attacker-controlled same-origin /videos/... URLs, bypass traversal scrubbing, and expos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35533
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T22:16:56

1 posts

### Summary `mise` loads trust-control settings from a local project `.mise.toml` before the trust check runs. An attacker who can place a malicious `.mise.toml` in a repository can make that same file appear trusted and then reach dangerous directives such as `[env] _.source`, templates, hooks, or tasks. The strongest current variant is `trusted_config_paths = ["/"]`. I confirmed on current `v2

thehackerwire@mastodon.social at 2026-04-08T03:54:23.000Z ##

🟠 CVE-2026-35533 - High (7.7)

mise manages dev tools like node, python, cmake, and terraform. From 2026.2.18 through 2026.4.5, mise loads trust-control settings from a local project .mise.toml before the trust check runs. An attacker who can place a malicious .mise.toml in a r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32862
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T21:32:46

1 posts

There is a memory corruption vulnerability due to an out-of-bounds write in ResFileFactory::InitResourceMgr() in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions.

thehackerwire@mastodon.social at 2026-04-08T04:23:17.000Z ##

🟠 CVE-2026-32862 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds write in ResFileFactory::InitResourceMgr() in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32861
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T21:32:46

1 posts

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVCLASS file in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .lvclass file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions.

thehackerwire@mastodon.social at 2026-04-08T04:01:33.000Z ##

🟠 CVE-2026-32861 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVCLASS file in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32864
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T21:32:46

1 posts

There is a memory corruption vulnerability due to an out-of-bounds read in mgcore_SH_25_3!aligned_free() in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions.

thehackerwire@mastodon.social at 2026-04-08T04:01:07.000Z ##

🟠 CVE-2026-32864 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds read in mgcore_SH_25_3!aligned_free() in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32863
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T21:32:46

1 posts

There is a memory corruption vulnerability due to an out-of-bounds read in sentry_transaction_context_set_operation() in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions.

thehackerwire@mastodon.social at 2026-04-08T04:00:30.000Z ##

🟠 CVE-2026-32863 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds read in sentry_transaction_context_set_operation() in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation req...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-29181
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-07T21:17:16.003000

1 posts

OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and allocations by sending many baggage: header lines, even when each individual value is within the 8192-byte per-value parse limit. This vulnerability is

thehackerwire@mastodon.social at 2026-04-08T03:54:33.000Z ##

🟠 CVE-2026-29181 - High (7.5)

OpenTelemetry-Go is the Go implementation of OpenTelemetry. From 1.36.0 to 1.40.0, multi-value baggage: header extraction parses each header field-value independently and aggregates members across values. This allows an attacker to amplify cpu and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39361
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-07T20:16:29.837000

1 posts

OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surrounding brackets (e.g. "[::1]" not "::1"). An authenticated attacker can reach internal services blocked from external access. On cloud deployments this enab

thehackerwire@mastodon.social at 2026-04-08T04:00:16.000Z ##

🟠 CVE-2026-39361 - High (7.7)

OpenObserve is a cloud-native observability platform. In 0.70.3 and earlier, the validate_enrichment_url function in src/handler/http/request/enrichment_table/mod.rs fails to block IPv6 addresses because Rust's url crate returns them with surround...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39329
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T20:16:29.047000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was identified in /EventNames.php in ChurchCRM. Authenticated users with AddEvent privileges can inject SQL via the newEvtTypeCntLst parameter during event type creation. The vulnerable flow reaches an ON DUPLICATE KEY UPDATE clause where unescaped user input is interpolated directly. This vulnerab

thehackerwire@mastodon.social at 2026-04-08T05:04:17.000Z ##

🟠 CVE-2026-39329 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was identified in /EventNames.php in ChurchCRM. Authenticated users with AddEvent privileges can inject SQL via the newEvtTypeCntLst parameter dur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39326
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T20:16:28.927000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyTypeEditor.php in ChurchCRM. Authenticated users with the role isMenuOptionsEnabled can inject arbitrary SQL statements through the Name and Description parameters and thus extract and modify information from the database. This vulnerability is fixed in 7.1.0.

thehackerwire@mastodon.social at 2026-04-08T06:19:36.000Z ##

🟠 CVE-2026-39326 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyTypeEditor.php in ChurchCRM. Authenticated users with the role isMenuOptionsEnabled can inject arbitrary SQL st...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39317
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T20:16:28.580000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in ChurchCRM's SettingsIndividual.php where user-controlled array keys from the type POST parameter are used directly in SQL queries without sanitization. This allows any authenticated user to extract sensitive data from the database. This vulnerability is fixed in 7.1.0.

thehackerwire@mastodon.social at 2026-04-08T06:41:31.000Z ##

🟠 CVE-2026-39317 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in ChurchCRM's SettingsIndividual.php where user-controlled array keys from the type POST parameter are used directly in SQL queries without...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32860
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T20:16:24.040000

1 posts

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVLIB file in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .lvlib file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions.

thehackerwire@mastodon.social at 2026-04-08T04:01:21.000Z ##

🟠 CVE-2026-32860 - High (7.8)

There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted LVLIB file in NI LabVIEW.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35464
(7.5 HIGH)

EPSS: 0.08%

updated 2026-04-07T20:00:07

1 posts

## Summary The fix for CVE-2026-33509 (GHSA-r7mc-x6x7-cqxx) added an `ADMIN_ONLY_OPTIONS` set to block non-admin users from modifying security-critical config options. The `storage_folder` option is not in this set and passes the existing path restriction because the Flask session directory is outside both PKGDIR and userdir. A user with SETTINGS and ADD permissions can redirect downloads to the

thehackerwire@mastodon.social at 2026-04-07T15:27:07.000Z ##

🟠 CVE-2026-35464 - High (7.5)

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35463
(8.8 HIGH)

EPSS: 0.26%

updated 2026-04-07T19:59:57

1 posts

### Summary The `ADMIN_ONLY_OPTIONS` protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to admin-only access. However, this protection is **only applied to core config options**, not to plugin config options. The `AntiVirus` plugin stores an executable path (`avfile`) in its config, which is passed directly to `subprocess.Popen(

thehackerwire@mastodon.social at 2026-04-07T15:26:58.000Z ##

🟠 CVE-2026-35463 - High (8.8)

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to ad...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35457
(8.2 HIGH)

EPSS: 0.04%

updated 2026-04-07T19:59:52

1 posts

### Summary The rendezvous server stores pagination cookies without bounds. An unauthenticated peer can repeatedly issue `DISCOVER` requests and force unbounded memory growth. ### Details Pagination state is stored in: ```rs HashMap<Cookie, HashSet<RegistrationId>> ``` On `Message::Discover`: ``` remote peer → DISCOVER → handle_request → registrations.get(...) → new cookie generated → cookie

thehackerwire@mastodon.social at 2026-04-07T15:27:17.000Z ##

🟠 CVE-2026-35457 - High (8.2)

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, the rendezvous server stores pagination cookies without bounds. An unauthenticated peer can repeatedly issue DISCOVER requests and force unbo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5735
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-07T19:16:48.023000

1 posts

Memory safety bugs present in Firefox 149.0.1 and Thunderbird 149.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 149.0.2 and Thunderbird < 149.0.2.

Matchbook3469@mastodon.social at 2026-04-08T14:28:57.000Z ##

⛔ New security advisory:

CVE-2026-5735 affects Mozilla Firefox.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

CVE-2026-24146
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-07T18:31:45

1 posts

NVIDIA Triton Inference Server contains a vulnerability where insufficient input validation and a large number of outputs could cause a server crash. A successful exploit of this vulnerability might lead to denial of service.

thehackerwire@mastodon.social at 2026-04-08T07:03:57.000Z ##

🟠 CVE-2026-24146 - High (7.5)

NVIDIA Triton Inference Server contains a vulnerability where insufficient input validation and a large number of outputs could cause a server crash. A successful exploit of this vulnerability might lead to denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24175
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-07T18:31:45

1 posts

NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request header to the server. A successful exploit of this vulnerability might lead to denial of service.

thehackerwire@mastodon.social at 2026-04-08T07:03:47.000Z ##

🟠 CVE-2026-24175 - High (7.5)

NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request header to the server. A successful exploit of this vulnerability might lead to denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24450
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-07T18:31:35

1 posts

An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-04-07T15:27:23.000Z ##

🟠 CVE-2026-24450 - High (8.1)

An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39340
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-07T18:16:46.010000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in PropertyTypeEditor.php, part of the administration functionality for managing property type categories (People → Person Properties / Family Properties). The vulnerability was introduced when legacyFilterInput() which both strips HTML and escapes SQL — was replaced with sanitizeText(), whic

thehackerwire@mastodon.social at 2026-04-08T04:23:36.000Z ##

🟠 CVE-2026-39340 - High (8.1)

ChurchCRM is an open-source church management system. Prior to 7.1.0, a SQL injection vulnerability exists in PropertyTypeEditor.php, part of the administration functionality for managing property type categories (People → Person Properties / Fa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39337
(10.0 CRITICAL)

EPSS: 0.27%

updated 2026-04-07T18:16:45.630000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial installation process, leading to complete server compromise. The "$dbPassword" variable is not sanitized. This vulnerability exists due to an incomplete fix

thehackerwire@mastodon.social at 2026-04-08T05:00:52.000Z ##

🔴 CVE-2026-39337 - Critical (10)

ChurchCRM is an open-source church management system. Prior to 7.1.0, critical pre-authentication remote code execution vulnerability in ChurchCRM's setup wizard allows unauthenticated attackers to inject arbitrary PHP code during the initial inst...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39333
(8.7 HIGH)

EPSS: 0.03%

updated 2026-04-07T18:16:44.997000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFundRaiser.php endpoint reflects user-supplied input (DateStart and DateEnd) into HTML input field attributes without proper output encoding for the HTML attribute context. An authenticated attacker can craft a malicious URL that executes arbitrary JavaScript when visited by another authenticated user. This constitutes a

thehackerwire@mastodon.social at 2026-04-08T06:00:39.000Z ##

🟠 CVE-2026-39333 - High (8.7)

ChurchCRM is an open-source church management system. Prior to 7.1.0, he FindFundRaiser.php endpoint reflects user-supplied input (DateStart and DateEnd) into HTML input field attributes without proper output encoding for the HTML attribute contex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39327
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T18:16:43.883000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /MemberRoleChange.php in ChurchCRM 7.0.5. Authenticated users with the role Manage Groups & Roles (ManageGroups) can inject arbitrary SQL statements through the NewRole parameter and thus extract and modify information from the database. This vulnerability is fixed in 7.1.

thehackerwire@mastodon.social at 2026-04-08T06:19:45.000Z ##

🟠 CVE-2026-39327 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /MemberRoleChange.php in ChurchCRM 7.0.5. Authenticated users with the role Manage Groups & Roles (ManageGroups) can inj...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39323
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T18:16:43.240000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical SQL injection vulnerability exists in ChurchCRM's PropertyTypeEditor.php where the Name and Description POST parameters are sanitized only with strip_tags() before direct concatenation into SQL queries. This allows authenticated users with "Manage Properties" permission to execute arbitrary SQL commands including data

thehackerwire@mastodon.social at 2026-04-08T06:00:59.000Z ##

🟠 CVE-2026-39323 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical SQL injection vulnerability exists in ChurchCRM's PropertyTypeEditor.php where the Name and Description POST parameters are sanitized only with strip_tags() before di...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39319
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T18:16:42.950000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, a second order SQL injection vulnerability was found in the endpoint /FundRaiserEditor.php in ChurchCRM. A user has to be authenticated but doesn't need any privileges. These users can inject arbitrary SQL statements through the iCurrentFundraiser PHP session parameter and thus extract and modify information from the database. T

thehackerwire@mastodon.social at 2026-04-08T07:00:07.000Z ##

🟠 CVE-2026-39319 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, a second order SQL injection vulnerability was found in the endpoint /FundRaiserEditor.php in ChurchCRM. A user has to be authenticated but doesn't need any privileges. These us...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35576
(8.7 HIGH)

EPSS: 0.03%

updated 2026-04-07T18:16:42.273000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored cross-site scripting (XSS) vulnerability exists in ChurchCRM within the Person Property Management subsystem. This issue persists in versions patched for CVE-2023-38766 and allows an authenticated user to inject arbitrary JavaScript code via dynamically assigned person properties. The malicious payload is persistently s

thehackerwire@mastodon.social at 2026-04-08T06:41:20.000Z ##

🟠 CVE-2026-35576 - High (8.7)

ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored cross-site scripting (XSS) vulnerability exists in ChurchCRM within the Person Property Management subsystem. This issue persists in versions patched for CVE-2023-38766...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35575
(8.0 HIGH)

EPSS: 0.04%

updated 2026-04-07T18:16:42.077000

1 posts

ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored Cross-Site Scripting (Stored XSS) vulnerability in the admin panel’s group-creation feature allows any user with group-creation privileges to inject malicious JavaScript that executes automatically when an administrator views the page. This enables attackers to steal the administrator’s session cookies, potentially lead

thehackerwire@mastodon.social at 2026-04-08T06:41:11.000Z ##

🟠 CVE-2026-35575 - High (8)

ChurchCRM is an open-source church management system. Prior to 6.5.3, a Stored Cross-Site Scripting (Stored XSS) vulnerability in the admin panel’s group-creation feature allows any user with group-creation privileges to inject malicious JavaScr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35573
(9.1 CRITICAL)

EPSS: 0.24%

updated 2026-04-07T18:16:41.760000

1 posts

ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by overwriting Apache .htaccess configuration files. The vulnerability exists in src/ChurchCRM/Backup/RestoreJob.php. The $rawUploadedFile['name'] parameter is

thehackerwire@mastodon.social at 2026-04-08T07:00:19.000Z ##

🔴 CVE-2026-35573 - Critical (9.1)

ChurchCRM is an open-source church management system. Prior to 6.5.3, a path traversal vulnerability in ChurchCRM's backup restore functionality allows authenticated administrators to upload arbitrary files and achieve remote code execution by ove...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24173
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-07T18:16:39.787000

1 posts

NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request to the server. A successful exploit of this vulnerability might lead to denial of service.

thehackerwire@mastodon.social at 2026-04-08T07:04:07.000Z ##

🟠 CVE-2026-24173 - High (7.5)

NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a server crash by sending a malformed request to the server. A successful exploit of this vulnerability might lead to denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34148
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-07T18:04:11

1 posts

### Summary `@fedify/fedify` follows HTTP redirects recursively in its remote document loader and authenticated document loader without enforcing a maximum redirect count or visited-URL loop detection. An attacker who controls a remote ActivityPub key or actor URL can force a server using Fedify to make repeated outbound requests from a single inbound request, leading to resource consumption and

thehackerwire@mastodon.social at 2026-04-06T16:22:55.000Z ##

🟠 CVE-2026-34148 - High (7.5)

Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to 1.9.6, 1.10.5, 2.0.8, and 2.1.1, @fedify/fedify follows HTTP redirects recursively in its remote document loader and authenticated document loader w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57834
(7.5 HIGH)

EPSS: 0.08%

updated 2026-04-07T17:31:20.270000

1 posts

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400, and Modem 5410). The absence of proper input validation leads to a Denial of Service.

thehackerwire@mastodon.social at 2026-04-07T05:39:10.000Z ##

🟠 CVE-2025-57834 - High (7.5)

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400, and Modem 5410...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-54328
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-04-07T17:28:19.270000

1 posts

An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-based Buffer Overflow occurs while parsing SMS RP-DATA messages.

thehackerwire@mastodon.social at 2026-04-07T05:39:01.000Z ##

🔴 CVE-2025-54328 - Critical (10)

An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35485
(7.5 HIGH)

EPSS: 0.37%

updated 2026-04-07T17:16:31.243000

1 posts

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown values, so an attacker can POST directory traversal payloads (e.g., ../../../etc/passwd) via the API and

thehackerwire@mastodon.social at 2026-04-07T15:26:15.000Z ##

🟠 CVE-2026-35485 - High (7.5)

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35042
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-07T17:16:29.590000

2 posts

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC.

thehackerwire@mastodon.social at 2026-04-06T17:21:15.000Z ##

🟠 CVE-2026-35042 - High (7.5)

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T17:18:45.000Z ##

🟠 CVE-2026-35042 - High (7.5)

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24660
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-07T17:16:27.583000

1 posts

A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-04-07T15:27:32.000Z ##

🟠 CVE-2026-24660 - High (8.1)

A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35394
(8.3 HIGH)

EPSS: 0.04%

updated 2026-04-07T16:16:25.893000

1 posts

Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. This vulnerability is fixed in 0.0.50.

thehackerwire@mastodon.social at 2026-04-07T04:00:04.000Z ##

🟠 CVE-2026-35394 - High (8.3)

Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26026
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-04-07T16:03:34.597000

1 posts

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, template injection by an administrator lead to RCE. This vulnerability is fixed in 11.0.6.

thehackerwire@mastodon.social at 2026-04-06T15:35:16.000Z ##

🔴 CVE-2026-26026 - Critical (9.1)

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, template injection by an administrator lead to RCE. This vulnerability is fixed in 11.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26263
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-07T16:02:38.350000

1 posts

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated time-based blind SQL injection exists in GLPI's Search engine. This vulnerability is fixed in 11.0.6.

thehackerwire@mastodon.social at 2026-04-06T15:35:35.000Z ##

🟠 CVE-2026-26263 - High (8.1)

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated time-based blind SQL injection exists in GLPI's Search engine. This vulnerability is fixed in 11.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20432
(8.0 HIGH)

EPSS: 0.05%

updated 2026-04-07T15:31:49

1 posts

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01406170; Issue ID: MSV-4461.

thehackerwire@mastodon.social at 2026-04-07T14:52:05.000Z ##

🟠 CVE-2026-20432 - High (8)

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5373
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-07T15:30:58

1 posts

An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N (8.1 High). This issue was fixed in version 4.0.260202.0 of the runZero Platform.

thehackerwire@mastodon.social at 2026-04-07T15:25:54.000Z ##

🟠 CVE-2026-5373 - High (8.1)

An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22679
(9.8 CRITICAL)

EPSS: 0.31%

updated 2026-04-07T15:30:53

1 posts

Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-executi

thehackerwire@mastodon.social at 2026-04-07T13:27:04.000Z ##

🔴 CVE-2026-22679 - Critical (9.8)

Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invokin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 0.10%

updated 2026-04-07T15:30:49

2 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

2 repos

https://github.com/0xBlackash/CVE-2026-34197

https://github.com/dinosn/CVE-2026-34197

_r_netsec@infosec.exchange at 2026-04-07T20:43:05.000Z ##

CVE-2026-34197: ActiveMQ RCE via Jolokia API horizon3.ai/intelligence/blogs

##

thehackerwire@mastodon.social at 2026-04-07T14:51:55.000Z ##

🟠 CVE-2026-34197 - High (8.8)

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.

Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20433
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-07T15:30:48

1 posts

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01088681; Issue ID: MSV-4460.

thehackerwire@mastodon.social at 2026-04-07T14:52:14.000Z ##

🟠 CVE-2026-20433 - High (8.8)

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4740
(8.2 HIGH)

EPSS: 0.01%

updated 2026-04-07T15:17:46.797000

1 posts

A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certificate that can be approved by the OCM controller. This enables cross-cluster privilege escalation and may allow an attacker to gain control over other manag

thehackerwire@mastodon.social at 2026-04-07T15:26:03.000Z ##

🟠 CVE-2026-4740 - High (8.2)

A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certifica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35405
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-07T15:17:43.367000

1 posts

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique namespaces in a loop and the server happily accepts every single one allocating memory for each registration with no pushback. Keep doing this long enough

thehackerwire@mastodon.social at 2026-04-07T15:27:14.000Z ##

🟠 CVE-2026-35405 - High (7.5)

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35395
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T15:17:43.230000

1 posts

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_REQUEST without validation and directly interpolated into SQL queries, allowing any authenticated user to execute arbitrary SQL commands against the databas

thehackerwire@mastodon.social at 2026-04-07T04:00:15.000Z ##

🟠 CVE-2026-35395 - High (8.8)

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_R...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35043
(7.8 HIGH)

EPSS: 0.07%

updated 2026-04-07T15:17:41.963000

1 posts

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line 1648 interpolates system_packages directly into a shell command using an f-string without any quoting. The generated script is uploaded to BentoCloud as

thehackerwire@mastodon.social at 2026-04-07T05:53:23.000Z ##

🟠 CVE-2026-35043 - High (7.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35036
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-07T15:17:41.730000

1 posts

Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, Ech0 implements link preview (editor fetches a page title) through GET /api/website/title. That is legitimate product behavior, but the implementation is unsafe: the route is unauthenticated, accepts a fully attacker-controlled URL, performs a server-side GET, reads the entire response body into memo

thehackerwire@mastodon.social at 2026-04-06T17:18:47.000Z ##

🟠 CVE-2026-35036 - High (7.5)

Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, Ech0 implements link preview (editor fetches a page title) through GET /api/website/title. That is legitimate product behavior, but the implementati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34783
(8.1 HIGH)

EPSS: 0.16%

updated 2026-04-07T15:17:40.383000

1 posts

Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4, a path traversal vulnerability in Ferret's IO::FS::WRITE standard library function allows a malicious website to write arbitrary files to the filesystem of the machine running Ferret. When an operator scrapes a website that returns filenames containing ../ sequences, and uses those filenames to construct output paths

thehackerwire@mastodon.social at 2026-04-06T17:22:30.000Z ##

🟠 CVE-2026-34783 - High (8.1)

Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4, a path traversal vulnerability in Ferret's IO::FS::WRITE standard library function allows a malicious website to write arbitrary files to the filesystem of the machi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35409
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-07T14:20:08

1 posts

### Summary A Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block requests to local and private networks could be circumvented using IPv4-Mapped IPv6 address notation. ### Details Directus implements an IP deny-list to prevent server-side requests to internal/private network ranges. The validation logic

thehackerwire@mastodon.social at 2026-04-07T03:26:20.000Z ##

🟠 CVE-2026-35409 - High (7.7)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35408
(8.7 HIGH)

EPSS: 0.01%

updated 2026-04-07T14:19:50

1 posts

## Summary Directus's Single Sign-On (SSO) login pages lacked a `Cross-Origin-Opener-Policy` (COOP) HTTP response header. Without this header, a malicious cross-origin window that opens the Directus login page retains the ability to access and manipulate the `window` object of that page. An attacker can exploit this to intercept and redirect the OAuth authorization flow to an attacker-controlled

thehackerwire@mastodon.social at 2026-04-07T03:17:04.000Z ##

🟠 CVE-2026-35408 - High (8.7)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5627
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-07T14:16:24.460000

2 posts

A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in `server/utils/agentFlows/index.js`. Specifically, the combination of `path.join` and `normalizePath` allows attackers to bypass directory restrictions an

thehackerwire@mastodon.social at 2026-04-07T14:44:39.000Z ##

🔴 CVE-2026-5627 - Critical (9.1)

A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T14:30:15.000Z ##

🚨 CVE-2026-5627: Critical path traversal in mintplex-labs/anything-llm (<=1.9.1). Attackers with high privileges can access/delete sensitive .json files. Upgrade to 1.12.1. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #PathTraversal #Security

##

CVE-2026-23818
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-07T14:16:20.830000

1 posts

A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploitation may redirect an authenticated user to an attacker-controlled server hosting a spoofed login page prompting the unsuspecting victim to give away th

thehackerwire@mastodon.social at 2026-04-07T13:27:13.000Z ##

🟠 CVE-2026-23818 - High (8.8)

A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28797
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-07T13:20:55.200000

1 posts

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions 0.24.0 and prior, a Server-Side Template Injection (SSTI) vulnerability exists in RAGFlow's Agent workflow Text Processing (StringTransform) and Message components. These components use Python's jinja2.Template (unsandboxed) to render user-supplied templates, allowing any authenticated user to execute arbitrary oper

thehackerwire@mastodon.social at 2026-04-07T06:00:27.000Z ##

🟠 CVE-2026-28797 - High (8.8)

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions 0.24.0 and prior, a Server-Side Template Injection (SSTI) vulnerability exists in RAGFlow's Agent workflow Text Processing (StringTransform) and Message components....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47391
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory corruption while processing a frame request from user.

CVE-2025-47392
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory corruption when decoding corrupted satellite data files with invalid signature offsets.

thehackerwire@mastodon.social at 2026-04-06T17:07:14.000Z ##

🟠 CVE-2025-47392 - High (8.8)

Memory corruption when decoding corrupted satellite data files with invalid signature offsets.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21373
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

thehackerwire@mastodon.social at 2026-04-06T17:07:04.000Z ##

🟠 CVE-2026-21373 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21376
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

2 posts

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

thehackerwire@mastodon.social at 2026-04-06T16:26:31.000Z ##

🟠 CVE-2026-21376 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T16:24:16.000Z ##

🟠 CVE-2026-21376 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21380
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory.

thehackerwire@mastodon.social at 2026-04-06T16:24:25.000Z ##

🟠 CVE-2026-21380 - High (7.8)

Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21378
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

thehackerwire@mastodon.social at 2026-04-06T16:24:16.000Z ##

🟠 CVE-2026-21378 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21375
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

thehackerwire@mastodon.social at 2026-04-06T16:24:06.000Z ##

🟠 CVE-2026-21375 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33540
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-07T13:20:35.010000

2 posts

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream registry. The realm URL from a bearer challenge is used without validating that it matches the upstream registry host. As a result, an attacker-controlled ups

thehackerwire@mastodon.social at 2026-04-06T15:41:29.000Z ##

🟠 CVE-2026-33540 - High (7.5)

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream regis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T15:35:15.000Z ##

🟠 CVE-2026-33540 - High (7.5)

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream regis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5612
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:35.010000

1 posts

A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability affects the function formWlEncrypt of the file /goform/formWlEncrypt. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not

offseq@infosec.exchange at 2026-04-06T10:30:28.000Z ##

⚠️ HIGH severity: Stack buffer overflow in Belkin F9K1015 v1.00.10 (/goform/formWlEncrypt, CVE-2026-5612). Remote code exec/DoS possible. No vendor patch. Restrict remote access & monitor advisories. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity #CVE20265612

##

CVE-2026-5628
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:35.010000

2 posts

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted

offseq@infosec.exchange at 2026-04-06T09:00:29.000Z ##

📢 CVE-2026-5628: HIGH severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remotely exploitable — no patch yet. Restrict mgmt access & disable remote mgmt until fixed. Info: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoT #Belkin

##

thehackerwire@mastodon.social at 2026-04-06T06:22:06.000Z ##

🟠 CVE-2026-5628 - High (8.8)

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5629
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:35.010000

2 posts

A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

offseq@infosec.exchange at 2026-04-06T07:30:28.000Z ##

⚠️ CVE-2026-5629: High-severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remote exploit possible — public code out, no patch yet. Restrict device access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity #Belkin

##

thehackerwire@mastodon.social at 2026-04-06T06:22:15.000Z ##

🟠 CVE-2026-5629 - High (8.8)

A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0740
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-07T13:20:11.643000

4 posts

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note:

1 repos

https://github.com/xShadow-Here/CVE-2026-0740

beyondmachines1 at 2026-04-08T12:01:09.762Z ##

Critical File Upload Vulnerability Reported in Ninja Forms Plugin for WordPress

A critical unauthenticated arbitrary file upload vulnerability in the Ninja Forms – File Upload plugin (CVE-2026-0740) allows attackers to achieve remote code execution.

**If you are using the Ninja Forms File Upload plugin, this is urgent! Immediately update to version 3.3.27. You can't hide WordPress from the internet, it's made to be visible online. Since this flaw is being actively scanned for, any delay in patching leaves your site exposed to automated attacks. After the update, review server logs for suspicious requests targeting the handle_upload action.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-04-08T12:01:09.000Z ##

Critical File Upload Vulnerability Reported in Ninja Forms Plugin for WordPress

A critical unauthenticated arbitrary file upload vulnerability in the Ninja Forms – File Upload plugin (CVE-2026-0740) allows attackers to achieve remote code execution.

**If you are using the Ninja Forms File Upload plugin, this is urgent! Immediately update to version 3.3.27. You can't hide WordPress from the internet, it's made to be visible online. Since this flaw is being actively scanned for, any delay in patching leaves your site exposed to automated attacks. After the update, review server logs for suspicious requests targeting the handle_upload action.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-04-07T05:30:30.000Z ##

🚨 CRITICAL: CVE-2026-0740 in Ninja Forms - File Uploads (≤3.3.26) lets unauthenticated attackers upload arbitrary files, enabling RCE. Patch to 3.3.27+ now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-04-07T05:17:00.000Z ##

🔴 CVE-2026-0740 - Critical (9.8)

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This make...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31842
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-07T13:20:11.643000

1 posts

Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unau

thehackerwire@mastodon.social at 2026-04-07T12:18:14.000Z ##

🟠 CVE-2026-31842 - High (7.5)

Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34896
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-07T13:20:11.643000

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, Coming Soon & Maintenance Mode allows Cross Site Request Forgery.This issue affects Under Construction, Coming Soon & Maintenance Mode: from n/a through 2.1.1.

thehackerwire@mastodon.social at 2026-04-07T10:09:55.000Z ##

🟠 CVE-2026-34896 - High (7.5)

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, Coming Soon & Maintenance Mode allows Cross Site Request Forgery.This issue affects Under Construction, Coming Soon & Maintenance Mode: from n/a through 2.1.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35471
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-07T13:20:11.643000

3 posts

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.

offseq@infosec.exchange at 2026-04-07T08:30:26.000Z ##

🚨 CRITICAL: goshs (<2.0.0-beta.3) vulnerable to path traversal (CVE-2026-35471). Remote attackers can access/delete files outside restricted dirs. Patch with 2.0.0-beta.3 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #infosec #golang #CVE202635471

##

thehackerwire@mastodon.social at 2026-04-07T03:16:44.000Z ##

🔴 CVE-2026-35471 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T00:00:37.000Z ##

🔔 CRITICAL: CVE-2026-35471 in patrickhener goshs (<2.0.0-beta.3) allows path traversal via tdeleteFile(), enabling attackers to access or delete files outside the intended directory. Upgrade to 2.0.0-beta.3 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202635471 #GoLang #PathTraversal

##

CVE-2026-5465
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-07T13:20:11.643000

1 posts

The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate changes to the `externalId` field when a Provider (Employee) user updates their own profile. The `externalId` maps directly to a WordPress user ID and is pa

1 repos

https://github.com/kaleth4/CVE-2026-5465

thehackerwire@mastodon.social at 2026-04-07T08:00:12.000Z ##

🟠 CVE-2026-5465 - High (8.8)

The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35171
(9.8 CRITICAL)

EPSS: 0.30%

updated 2026-04-07T13:20:11.643000

2 posts

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema supports the special () key, which enables arbitrary callable instantiation. An attacker can exploit this to execute arbitrary system commands during appli

thehackerwire@mastodon.social at 2026-04-07T05:53:04.000Z ##

🔴 CVE-2026-35171 - Critical (9.8)

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:23:48.000Z ##

🔴 CVE-2026-35171 - Critical (9.8)

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35021
(7.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T13:20:11.643000

1 posts

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell metacharacters such as $() or backtick expressions into file paths that are interpolated into shell commands executed via execSync. Although the file path

thehackerwire@mastodon.social at 2026-04-07T05:00:09.000Z ##

🟠 CVE-2026-35021 - High (7.8)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35203
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:11.643000

1 posts

ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in ext-codec/VP9Rtp.cpp reads multiple fields from the RTP payload based on flag bits in the first byte, without verifying that sufficient data exists in the buffer. A crafted VP9 RTP packet with a 1-byte payload (0xFF, all flags set) causes the parser to read past the end of the allocated buffer, resulting in a heap-buf

thehackerwire@mastodon.social at 2026-04-07T04:00:25.000Z ##

🟠 CVE-2026-35203 - High (7.5)

ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in ext-codec/VP9Rtp.cpp reads multiple fields from the RTP payload based on flag bits in the first byte, without verifying that sufficient data exists in the buffer. A c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35442
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:11.643000

1 posts

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placeholder. When combined with groupBy, any authenticated user with read access to the affected collection can extract concealed field values, including static

thehackerwire@mastodon.social at 2026-04-07T03:16:53.000Z ##

🟠 CVE-2026-35442 - High (8.1)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placehol...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5686
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-07T13:20:11.643000

1 posts

A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-07T03:06:08.000Z ##

🟠 CVE-2026-5686 - High (8.8)

A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5709
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-07T13:20:11.643000

1 posts

Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input when using the FileBrowser functionality. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigat

thehackerwire@mastodon.social at 2026-04-07T03:00:32.000Z ##

🟠 CVE-2026-5709 - High (8.8)

Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5687
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-07T13:20:11.643000

1 posts

A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-07T02:59:52.000Z ##

🟠 CVE-2026-5687 - High (8.8)

A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be init...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35050
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-04-07T13:20:11.643000

1 posts

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.1.1, users can save extention settings in "py" format and in the app root directory. This allows to overwrite python files, for instance the "download-model.py" file could be overwritten. Then, this python file can be triggered to get executed from "Model" menu when requesting to download a new mode

thehackerwire@mastodon.social at 2026-04-06T18:24:12.000Z ##

🔴 CVE-2026-35050 - Critical (9.1)

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.1.1, users can save extention settings in "py" format and in the app root directory. This allows to overwrite python files, for instance the "downl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35045
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-07T13:20:11.643000

1 posts

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in that Space, including recipes marked as private by other users. This bypasses all object-level authorization checks enforced on standard single-recipe e

1 repos

https://github.com/FilipeGaudard/CVE-2026-35045-PoC

thehackerwire@mastodon.social at 2026-04-06T18:24:02.000Z ##

🟠 CVE-2026-35045 - High (8.1)

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34975
(8.5 HIGH)

EPSS: 0.03%

updated 2026-04-07T13:20:11.643000

2 posts

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment filenames were interpolated directly into raw MIME messages without sanitization. An authenticated API user could inject arbitrary email headers (e.g. Bcc,

thehackerwire@mastodon.social at 2026-04-06T17:21:24.000Z ##

🟠 CVE-2026-34975 - High (8.5)

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment fil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T17:18:54.000Z ##

🟠 CVE-2026-34975 - High (8.5)

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment fil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34208
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-04-07T13:20:11.643000

1 posts

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Because this.constructor resolves to the internal SandboxGlobal function and Function.prototype.call is allowed, attacker

thehackerwire@mastodon.social at 2026-04-06T16:23:04.000Z ##

🔴 CVE-2026-34208 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34950
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-04-07T13:20:11.643000

2 posts

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that CVE-2023-48223 patched.

thehackerwire@mastodon.social at 2026-04-06T16:22:18.000Z ##

🔴 CVE-2026-34950 - Critical (9.1)

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T16:20:01.000Z ##

🔴 CVE-2026-34950 - Critical (9.1)

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33752
(8.6 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:11.643000

1 posts

curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimat

1 repos

https://github.com/redyank/CVE-2026-33752

thehackerwire@mastodon.social at 2026-04-06T16:20:40.000Z ##

🟠 CVE-2026-33752 - High (8.6)

curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect reque...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34402
(8.1 HIGH)

EPSS: 0.02%

updated 2026-04-07T13:20:11.643000

1 posts

ChurchCRM is an open-source church management system. Prior to 7.1.0, authenticated users with Edit Records or Manage Groups permissions can exploit a time-based blind SQL injection vulnerability in the PropertyAssign.php endpoint to exfiltrate or modify any database content, including user credentials, personal identifiable information (PII), and configuration secrets. This vulnerability is fixed

thehackerwire@mastodon.social at 2026-04-06T16:20:29.000Z ##

🟠 CVE-2026-34402 - High (8.1)

ChurchCRM is an open-source church management system. Prior to 7.1.0, authenticated users with Edit Records or Manage Groups permissions can exploit a time-based blind SQL injection vulnerability in the PropertyAssign.php endpoint to exfiltrate or...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34904
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-07T09:31:28

1 posts

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0.

thehackerwire@mastodon.social at 2026-04-07T10:10:04.000Z ##

🟠 CVE-2026-34904 - High (7.5)

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1114
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-07T09:31:22

2 posts

In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brute-force attack to recover the secret key. Once the secret key is obtained, the attacker can forge administrative tokens by modifying the JWT payload and

thehackerwire@mastodon.social at 2026-04-07T08:00:27.000Z ##

🔴 CVE-2026-1114 - Critical (9.8)

In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T07:00:27.000Z ##

🔴 CRITICAL: CVE-2026-1114 in parisneo/lollms v2.1.0 — weak JWT secret lets attackers brute-force, forge admin tokens & escalate privileges. Patch to v2.2.0 now! radar.offseq.com/threat/cve-20 #OffSeq #CVE20261114 #AppSec #infosec

##

CVE-2025-65115
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-07T06:30:28

1 posts

Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows

thehackerwire@mastodon.social at 2026-04-07T06:17:15.000Z ##

🟠 CVE-2025-65115 - High (8.8)

Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Managemen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5708
(8.8 HIGH)

EPSS: 0.12%

updated 2026-04-07T00:30:28

1 posts

Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop host instance profile permissions, and interact with AWS resources and services via a crafted API request. To remediate this issue, users are advised to

thehackerwire@mastodon.social at 2026-04-07T03:00:16.000Z ##

🟠 CVE-2026-5708 - High (8.8)

Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5707
(8.8 HIGH)

EPSS: 0.21%

updated 2026-04-07T00:30:28

1 posts

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding

thehackerwire@mastodon.social at 2026-04-07T03:00:03.000Z ##

🟠 CVE-2026-5707 - High (8.8)

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5685
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-07T00:30:27

1 posts

A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-04-07T03:00:55.000Z ##

🟠 CVE-2026-5685 - High (8.8)

A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5684
(8.0 HIGH)

EPSS: 0.03%

updated 2026-04-07T00:30:27

1 posts

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-07T03:00:43.000Z ##

🟠 CVE-2026-5684 - High (8)

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35393
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-06T23:43:51

3 posts

### Summary * POST multipart upload directory not sanitized | `httpserver/updown.go:71-174` This finding affect the default configuration, no flags or authentication required. ### Details **File:** `httpserver/updown.go:71-174` **Trigger:** `POST /<path>/upload` (server.go:49-51 checks `HasSuffix(r.URL.Path, "/upload")`) The filename is sanitized (slashes stripped, line 105-106), but the targe

offseq@infosec.exchange at 2026-04-07T11:30:27.000Z ##

🚨 CRITICAL: CVE-2026-35393 in goshs (<2.0.0-beta.3) allows unauthenticated path traversal via POST uploads. Remote attackers can write files anywhere on disk. Upgrade to 2.0.0-beta.3 now! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vulnerability

##

thehackerwire@mastodon.social at 2026-04-07T03:26:38.000Z ##

🔴 CVE-2026-35393 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multipart upload directory not sanitized. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T01:30:27.000Z ##

🚨 CVE-2026-35393: Critical path traversal in goshs (<2.0.0-beta.3). Remote attackers can write files anywhere via unsanitized POST uploads. Upgrade to 2.0.0-beta.3 now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #GoLang #Infosec

##

CVE-2026-35392
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-06T23:43:46

2 posts

### Summary * PUT upload has no path sanitization | `httpserver/updown.go:20-69` This finding affects the default configuration, no flags or authentication required. ### Details **File:** `httpserver/updown.go:20-69` **Trigger:** `PUT /<path>` (server.go:57-59 routes directly to `put()`) The handler uses `req.URL.Path` raw to build the save path. No `filepath.Clean`, no `..` check, no webroot

thehackerwire@mastodon.social at 2026-04-07T03:26:29.000Z ##

🔴 CVE-2026-35392 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T03:00:28.000Z ##

🚨 CVE-2026-35392: goshs < 2.0.0-beta.3 has a CRITICAL path traversal flaw (CVSS 9.8). Remote attackers can write files anywhere on the server. Upgrade to 2.0.0-beta.3+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #GoLang #Vulnerability

##

CVE-2026-35187
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-06T23:43:26

1 posts

## Vulnerability Details **CWE-918**: Server-Side Request Forgery (SSRF) The `parse_urls` API function in `src/pyload/core/api/__init__.py` (line 556) fetches arbitrary URLs server-side via `get_url(url)` (pycurl) without any URL validation, protocol restriction, or IP blacklist. An authenticated user with ADD permission can: - Make HTTP/HTTPS requests to internal network resources and cloud me

thehackerwire@mastodon.social at 2026-04-07T04:59:51.000Z ##

🟠 CVE-2026-35187 - High (7.7)

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the parse_urls API function in src/pyload/core/api/__init__.py fetches arbitrary URLs server-side via get_url(url) (pycurl) without any URL validati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35209
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-06T23:42:30

1 posts

### Impact Applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) as the first argument to `defu()` are vulnerable to prototype pollution. A crafted payload containing a `__proto__` key can override intended default values in the merged result: ```js import { defu } from 'defu' const userInput = JSON.parse('{"__

thehackerwire@mastodon.social at 2026-04-06T18:23:28.000Z ##

🟠 CVE-2026-35209 - High (7.5)

defu is software that allows uers to assign default properties recursively. Prior to version 6.1.5, applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) as the fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35044
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-06T23:42:10

1 posts

## Summary The Dockerfile generation function `generate_containerfile()` in `src/bentoml/_internal/container/generate.py` uses an unsandboxed `jinja2.Environment` with the `jinja2.ext.do` extension to render user-provided `dockerfile_template` files. When a victim imports a malicious bento archive and runs `bentoml containerize`, attacker-controlled Jinja2 template code executes arbitrary Python

thehackerwire@mastodon.social at 2026-04-07T06:00:07.000Z ##

🟠 CVE-2026-35044 - High (8.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandbo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34841
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-04-06T23:41:04

1 posts

### **Impact** This is a **supply chain attack** involving compromised versions of the `axios` npm package, which introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT). Users of **@usebruno/cli** who ran `npm install` between **00:21 UTC and ~03:30 UTC on March 31, 2026** may have been impacted. Potential impact includes: * Execution of a malicious `postinstall`

thehackerwire@mastodon.social at 2026-04-06T17:22:40.000Z ##

🔴 CVE-2026-34841 - Critical (9.8)

Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidden dependency deploying a cross-platform Remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34989(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-06T23:40:25

1 posts

## Summary ### **Vulnerability 1: Stored DOM XSS via Profile Name Update (Persistent Payload Injection)** - Stored Cross-Site Scripting via Unsanitized User Name in Profile Management ### Description The application fails to properly sanitize user-controlled input when users update their profile name (e.g., full name / username). An attacker can inject a malicious JavaScript payload into their pr

offseq@infosec.exchange at 2026-04-07T13:00:28.000Z ##

⚠️ CRITICAL: Stored XSS in ci4-cms-erp ci4ms (<31.0.0.0) lets attackers inject JS via profile names, risking user sessions. Fixed in 31.0.0.0. Patch now! CVE-2026-34989 radar.offseq.com/threat/cve-20 #OffSeq #XSS #WebSecurity #CVE202634989

##

CVE-2026-34976
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-04-06T23:26:04

2 posts

The `restoreTenant` admin mutation is missing from the authorization middleware config (`admin.go:499-522`), making it completely unauthenticated. Unlike the similar `restore` mutation which requires Guardian-of-Galaxy authentication, `restoreTenant` executes with zero middleware. This mutation accepts attacker-controlled backup source URLs (including `file://` for local filesystem access), S3/Mi

beyondmachines1@infosec.exchange at 2026-04-07T08:01:09.000Z ##

Critical Authentication Bypass in Dgraph Database Allows Remote Takeover

Dgraph disclosed a critical authentication bypass vulnerability (CVE-2026-34976) in its administrative API that allows unauthenticated attackers to overwrite databases and read sensitive server files.

**If you are using Dgraph, this is urgent. Immediately make sure that public access to Dgraph's administration port 8080 is blocked, and add restoreTenant to adminMutationMWConfig: "restoreTenant": gogMutMWs.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-04-06T17:18:57.000Z ##

🔴 CVE-2026-34976 - Critical (10)

Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the restoreTenant admin mutation is missing from the authorization middleware config (admin.go), making it completely unauthenticated. Unlike the similar restore mutation whic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33579
(9.9 CRITICAL)

EPSS: 0.02%

updated 2026-04-06T23:16:26.987000

2 posts

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and

1 repos

https://github.com/atalovesyou/openclaw-security-checker

beyondmachines1 at 2026-04-08T09:01:09.745Z ##

Critical Privilege Escalation Vulnerabilities Patched in OpenClaw AI Agent

OpenClaw patched eight vulnerabilities, including a critical privilege escalation flaw (CVE-2026-33579) that allows attackers to gain full administrative control over AI agent instances.

**If you use OpenClaw, firs, why? It's a terrible and extremely insecure tool. If you insist on using it, update immediately to version 2026.3.28 or later and enable mandatory authentication by setting auth.enabled to true. Most instances run wide open by default. Audit your device lists for any unauthorized admin accounts, review recent pairing approval logs, and rotate all API keys and credentials if you find anything suspicious.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-04-08T09:01:09.000Z ##

Critical Privilege Escalation Vulnerabilities Patched in OpenClaw AI Agent

OpenClaw patched eight vulnerabilities, including a critical privilege escalation flaw (CVE-2026-33579) that allows attackers to gain full administrative control over AI agent instances.

**If you use OpenClaw, firs, why? It's a terrible and extremely insecure tool. If you insist on using it, update immediately to version 2026.3.28 or later and enable mandatory authentication by setting auth.enabled to true. Most instances run wide open by default. Audit your device lists for any unauthorized admin accounts, review recent pairing approval logs, and rotate all API keys and credentials if you find anything suspicious.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-35172
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-06T23:14:52

1 posts

## summary: distribution can restore read access in `repo a` after an explicit delete when `storage.cache.blobdescriptor: redis` and `storage.delete.enabled: true` are both enabled. the delete path clears the shared digest descriptor but leaves stale repo-scoped membership behind, so a later `Stat` or `Get` from `repo b` repopulates the shared descriptor and makes the deleted blob readable from `r

thehackerwire@mastodon.social at 2026-04-07T05:20:18.000Z ##

🟠 CVE-2026-35172 - High (7.5)

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, distribution can restore read access in repo a after an explicit delete when storage.cache.blobdescriptor: redis and storage.delete.enabled: true are bo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34986
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-06T23:11:46

1 posts

### Impact Decrypting a JSON Web Encryption (JWE) object will panic if the `alg` field indicates a key wrapping algorithm ([one ending in `KW`](https://pkg.go.dev/github.com/go-jose/go-jose/v4#pkg-constants), with the exception of `A128GCMKW`, `A192GCMKW`, and `A256GCMKW`) and the `encrypted_key` field is empty. The panic happens when `cipher.KeyUnwrap()` in `key_wrap.go` attempts to allocate a s

thehackerwire@mastodon.social at 2026-04-06T17:19:06.000Z ##

🟠 CVE-2026-34986 - High (7.5)

Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. Prior to 4.1.4 and 3.0.5, dec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35020
(8.4 HIGH)

EPSS: 0.06%

updated 2026-04-06T21:31:41

1 posts

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL environment variable. Attackers can inject shell metacharacters into the TERMINAL variable which are interpreted by /bin/sh when the command lookup helper cons

thehackerwire@mastodon.social at 2026-04-07T05:20:27.000Z ##

🟠 CVE-2026-35020 - High (8.4)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL enviro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35022
(9.8 CRITICAL)

EPSS: 0.25%

updated 2026-04-06T21:31:41

2 posts

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without input validation. Attackers who can influence authentication settings can inject shell metacharacters through parameters like apiKeyHelper, awsAuthRefresh, awsCredentialExport, and gcpAuthRefresh to e

thehackerwire@mastodon.social at 2026-04-07T05:20:08.000Z ##

🔴 CVE-2026-35022 - Critical (9.8)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without input validation. Attackers who can influence a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T04:30:27.000Z ##

⚠️ CRITICAL: Anthropic Claude Code CLI & Agent SDK vulnerable to OS command injection (CVE-2026-35022, CVSS 9.3). Attackers can exploit auth helpers for arbitrary command execution. Vendor patch is server-side — confirm update. radar.offseq.com/threat/cve-20 #OffSeq #CVE #CloudSecurity

##

CVE-2025-47390
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:15

1 posts

Memory corruption while preprocessing IOCTL request in JPEG driver.

CVE-2026-21372
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:15

1 posts

Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.

thehackerwire@mastodon.social at 2026-04-06T17:00:10.000Z ##

🟠 CVE-2026-21372 - High (7.8)

Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21367
(7.7 HIGH)

EPSS: 0.04%

updated 2026-04-06T18:33:15

1 posts

Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans.

thehackerwire@mastodon.social at 2026-04-06T16:59:50.000Z ##

🟠 CVE-2026-21367 - High (7.6)

Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21382
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:15

2 posts

Memory Corruption when handling power management requests with improperly sized input/output buffers.

thehackerwire@mastodon.social at 2026-04-06T16:26:12.000Z ##

🟠 CVE-2026-21382 - High (7.8)

Memory Corruption when handling power management requests with improperly sized input/output buffers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T16:23:56.000Z ##

🟠 CVE-2026-21382 - High (7.8)

Memory Corruption when handling power management requests with improperly sized input/output buffers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21381
(7.7 HIGH)

EPSS: 0.04%

updated 2026-04-06T18:33:15

1 posts

Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.

thehackerwire@mastodon.social at 2026-04-06T16:23:15.000Z ##

🟠 CVE-2026-21381 - High (7.6)

Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21374
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:07

2 posts

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

thehackerwire@mastodon.social at 2026-04-06T16:26:22.000Z ##

🟠 CVE-2026-21374 - High (7.8)

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T16:24:06.000Z ##

🟠 CVE-2026-21374 - High (7.8)

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21371
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:06

1 posts

Memory Corruption when retrieving output buffer with insufficient size validation.

thehackerwire@mastodon.social at 2026-04-06T17:00:00.000Z ##

🟠 CVE-2026-21371 - High (7.8)

Memory Corruption when retrieving output buffer with insufficient size validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47389
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:05

1 posts

Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.

thehackerwire@mastodon.social at 2026-04-06T17:07:23.000Z ##

🟠 CVE-2025-47389 - High (7.8)

Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35616
(9.8 CRITICAL)

EPSS: 5.95%

updated 2026-04-06T18:12:57.863000

11 posts

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

5 repos

https://github.com/BishopFox/CVE-2026-35616-check

https://github.com/0xBlackash/CVE-2026-35616

https://github.com/fevar54/CVE-2026-35616-detector.py

https://github.com/z3r0h3ro/CVE-2026-35616-poc

https://github.com/fevar54/forticlient_ems_cve_2026_35616_poc.py

threatcodex@infosec.exchange at 2026-04-07T13:30:17.000Z ##

CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS
#CVE_2026_35616
arcticwolf.com/resources/blog/

##

youranonnewsirc@nerdculture.de at 2026-04-07T11:43:04.000Z ##

Geopolitical tensions rise as Trump issues a Strait of Hormuz ultimatum amidst Middle East oil disruptions (Apr 7). In cybersecurity, North Korea's UNC4736 is linked to a $285M crypto heist (Apr 6), and a critical Fortinet zero-day (CVE-2026-35616) is under active exploitation (Apr 6-7). Technology advances with Fortrea launching AI-enhanced clinical trial solutions (Apr 7).

#AnonNews_irc #Cybersecurity #News

##

jbhall56@infosec.exchange at 2026-04-07T11:09:02.000Z ##

The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild. darkreading.com/vulnerabilitie

##

benzogaga33@mamot.fr at 2026-04-07T09:40:05.000Z ##

CVE-2026-35616 : déjà exploitée, cette faille Fortinet a été patchée en urgence ! it-connect.fr/cve-2026-35616-d #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

patrickcmiller@infosec.exchange at 2026-04-07T06:42:00.000Z ##

Fortinet customers confront actively exploited zero-day, with a full patch still pending cyberscoop.com/fortinet-fortic

##

teezeh@ieji.de at 2026-04-07T05:53:55.000Z ##

"Fortinet on April 4 released a hotfix for a critical 9.8 bug in FortiClient EMS 7.4.5 and 7.4.6, saying that it had observed exploitation in the wild.

The API access bypass flaw – tracked as CVE-2026-35616 – was first reported to Fortinet by DefusedCyber, which posted on X about the bug early Saturday morning."

scworld.com/news/fortinet-issu

##

youranonnewsirc@nerdculture.de at 2026-04-07T03:43:06.000Z ##

Geopolitical tensions are escalating in the Middle East, impacting global oil markets. A critical zero-day vulnerability in FortiClient EMS (CVE-2026-35616) is under active exploitation, with a hotfix released. DPRK-linked hackers are leveraging GitHub for command-and-control in South Korea-targeted attacks. AI continues to influence tech job reductions while also expanding the cyberattack surface. Japanese companies are forming a new organization to bolster cybersecurity cooperation.

#Cybersecurity #Geopolitics #TechNews

##

secdb@infosec.exchange at 2026-04-06T18:00:12.000Z ##

🚨 [CISA-2026:0406] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-35616 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet FortiClient EMS Improper Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: Please adhere to Fortinet&#39;s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260406 #cisa20260406 #cve_2026_35616 #cve202635616

##

thenewoil@mastodon.thenewoil.org at 2026-04-06T16:30:02.000Z ##

New #FortiClient #EMS flaw exploited in attacks, emergency patch released

bleepingcomputer.com/news/secu

#cybersecurity #Fortinet

##

AAKL@infosec.exchange at 2026-04-06T16:06:44.000Z ##

The latest Fortinet vulnerability has been added to the KEV catalogue.

CVE-2026-35616: Fortinet FortiClient EMS Improper Access Control Vulnerabilityhttps://www.cve.org/CVERecord?id=CVE-2026-35616 #CISA #Fortinet #infosec #vulnerability

@cR0w

##

cisakevtracker@mastodon.social at 2026-04-06T16:00:50.000Z ##

CVE ID: CVE-2026-35616
Vendor: Fortinet
Product: FortiClient EMS
Date Added: 2026-04-06
Notes: Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-30078
(7.5 HIGH)

EPSS: 0.06%

updated 2026-04-06T15:31:34

2 posts

OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome.

thehackerwire@mastodon.social at 2026-04-06T15:42:40.000Z ##

🟠 CVE-2026-30078 - High (7.5)

OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T15:42:01.000Z ##

🟠 CVE-2026-30078 - High (7.5)

OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34885
(8.5 HIGH)

EPSS: 0.03%

updated 2026-04-06T15:31:34

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection.This issue affects Media LIbrary Assistant: from n/a through 3.34.

Nuclei template

thehackerwire@mastodon.social at 2026-04-06T15:34:55.000Z ##

🟠 CVE-2026-34885 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection.This issue affects Media LIbrary Assistant: from n/a through 3.34.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3524
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T15:31:34

1 posts

Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing after a failed authorization check in ServeHTTP which allows an authenticated attacker to access, create, download, and delete legal hold data via crafted API requests to the plugin's endpoints. Mattermost Advisory ID: MMSA-2026-00621

thehackerwire@mastodon.social at 2026-04-06T13:18:53.000Z ##

🟠 CVE-2026-3524 - High (8.8)

Mattermost Plugin Legal Hold versions &lt;=1.1.4 fail to halt request processing after a failed authorization check in ServeHTTP which allows an authenticated attacker to access, create, download, and delete legal hold data via crafted API request...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35470
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:57:08

2 posts

## Description Six `confronta_righe.php` files across different modules in OpenSTAManager <= 2.10.1 contain an SQL Injection vulnerability. The `righe` parameter received via `$_GET['righe']` is directly concatenated into an SQL query without any sanitization, parameterization or validation. An authenticated attacker can inject arbitrary SQL statements to extract sensitive data from the database

thehackerwire@mastodon.social at 2026-04-07T05:39:19.000Z ##

🟠 CVE-2026-35470 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:23:38.000Z ##

🟠 CVE-2026-35470 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32186
(6.5 MEDIUM)

EPSS: 0.09%

updated 2026-04-03T21:32:44

1 posts

Microsoft Bing Elevation of Privilege Vulnerability

CVE-2026-3184
(3.7 LOW)

EPSS: 0.08%

updated 2026-04-03T21:31:49

1 posts

A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified d

1 repos

https://github.com/Mothra-1/CVE-2026-31844

linux@activitypub.awakari.com at 2026-04-07T08:02:25.000Z ## CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization Information published.

#CVE

Origin | Interest | Match ##

CVE-2026-34040
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-03T16:51:28.670000

1 posts

Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.

CVE-2026-1668
(9.8 CRITICAL)

EPSS: 0.37%

updated 2026-04-02T15:03:02.430000

1 posts

The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or informatio

1 repos

https://github.com/tangrs/cve-2026-1668-poc

CVE-2026-33744
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-01T15:00:48.743000

1 posts

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.37, the `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be int

thehackerwire@mastodon.social at 2026-04-07T05:53:23.000Z ##

🟠 CVE-2026-35043 - High (7.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59032
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-27T09:31:18

1 posts

ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response. This can be used to crash ManageSieve service repeatedly, making it unavailable for other users. Control access to ManageSieve port, or disable the service if it's not needed. Alternatively upgrade to a fixed version. No publicly available exploits are known.

linux@activitypub.awakari.com at 2026-04-06T21:19:54.000Z ## Debian Bookworm Dovecot Authentication Regression Fix DSA-6197-2 The Bookworm backport of the security fix for CVE-2025-59032 introduced a regression in authenticating against managesieved. For the...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-33509
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-26T20:47:02.337000

1 posts

pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option without restriction. The reconnect.script config option controls a file path that is passed directly to subprocess.run() in the thread manager's reconnect l

thehackerwire@mastodon.social at 2026-04-07T15:27:07.000Z ##

🟠 CVE-2026-35464 - High (7.5)

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32251
(6.5 MEDIUM)

EPSS: 0.03%

updated 2026-03-20T15:57:42.580000

2 posts

Tolgee is an open-source localization platform. Prior to 3.166.3, the XML parsers used for importing Android XML resources (.xml) and .resx files don't disable external entity processing. An authenticated user who can import translation files into a project can exploit this to read arbitrary files from the server and make server-side requests to internal services. This vulnerability is fixed in 3.

_r_netsec at 2026-04-08T11:13:05.237Z ##

Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3) simonkoeck.com/writeups/tolgee

##

_r_netsec@infosec.exchange at 2026-04-08T11:13:05.000Z ##

Reading /etc/passwd via translation file upload in Tolgee's cloud platform (CVE-2026-32251, CVSS 9.3) simonkoeck.com/writeups/tolgee

##

CVE-2025-59718
(9.8 CRITICAL)

EPSS: 7.62%

updated 2025-12-17T13:54:45.390000

2 posts

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7

2 repos

https://github.com/exfil0/CVE-2025-59718-PoC

https://github.com/moften/CVE-2025-59718-Fortinet-Poc

CapTechGroup@mastodon.social at 2026-04-08T15:02:10.000Z ##

CVE-2025-59718 analysis shows attackers bypassing FortiGate SSO, exfiltrating configs, and establishing persistent VPN access over 2 weeks of dwell time. They targeted hypervisors, DCs, and backup infrastructure—classic pre-ransomware reconnaissance. Detection gaps: firewall config changes blend into routine admin tasks. #CVE202559718 #ransomware #firewall #incidentresponse #threatintel

bit.ly/4cf8M7B

##

CapTechGroup@mastodon.social at 2026-04-08T15:02:10.000Z ##

CVE-2025-59718 analysis shows attackers bypassing FortiGate SSO, exfiltrating configs, and establishing persistent VPN access over 2 weeks of dwell time. They targeted hypervisors, DCs, and backup infrastructure—classic pre-ransomware reconnaissance. Detection gaps: firewall config changes blend into routine admin tasks. #CVE202559718 #ransomware #firewall #incidentresponse #threatintel

bit.ly/4cf8M7B

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 66.27%

updated 2025-12-10T02:00:02.557000

1 posts

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Nuclei template

100 repos

https://github.com/BlackTechX011/React2Shell

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/Archerkong/CVE-2025-55182

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/kavienanj/CVE-2025-55182

https://github.com/msanft/CVE-2025-55182

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/alsaut1/react2shell-lab

https://github.com/xalgord/React2Shell

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/theman001/CVE-2025-55182

https://github.com/theori-io/reactguard

https://github.com/sickwell/CVE-2025-55182

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/zzhorc/CVE-2025-55182

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/jctommasi/react2shellVulnApp

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/shamo0/react2shell-PoC

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/ynsmroztas/NextRce

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/MemerGamer/CVE-2025-55182

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/gensecaihq/react2shell-scanner

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/hexsh1dow/CVE-2025-55182

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/sumanrox/rschunter

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/snipevx/React2Shell-POC

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/assetnote/react2shell-scanner

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/zr0n/react2shell

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/Updatelap/CVE-2025-55182

https://github.com/freeqaz/react2shell

https://github.com/alptexans/RSC-Detect-CVE-2025-55182

https://github.com/rix4uni/CVE-2025-55182

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/nehkark/CVE-2025-55182

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/shyambhanushali/React2Shell

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/hoosin/CVE-2025-55182

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/vulncheck-oss/cve-2025-55182

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/emredavut/CVE-2025-55182

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/surajhacx/react2shellpoc

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/hualy13/CVE-2025-55182

https://github.com/mrknow001/RSC_Detector

https://github.com/ejpir/CVE-2025-55182-bypass

patrickcmiller@infosec.exchange at 2026-04-06T18:42:00.000Z ##

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials thehackernews.com/2026/04/hack

##

CVE-2025-11001
(7.8 HIGH)

EPSS: 0.22%

updated 2025-11-24T15:07:32.807000

1 posts

7-Zip ZIP File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this product is required to exploit this vulnerability but attack vectors may vary depending on the implementation. The specific flaw exists within the handling of symbolic links in ZIP files. Craf

6 repos

https://github.com/I3r1h0n/7Ziprowler

https://github.com/lastvocher/7zip-CVE-2025-11001

https://github.com/ranasen-rat/CVE-2025-11001

https://github.com/shalevo13/Se7enSlip

https://github.com/mbanyamer/CVE-2025-11001---7-Zip

https://github.com/pacbypass/CVE-2025-11001

exploitdb_bot@mastodon.social at 2026-04-08T15:30:11.000Z ##

🚨 New Exploit: 7-Zip 24.00 - Directory Traversal
📋 CVE: CVE-2025-11001
👤 Author: Mohammed Idrees Banyamer

🔗 exploit-db.com/exploits/52501

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-11001

##

exploitdb_bot@mastodon.social at 2026-04-08T15:30:15.000Z ##

🚨 New Exploit: FortiWeb 8.0.2 - Remote Code Execution
📋 CVE: CVE-2025-64446
👤 Author: Mohammed Idrees Banyamer

🔗 exploit-db.com/exploits/52502

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-64446

##

CVE-2025-6965
(9.8 CRITICAL)

EPSS: 0.15%

updated 2025-11-04T22:16:43.413000

1 posts

There exists a vulnerability in SQLite versions before 3.50.2 where the number of aggregate terms could exceed the number of columns available. This could lead to a memory corruption issue. We recommend upgrading to version 3.50.2 or above.

exploitdb_bot@mastodon.social at 2026-04-08T14:31:12.000Z ##

🚨 New Exploit: SQLite 3.50.1 - Heap Overflow
📋 CVE: CVE-2025-6965
👤 Author: Mohammed Idrees Banyamer

🔗 exploit-db.com/exploits/52499

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-6965

##

CVE-2025-26633
(7.0 HIGH)

EPSS: 7.50%

updated 2025-10-27T17:13:29.327000

1 posts

Improper neutralization in Microsoft Management Console allows an unauthorized attacker to bypass a security feature locally.

2 repos

https://github.com/mbanyamer/MSC-EvilTwin-Local-Privilege-Escalation

https://github.com/sandsoncosta/CVE-2025-26633

exploitdb_bot@mastodon.social at 2026-04-08T14:31:09.000Z ##

🚨 New Exploit: Microsoft MMC MSC EvilTwin - Local Admin Creation
📋 CVE: CVE-2025-26633
👤 Author: Mohammed Idrees Banyamer

🔗 exploit-db.com/exploits/52498

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-26633

##

CVE-2023-48788
(9.8 CRITICAL)

EPSS: 94.13%

updated 2025-10-24T12:54:49.670000

1 posts

A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiClientEMS version 7.2.0 through 7.2.2, FortiClientEMS 7.0.1 through 7.0.10 allows attacker to execute unauthorized code or commands via specially crafted packets.

Nuclei template

1 repos

https://github.com/horizon3ai/CVE-2023-48788

steelefortress@infosec.exchange at 2026-04-07T23:00:11.000Z ##

CISA just added CVE-2023-48788 to its Known Exploited Vulnerabilities catalog and is giving federal agencies until Friday to patch FortiClient EMS.

Read more: steelefortress.com/nuy028

Privacy #Cybersecurity #Security #Encryption #ThreatIntel

##

CVE-2025-48868
(7.2 HIGH)

EPSS: 0.95%

updated 2025-09-29T14:06:57.020000

1 posts

Horilla is a free and open source Human Resource Management System (HRMS). An authenticated Remote Code Execution (RCE) vulnerability exists in Horilla 1.3.0 due to the unsafe use of Python’s eval() function on a user-controlled query parameter in the project_bulk_archive view. This allows privileged users (e.g., administrators) to execute arbitrary system commands on the server. While having Djan

exploitdb_bot@mastodon.social at 2026-04-08T14:31:06.000Z ##

🚨 New Exploit: Horilla v1.3 - RCE
📋 CVE: CVE-2025-48868
👤 Author: nakleh

🔗 exploit-db.com/exploits/52497

#ExploitDB #InfoSec #CyberSecurity #CVE-2025-48868

##

CVE-2025-59528
(10.0 CRITICAL)

EPSS: 82.39%

updated 2025-09-23T16:45:09.443000

7 posts

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes

Nuclei template

1 repos

https://github.com/zimshk/CVE-2025-59528.yaml

oversecurity@mastodon.social at 2026-04-08T09:40:08.000Z ##

Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk

A critical Flowise RCE vulnerability is now being actively exploited. The flaw, tracked as CVE-2025-59528, carries a maximum severity rating and...

🔗️ [Thecyberexpress] link.is.it/xZ20c1

##

oversecurity@mastodon.social at 2026-04-08T09:40:08.000Z ##

Critical Flowise RCE Vulnerability Actively Exploited, Thousands of Systems at Risk

A critical Flowise RCE vulnerability is now being actively exploited. The flaw, tracked as CVE-2025-59528, carries a maximum severity rating and...

🔗️ [Thecyberexpress] link.is.it/xZ20c1

##

beyondmachines1@infosec.exchange at 2026-04-08T08:01:11.000Z ##

Flowise AI Platform Targeted by Active Exploitation of Critical RCE Flaw

Flowise is facing active exploitation of CVE-2025-59528, a critical vulnerability that allows attackers to execute arbitrary JavaScript and take full control of AI workflow servers.

**If you're running Flowise, this is urgent. Your tool is being attacked. Make sure Flowise is isolated from the internet unless absolutely necessary, and update to version 3.0.6 ASAP. Until you can update, restrict access to trusted IPs only. After isolating or patching (whichever comes first), rotate all API tokens and credential.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

LLMs@activitypub.awakari.com at 2026-04-07T20:16:05.000Z ## Attackers exploit critical Flowise flaw CVE-2025-59528 for remote code execution Attackers are exploiting a critical Flowise flaw, tracked as CVE-2025-59528 (CVSS score of 10), that lets them run...

#Breaking #News #Hacking #Security #CVE-2025-59528 #Flowise #hacking #news #information #security #news

Origin | Interest | Match ##

LLMs@activitypub.awakari.com at 2026-04-07T17:02:05.000Z ## Max severity Flowise RCE vulnerability now exploited in attacks Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flowise for building ...

#Security #Artificial #Intelligence

Origin | Interest | Match ##

LLMs@activitypub.awakari.com at 2026-04-07T17:02:05.000Z ## Max severity Flowise RCE vulnerability now exploited in attacks BleepingComputer Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flow...

#Security #News

Origin | Interest | Match ##

oversecurity@mastodon.social at 2026-04-07T17:20:29.000Z ##

Max severity Flowise RCE vulnerability now exploited in attacks

Hackers are exploiting a maximum-severity vulnerability, tracked as CVE-2025-59528, in the open-source platform Flowise for building custom LLM...

🔗️ [Bleepingcomputer] link.is.it/LhP5de

##

CVE-2025-4870
(7.3 HIGH)

EPSS: 0.20%

updated 2025-05-21T21:32:25

1 posts

A vulnerability classified as critical was found in itsourcecode Restaurant Management System 1.0. This vulnerability affects unknown code of the file /admin/menu_save.php. The manipulation of the argument menu leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

4 repos

https://github.com/ftz7/PoC-CVE-2025-48703

https://github.com/Skynoxk/CVE-2025-48703

https://github.com/itstarsec/CVE-2025-48703

https://github.com/B1tBreaker/CVE-2025-48708

linux@activitypub.awakari.com at 2026-04-08T00:27:11.000Z ## Flatpak 1.16.4 Patches a Silent Security Flaw That Let Sandboxed Apps Peek Outside Their Walls Flatpak 1.16.4 fixes CVE-2025-4870, a vulnerability that allowed sandboxed Linux applications to obtai...

#DevNews #CVE-2025-4870 #Flatpak #1.16.4 #Flatpak #vulnerability #Linux #application #isolation #Linux #sandbox

Origin | Interest | Match ##

CVE-2016-2183
(7.5 HIGH)

EPSS: 40.99%

updated 2025-04-12T10:46:40.837000

1 posts

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

1 repos

https://github.com/ZakyHermawan/Simple-Sweet32

certvde@infosec.exchange at 2026-04-07T06:38:28.000Z ##

#OT #Advisory VDE-2026-013
Helmholz: Use of a Broken or Risky Cryptographic Algorithm

Vulnerabilities in PROFINET-Switch devices with firmware <= V1.12.010 that allow an attacker to gain control over the device.
#CVE CVE-2016-2183

certvde.com/en/advisories/vde-
#oCSAF
#CSAF helmholz.csaf-tp.certvde.com/.

##

CVE-2023-33177
(8.8 HIGH)

EPSS: 3.76%

updated 2024-11-21T08:05:03.337000

1 posts

Xibo is a content management system (CMS). A path traversal vulnerability exists in the Xibo CMS whereby a specially crafted zip file can be uploaded to the CMS via the layout import function by an authenticated user which would allow creation of files outside of the CMS library directory as the webserver user. This can be used to upload a PHP webshell inside the web root directory and achieve rem

1 repos

https://github.com/complexusprada/Xibo-CMS-Zip-Slip-RCE-Exploit-CVE-2023-33177

exploitdb_bot@mastodon.social at 2026-04-08T15:30:08.000Z ##

🚨 New Exploit: xibocms 3.3.4 - RCE
📋 CVE: CVE-2023-33177
👤 Author: complexusprada

🔗 exploit-db.com/exploits/52500

#ExploitDB #InfoSec #CyberSecurity #CVE-2023-33177

##

CVE-2023-38766
(5.4 MEDIUM)

EPSS: 0.21%

updated 2024-04-04T06:40:24

1 posts

Cross Site Scripting (XSS) vulnerability in ChurchCRM v.5.0.0 allows a remote attacker to execute arbitrary code via a crafted payload to the PersonView.php component.

thehackerwire@mastodon.social at 2026-04-08T06:41:20.000Z ##

🟠 CVE-2026-35576 - High (8.7)

ChurchCRM is an open-source church management system. Prior to 7.0.0, a stored cross-site scripting (XSS) vulnerability exists in ChurchCRM within the Person Property Management subsystem. This issue persists in versions patched for CVE-2023-38766...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39318
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T06:59:57.000Z ##

🟠 CVE-2026-39318 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, the GroupPropsFormRowOps.php file contains a SQL injection vulnerability. User input in the Field parameter is directly inserted into SQL queries without proper sanitization. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39332
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T06:00:29.000Z ##

🟠 CVE-2026-39332 - High (8.7)

ChurchCRM is an open-source church management system. Prior to 7.1.0, a reflected Cross-Site Scripting (XSS) vulnerability in GeoPage.php allows any authenticated user to inject arbitrary JavaScript into the browser of another authenticated user. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39331
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T05:04:35.000Z ##

🟠 CVE-2026-39331 - High (8.1)

ChurchCRM is an open-source church management system. Prior to 7.1.0, an authenticated API user can modify any family record's state without proper authorization by simply changing the {familyId} parameter in requests, regardless of whether they p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39330
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T05:04:26.000Z ##

🟠 CVE-2026-39330 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /PropertyAssign.php in ChurchCRM. Authenticated users with the role Manage Groups & Roles (ManageGroups) and Edit Record...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39328
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T05:01:12.000Z ##

🟠 CVE-2026-39328 - High (8.9)

ChurchCRM is an open-source church management system. Prior to 7.1.0, a stored cross-site scripting vulnerability exists in ChurchCRM's person profile editing functionality. Non-administrative users who have the EditSelf permission can inject mali...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39339
(0 None)

EPSS: 0.10%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T05:01:01.000Z ##

🔴 CVE-2026-39339 - Critical (9.1)

ChurchCRM is an open-source church management system. Prior to 7.1.0, a critical authentication bypass vulnerability in ChurchCRM's API middleware (ChurchCRM/Slim/Middleware/AuthMiddleware.php) allows unauthenticated attackers to access all prote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39334
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T05:00:08.000Z ##

🟠 CVE-2026-39334 - High (8.8)

ChurchCRM is an open-source church management system. Prior to 7.1.0, an SQL injection vulnerability was found in the endpoint /SettingsIndividual.php in ChurchCRM 7.0.5. Authenticated users without any specific privileges can inject arbitrary SQL...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39344
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T04:59:58.000Z ##

🟠 CVE-2026-39344 - High (8.1)

ChurchCRM is an open-source church management system. Prior to 7.1.0, there is a Reflected Cross-Site Scripting (XSS) vulnerability on the login page, which is caused by the lack of sanitization or encoding of the username parameter received from ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39341
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T04:59:49.000Z ##

🟠 CVE-2026-39341 - High (8.1)

ChurchCRM is an open-source church management system. Prior to 7.1.0, The application is vulnerable to time-based SQL injection due to an improper input validation. Endpoint Reports/ConfirmReportEmail.php?familyId= is not correctly sanitising user...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39355
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-08T04:23:27.000Z ##

🔴 CVE-2026-39355 - Critical (9.9)

Genealogy is a family tree PHP application. Prior to 5.9.1, a critical broken access control vulnerability in the genealogy application allows any authenticated user to transfer ownership of arbitrary non-personal teams to themselves. This enables...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34990
(0 None)

EPSS: 0.01%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-07T06:00:18.000Z ##

🟠 CVE-2026-34990 - High (7.8)

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35164
(0 None)

EPSS: 0.21%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-07T05:53:14.000Z ##

🟠 CVE-2026-35164 - High (8.8)

Brave CMS is an open-source CMS. Prior to 2.0.6, an unrestricted file upload vulnerability exists in the CKEditor upload functionality. It is found in app/Http/Controllers/Dashboard/CkEditorController.php within the ckupload method. The method fai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35182
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-07T05:00:00.000Z ##

🟠 CVE-2026-35182 - High (8.8)

Brave CMS is an open-source CMS. Prior to 2.0.6, this vulnerability is a missing authorization check found in the update role endpoint at routes/web.php. The POST route for /rights/update-role/{id} lacks the checkUserPermissions:assign-user-roles ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35174
(0 None)

EPSS: 0.35%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T18:23:52.000Z ##

🔴 CVE-2026-35174 - Critical (9.1)

Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path traversal vulnerability exists in the administration console that allows an administrator or a user with Change Settings permission to change the uploads path to any fold...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34982
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T16:20:20.000Z ##

🟠 CVE-2026-34982 - High (8.2)

Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are miss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33510
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T15:41:19.000Z ##

🟠 CVE-2026-33510 - High (8.8)

Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T15:35:05.000Z ##

🟠 CVE-2026-33510 - High (8.8)

Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26027
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T15:35:26.000Z ##

🟠 CVE-2026-26027 - High (7.5)

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated user can store an XSS payload through the inventory endpoint. This vulnerability is fixed in 11.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites