## Updated at UTC 2026-04-27T23:49:08.352902

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-7160 8.8 0.00% 2 0 2026-04-27T22:16:18.690000 A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the
CVE-2026-7155 9.8 0.00% 2 0 2026-04-27T21:31:12 A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b202005
CVE-2026-7154 9.8 0.00% 2 0 2026-04-27T21:31:12 A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This aff
CVE-2026-7151 8.8 0.00% 2 0 2026-04-27T21:31:12 A vulnerability was determined in Tenda HG3 2.0. Impacted is the function formUp
CVE-2026-7153 9.8 0.00% 2 0 2026-04-27T21:31:12 A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The
CVE-2026-7152 9.8 0.00% 2 0 2026-04-27T21:31:12 A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affe
CVE-2026-6741 8.8 0.00% 2 0 2026-04-27T21:31:11 The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for W
CVE-2026-30350 7.5 0.00% 2 0 2026-04-27T21:31:02 An issue in the /store/items/search endpoint of Agent Protocol server commit e9a
CVE-2026-7156 9.8 0.00% 4 0 2026-04-27T21:16:44 A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected i
CVE-2026-42039 7.5 0.04% 2 0 2026-04-27T19:50:46.320000 Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.
CVE-2026-30351 7.5 0.00% 2 0 2026-04-27T19:18:46.690000 A path traversal vulnerability in the UI/static component of leonvanzyl autocode
CVE-2026-41419 7.6 0.03% 1 0 2026-04-27T19:10:45.587000 4ga Boards is a boards system for realtime project management. Prior to 3.3.5, a
CVE-2026-40858 8.8 0.08% 4 1 2026-04-27T18:57:20.293000 The camel-infinispan component's ProtoStream-based remote aggregation repository
CVE-2026-5940 7.8 0.01% 2 0 2026-04-27T18:57:20.293000 Calling a function that triggers a UI refresh after removing comments via a scri
CVE-2026-32688 0 0.00% 1 0 2026-04-27T18:57:20.293000 Allocation of Resources Without Limits or Throttling vulnerability in elixir-plu
CVE-2026-41409 9.8 0.05% 2 0 2026-04-27T18:57:20.293000 The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incom
CVE-2026-6785 8.1 0.07% 2 0 2026-04-27T18:57:20.293000 Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird
CVE-2026-7080 8.8 0.05% 3 0 2026-04-27T18:57:20.293000 A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts t
CVE-2026-7097 8.8 0.05% 2 0 2026-04-27T18:57:20.293000 A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the fun
CVE-2026-7096 8.8 0.29% 2 0 2026-04-27T18:57:20.293000 A security flaw has been discovered in Tenda HG3 2.0 300003070. This vulnerabili
CVE-2026-3868 0 0.09% 2 0 2026-04-27T18:57:20.293000 An improper handling of the length parameter inconsistency vulnerability has bee
CVE-2026-7056 8.8 0.09% 1 0 2026-04-27T18:57:20.293000 A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fro
CVE-2026-7057 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A flaw has been found in Tenda F456 1.0.0.5. The affected element is an unknown
CVE-2026-7035 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A vulnerability was determined in Tenda FH1202 1.2.0.14. This affects the functi
CVE-2026-7029 8.8 0.05% 1 0 2026-04-27T18:57:20.293000 A weakness has been identified in Tenda F456 1.0.0.5. The impacted element is th
CVE-2026-7026 4.5 0.04% 1 0 2026-04-27T18:57:20.293000 A vulnerability was determined in D-Link DGS-3420 1.50.018. This issue affects s
CVE-2026-6988 8.8 0.05% 2 0 2026-04-27T18:57:20.293000 A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue
CVE-2026-41328 9.1 0.08% 2 0 2026-04-27T18:57:20.293000 Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulner
CVE-2026-41248 9.1 0.09% 2 0 2026-04-27T18:57:20.293000 Clerk JavaScript is the official JavaScript repository for Clerk authentication.
CVE-2026-42171 7.8 0.01% 1 0 2026-04-27T18:57:20.293000 NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the
CVE-2026-41478 9.9 0.03% 1 0 2026-04-27T18:57:20.293000 Saltcorn is an extensible, open source, no-code database application builder. Pr
CVE-2026-41477 7.8 0.01% 1 0 2026-04-27T18:57:20.293000 Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlie
CVE-2026-22337 9.8 0.04% 2 0 2026-04-27T18:37:59.213000 Incorrect Privilege Assignment vulnerability in Directorist Directorist Social L
CVE-2026-42379 7.7 0.03% 2 0 2026-04-27T18:37:59.213000 Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper T
CVE-2026-7122 9.8 0.00% 2 0 2026-04-27T18:36:42.937000 A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This imp
CVE-2026-7136 9.8 0.00% 2 0 2026-04-27T18:35:53.583000 A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. Affected
CVE-2026-31673 7.8 0.02% 2 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: af_unix: re
CVE-2026-31682 9.1 0.03% 2 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: bridge: br_
CVE-2026-31680 7.8 0.02% 2 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: net: ipv6:
CVE-2026-31678 7.8 0.02% 2 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: openvswitch
CVE-2026-31676 7.5 0.02% 2 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: rxrpc: only
CVE-2026-31675 7.8 0.02% 2 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: net/sched:
CVE-2026-31685 9.4 0.02% 2 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: netfilter:
CVE-2026-31683 7.8 0.02% 2 0 2026-04-27T18:32:22.917000 In the Linux kernel, the following vulnerability has been resolved: batman-adv:
CVE-2026-38934 8.8 0.00% 4 1 2026-04-27T18:32:15 Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.
CVE-2026-7140 9.8 0.00% 4 0 2026-04-27T18:32:15 A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted
CVE-2026-7139 9.8 0.00% 2 0 2026-04-27T18:32:15 A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affect
CVE-2026-41463 8.8 0.00% 2 0 2026-04-27T18:32:15 ProjeQtor versions 7.0 through 12.4.3 contain a ZipSlip path traversal vulnerabi
CVE-2026-7138 9.8 0.00% 2 0 2026-04-27T18:32:15 A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulne
CVE-2026-7137 9.8 0.00% 2 0 2026-04-27T18:32:15 A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b202005
CVE-2025-69689 8.8 0.00% 2 0 2026-04-27T18:32:09 The Fan Control application V251 contains an improper privilege handling vulnera
CVE-2026-30352 9.8 0.00% 2 0 2026-04-27T18:32:07 A remote code execution (RCE) vulnerability in the /devserver/start endpoint of
CVE-2026-41462 9.8 0.00% 2 0 2026-04-27T18:32:07 ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection v
CVE-2026-33454 9.4 0.02% 2 0 2026-04-27T18:32:06 The Camel-Mail component is vulnerable to Camel message header injection. The cu
CVE-2026-40022 8.2 0.04% 2 0 2026-04-27T18:32:06 When authentication is enabled on the Apache Camel embedded HTTP server or embed
CVE-2026-41635 9.8 0.05% 2 0 2026-04-27T18:32:05 Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them
CVE-2026-40860 9.8 0.30% 2 0 2026-04-27T18:32:05 JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding clas
CVE-2026-40453 10.0 0.06% 2 0 2026-04-27T18:32:05 The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy
CVE-2026-40048 7.8 0.07% 2 0 2026-04-27T18:32:05 The Camel-PQC FileBasedKeyLifecycleManager class deserializes the contents of `<
CVE-2026-41066 7.5 0.03% 1 0 2026-04-27T17:59:05.297000 lxml is a library for processing XML and HTML in the Python language. Prior to 6
CVE-2026-28950 6.2 0.01% 1 0 2026-04-27T17:07:44.363000 A logging issue was addressed with improved data redaction. This issue is fixed
CVE-2026-40897 8.8 0.05% 1 0 2026-04-27T16:43:12 ### Impact This security vulnerability allowed executing arbitrary JavaScript vi
CVE-2026-41176 None 2.79% 1 0 template 2026-04-27T16:23:08 ### Summary The RC endpoint `options/set` is exposed without `AuthRequired: true
CVE-2026-41433 8.4 0.02% 1 0 2026-04-27T16:19:42 ### Summary A flaw in the Java agent injection path allows a local attacker con
CVE-2026-41428 9.1 0.06% 1 0 2026-04-27T16:19:35 ### Summary The `authenticated` middleware uses unanchored regular expressions
CVE-2026-33453 10.0 0.55% 2 1 2026-04-27T15:31:59 Improperly Controlled Modification of Dynamically-Determined Object Attributes v
CVE-2026-7124 9.8 0.00% 2 0 2026-04-27T15:31:01 A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Affected
CVE-2026-7123 9.8 0.00% 2 0 2026-04-27T15:31:00 A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. Affected is t
CVE-2026-7125 9.8 0.00% 2 0 2026-04-27T15:31:00 A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected
CVE-2026-40473 8.8 0.08% 4 1 2026-04-27T15:30:52 The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter
CVE-2026-41208 8.8 0.23% 1 0 2026-04-27T15:14:22.080000 Paperclip is a Node.js server and React UI that orchestrates a team of AI agents
CVE-2026-25660 9.8 0.05% 1 0 2026-04-27T14:48:20.843000 CodeChecker is an analyzer tooling, defect database and viewer extension for the
CVE-2026-5943 7.8 0.01% 2 0 2026-04-27T12:30:49 Document structural anomalies caused inconsistencies between page element relati
CVE-2026-7121 9.8 0.00% 2 0 2026-04-27T12:30:49 A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the
CVE-2026-7119 8.8 0.00% 2 0 2026-04-27T12:30:49 A vulnerability was detected in Tenda HG3 2.0. The impacted element is an unknow
CVE-2026-5941 7.8 0.02% 2 0 2026-04-27T12:30:45 Parsing logic flaws cause non-signature data to be misidentified as valid signat
CVE-2026-22336 9.3 0.03% 2 0 2026-04-27T12:30:44 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-7101 8.8 0.05% 2 0 2026-04-27T09:34:46 A vulnerability has been found in Tenda F456 1.0.0.5. This affects the function
CVE-2026-7100 8.8 0.05% 2 0 2026-04-27T09:34:40 A flaw has been found in Tenda F456 1.0.0.5. The impacted element is the functio
CVE-2026-7099 8.8 0.05% 2 0 2026-04-27T09:34:40 A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the
CVE-2026-7098 8.8 0.05% 2 0 2026-04-27T09:34:40 A security vulnerability has been detected in Tenda F456 1.0.0.5. Impacted is th
CVE-2026-7081 8.8 0.05% 3 0 2026-04-27T06:31:33 A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fro
CVE-2026-7082 8.8 0.05% 2 0 2026-04-27T06:31:33 A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is t
CVE-2026-7079 8.8 0.05% 1 0 2026-04-27T03:30:34 A weakness has been identified in Tenda F456 1.0.0.5. This affects the function
CVE-2026-7078 8.8 0.05% 1 0 2026-04-27T03:30:34 A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element
CVE-2026-7106 8.8 0.05% 1 0 2026-04-27T03:30:34 The Highland Software Custom Role Manager plugin for WordPress is vulnerable to
CVE-2026-7069 8.0 0.03% 1 0 2026-04-27T00:30:33 A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impact
CVE-2026-7068 8.8 0.03% 1 0 2026-04-27T00:30:33 A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the funct
CVE-2026-7055 8.8 0.05% 1 0 2026-04-27T00:30:33 A security vulnerability has been detected in Tenda F456 1.0.0.5. This issue aff
CVE-2026-7054 8.8 0.05% 1 0 2026-04-27T00:30:33 A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects
CVE-2026-7053 8.8 0.05% 1 0 2026-04-27T00:30:33 A security flaw has been discovered in Tenda F456 1.0.0.5. This affects the func
CVE-2026-33277 8.8 0.23% 2 0 2026-04-27T00:30:28 An OS command Injection issue exists in LogonTracer prior to v2.0.0. An arbitrar
CVE-2026-42363 9.3 0.03% 2 0 2026-04-27T00:30:27 An insufficient encryption vulnerability exists in the Device Authentication fun
CVE-2026-6786 8.1 0.06% 2 0 2026-04-26T21:30:30 Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox
CVE-2026-7039 7.8 0.06% 1 0 2026-04-26T15:30:27 A security vulnerability has been detected in tufantunc ssh-mcp up to 1.5.0. The
CVE-2026-7037 9.8 0.89% 2 0 2026-04-26T12:31:47 A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. Thi
CVE-2026-7034 8.8 0.05% 1 0 2026-04-26T12:31:47 A vulnerability was found in Tenda FH1202 1.2.0.14(408). Affected by this issue
CVE-2026-7033 8.8 0.05% 1 0 2026-04-26T12:31:47 A vulnerability has been found in Tenda F456 1.0.0.5. Affected by this vulnerabi
CVE-2026-7032 8.8 0.05% 1 0 2026-04-26T12:31:47 A flaw has been found in Tenda F456 1.0.0.5. Affected is the function SafeEmailF
CVE-2026-7031 8.8 0.05% 2 0 2026-04-26T12:31:47 A vulnerability was detected in Tenda F456 1.0.0.5. This impacts the function fr
CVE-2026-7030 8.8 0.05% 1 0 2026-04-26T12:31:36 A security vulnerability has been detected in Tenda F456 1.0.0.5. This affects t
CVE-2026-7028 4.7 0.01% 1 1 2026-04-26T09:32:42 A security flaw has been discovered in CodeAstro Online Job Portal 1.0. The affe
CVE-2026-7019 8.8 0.05% 2 0 2026-04-26T06:31:22 A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is th
CVE-2026-42255 7.2 0.03% 1 0 2026-04-26T06:31:21 Technitium DNS Server before 15.0 allows DNS traffic amplification via cyclic na
CVE-2026-7015 2.4 0.03% 1 0 2026-04-26T03:30:26 A vulnerability has been found in MaxSite CMS up to 109.3. This issue affects so
CVE-2026-6992 7.2 0.12% 1 0 2026-04-25T18:33:03 A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the
CVE-2026-6951 9.8 0.08% 3 0 2026-04-25T06:30:30 Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code E
CVE-2025-50229 9.8 0.03% 1 0 2026-04-24T21:33:02 Jizhicms v2.5.4 is vulnerable to SQL injection in the product editing module.
CVE-2024-7399 8.8 82.26% 3 1 template 2026-04-24T21:33:00 Improper limitation of a pathname to a restricted directory vulnerability in Sam
CVE-2026-41472 None 0.67% 1 0 2026-04-24T21:32:03 CyberPanel versions prior to 2.4.4 contain a stored cross-site scripting vulnera
CVE-2026-41044 8.8 0.10% 1 0 2026-04-24T21:32:00 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-40466 8.8 0.21% 1 0 2026-04-24T21:32:00 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-23902 8.1 0.04% 1 0 2026-04-24T21:32:00 Incorrect Authorization vulnerability in Apache DolphinScheduler allows authenti
CVE-2026-40887 9.1 5.38% 1 0 template 2026-04-24T21:10:19 ## Summary An unauthenticated SQL injection vulnerability exists in the Vendure
CVE-2026-41273 8.2 0.06% 1 0 2026-04-24T21:01:23 ### Summary Flowise contains an authentication bypass vulnerability that allows
CVE-2026-41275 7.5 0.04% 1 0 2026-04-24T21:01:15 **Summary:** The password reset functionality on [cloud.flowiseai.com](http://cl
CVE-2026-41276 9.8 0.18% 1 0 2026-04-24T21:01:10 ZDI-CAN-28762: Flowise AccountService resetPassword Authentication Bypass Vulner
CVE-2026-41277 8.8 0.12% 1 0 2026-04-24T21:01:05 ### Summary A Mass Assignment vulnerability in the DocumentStore creation endpoi
CVE-2026-41279 7.5 0.04% 1 0 2026-04-24T21:00:53 ### Summary The text-to-speech generation endpoint (`POST /api/v1/text-to-speec
CVE-2026-41265 9.8 0.13% 1 0 2026-04-24T20:58:07 ZDI-CAN-29412: FlowiseAI Flowise Airtable_Agent Code Injection Remote Code Execu
CVE-2026-41266 7.5 0.04% 1 0 2026-04-24T20:58:07 ### Summary `/api/v1/public-chatbotConfig/:id `ep exposes sensitive data includ
CVE-2026-41180 7.5 0.03% 1 0 2026-04-24T20:52:12 ### Summary The upload PATCH flow under `/files/:uploadId` validates the mounte
CVE-2026-41137 8.8 0.28% 1 0 2026-04-24T20:44:06 ### Summary The CSVAgent allows providing a custom Pandas CSV read code. Due to
CVE-2024-57728 7.2 50.59% 3 0 2026-04-24T19:27:00.700000 SimpleHelp remote support software v5.5.7 and before allows admin users to uploa
CVE-2026-39920 9.8 0.20% 2 0 2026-04-24T18:31:18 BridgeHead FileStore versions prior to 24A (released in early 2024) expose the A
CVE-2025-29635 8.8 58.94% 4 0 2026-04-24T18:30:36 A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an
CVE-2024-57726 8.8 49.10% 3 0 2026-04-24T18:30:36 SimpleHelp remote support software v5.5.7 and before has a vulnerability that al
CVE-2026-6912 8.8 0.15% 2 0 2026-04-24T17:56:41.280000 Improperly controlled modification of dynamically-determined object attributes i
CVE-2026-41271 8.3 0.06% 1 0 2026-04-24T16:37:54.877000 Flowise is a drag & drop user interface to build a customized large language mod
CVE-2026-41278 7.5 0.03% 1 0 2026-04-24T16:31:51.023000 Flowise is a drag & drop user interface to build a customized large language mod
CVE-2026-33524 7.5 0.04% 1 0 2026-04-24T16:25:17 ## Summary ### Unbounded Memory Allocation (all platforms) A crafted payload a
CVE-2026-41492 9.8 0.06% 2 0 2026-04-24T16:15:29 ### Summary Dgraph `v25.3.2` still exposes the process command line through the
CVE-2026-41327 9.1 0.03% 3 0 2026-04-24T15:41:25 ## 1. Executive Summary A vulnerability has been found in Dgraph that gives an
CVE-2026-21728 7.5 0.01% 1 0 2026-04-24T15:33:39 Tempo queries with large limits can cause large memory allocations which can imp
CVE-2026-6919 9.7 0.11% 2 0 2026-04-24T15:33:34 Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a re
CVE-2026-21515 10.0 0.08% 2 0 2026-04-24T15:32:39 Exposure of sensitive information to an unauthorized actor in Azure IOT Central
CVE-2026-5367 8.6 0.03% 1 0 2026-04-24T15:32:39 A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending cr
CVE-2026-41264 9.8 0.22% 1 0 2026-04-24T15:15:17.923000 Flowise is a drag & drop user interface to build a customized large language mod
CVE-2026-33694 0 0.01% 1 0 2026-04-24T14:50:56.203000 This vulnerability allows an attacker to create a junction, enabling the deletio
CVE-2026-27841 8.1 0.01% 1 0 2026-04-24T14:39:56.310000 A vulnerability in SenseLive X3050's web management interface allows state-chang
CVE-2026-27843 9.1 0.07% 1 0 2026-04-24T14:39:56.310000 A vulnerability exists in SenseLive X3050's web management interface that allows
CVE-2026-1950 9.8 0.04% 1 0 2026-04-24T14:39:28.770000 Delta Electronics AS320T has No checking of the length of the buffer with the f
CVE-2026-1952 9.8 0.04% 1 0 2026-04-24T09:30:36 Delta Electronics AS320T has denial of service via the undocumented subfunction 
CVE-2026-35064 7.5 0.05% 1 0 2026-04-24T00:32:04 A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated
CVE-2026-39462 8.1 0.04% 1 0 2026-04-24T00:32:04 A vulnerability exists in SenseLive X3050’s web management interface in which pa
CVE-2026-35503 9.8 0.06% 1 0 2026-04-24T00:32:04 A vulnerability in SenseLive X3050’s web management interface allows authenticat
CVE-2026-40630 9.8 0.09% 1 0 2026-04-24T00:32:04 A vulnerability in  SenseLive X3050’s web management interface allows unauthor
CVE-2026-25775 9.8 0.07% 1 0 2026-04-24T00:32:03 A vulnerability in SenseLive X3050’s remote management service allows firmware r
CVE-2026-40623 8.1 0.03% 1 0 2026-04-24T00:32:03 A vulnerability in SenseLive X3050's web management interface allows critical sy
CVE-2026-40620 9.8 0.07% 1 0 2026-04-24T00:32:03 A vulnerability in SenseLive X3050’s embedded management service allows full adm
CVE-2026-33819 10.0 0.27% 1 0 2026-04-24T00:31:58 Deserialization of untrusted data in Microsoft Bing allows an unauthorized attac
CVE-2026-24303 9.6 0.04% 1 0 2026-04-24T00:31:58 Improper access control in Microsoft Partner Center allows an authorized attacke
CVE-2026-26150 8.6 0.06% 1 0 2026-04-24T00:31:58 Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized a
CVE-2026-32613 9.9 0.08% 1 1 2026-04-23T18:30:37.510000 Spinnaker is an open source, multi-cloud continuous delivery platform. Echo like
CVE-2026-41179 None 5.98% 1 0 template 2026-04-23T10:52:57 ### Summary The RC endpoint `operations/fsinfo` is exposed without `AuthRequired
CVE-2026-22007 2.9 0.02% 1 0 2026-04-22T15:31:39 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Ente
CVE-2026-6770 6.5 0.06% 3 0 2026-04-22T15:07:23.650000 Other issue in the Storage: IndexedDB component. This vulnerability was fixed in
CVE-2026-6799 6.3 1.41% 1 0 2026-04-22T00:31:48 A security flaw has been discovered in Comfast CF-N1-S 2.6.0.1. Affected by this
CVE-2026-38834 7.3 5.28% 1 0 2026-04-21T21:32:31 Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerabili
CVE-2026-3298 None 0.07% 1 0 2026-04-21T21:31:23 The method "sock_recvfrom_into()" of "asyncio.ProacterEventLoop" (Windows only)
CVE-2026-40050 9.8 0.32% 2 0 2026-04-21T18:32:04 CrowdStrike has released security updates to address a critical unauthenticated
CVE-2026-21571 None 1.17% 1 0 2026-04-21T18:32:04 This Critical severity OS Command Injection vulnerability was introduced in vers
CVE-2019-25714 None 0.78% 1 0 2026-04-21T18:32:04 Seeyon OA A8 contains an unauthenticated arbitrary file write vulnerability in t
CVE-2026-5752 9.4 0.02% 1 0 2026-04-21T15:33:24 Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with r
CVE-2026-33626 7.5 0.04% 4 0 2026-04-21T15:04:13 ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in LMDeplo
CVE-2025-48700 6.1 18.76% 1 0 2026-04-21T13:00:03.373000 An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 an
CVE-2026-5965 9.8 8.66% 1 0 2026-04-21T06:30:32 NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, allowi
CVE-2026-20133 6.5 1.20% 1 0 2026-04-20T21:32:43 A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated,
CVE-2026-34197 8.8 65.07% 1 9 template 2026-04-16T19:59:38.107000 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-32202 4.3 0.09% 2 0 2026-04-14T18:30:51 Protection mechanism failure in Windows Shell allows an unauthorized attacker to
CVE-2026-34478 None 0.15% 1 0 2026-04-14T00:13:31 Apache Log4j Core's [`Rfc5424Layout`](https://logging.apache.org/log4j/2.x/manua
CVE-2026-34479 None 0.16% 1 0 2026-04-14T00:11:01 The `Log4j1XmlLayout` from the Apache Log4j 1-to-Log4j 2 bridge fails to escape
CVE-2026-34480 None 0.15% 1 0 2026-04-13T23:57:23 Apache Log4j Core's [`XmlLayout`](https://logging.apache.org/log4j/2.x/manual/la
CVE-2026-21643 9.8 43.14% 1 2 template 2026-04-13T18:31:39 An improper neutralization of special elements used in an sql command ('sql inje
CVE-2026-34477 0 0.14% 1 0 2026-04-13T15:02:06.187000 The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68
CVE-2026-35414 4.2 0.02% 1 0 2026-04-02T18:31:50 OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon
CVE-2026-4747 8.8 0.09% 2 2 2026-04-01T15:30:57 Each RPCSEC_GSS data packet is validated by a routine which checks a signature i
CVE-2026-27966 9.8 0.14% 1 1 2026-02-27T15:47:29 # 1. Summary The CSV Agent node in Langflow hardcodes `allow_dangerous_code=Tr
CVE-2026-2526 6.3 0.38% 2 0 2026-02-18T21:31:21 A vulnerability was found in Wavlink WL-WN579A3 up to 20210219. This impacts the
CVE-2026-25253 8.8 0.09% 1 11 2026-02-02T23:41:06 ## Summary The Control UI trusts `gatewayUrl` from the query string without val
CVE-2025-20362 6.5 43.64% 1 0 template 2025-11-06T14:51:19.950000 Update: On November 5, 2025, Cisco became aware of a new attack variant against
CVE-2025-20333 10.0 24.78% 1 0 2025-10-22T00:33:24 A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security
CVE-2025-59532 None 0.05% 1 1 2025-09-22T22:00:37 Due to a bug in the sandbox configuration logic, Codex CLI could treat a model-g
CVE-2025-27636 None 35.52% 3 3 2025-03-25T18:38:11 Bypass/Injection vulnerability in Apache Camel components under particular condi
CVE-2024-52046 9.8 80.14% 3 0 2025-02-11T19:03:55 The `ObjectSerializationDecoder` in Apache MINA uses Java’s native deserializati
CVE-2023-20185 7.4 0.17% 1 0 2024-02-03T05:06:20 A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco
CVE-2022-25912 8.1 43.31% 1 0 2023-08-17T05:02:31 The package simple-git before 3.15.0 is vulnerable to Remote Code Execution (RCE
CVE-2026-25262 0 0.00% 2 0 N/A
CVE-2026-7040 0 0.00% 2 0 N/A
CVE-2026-41651 0 0.22% 7 5 N/A
CVE-2026-24467 0 0.90% 1 0 N/A
CVE-2026-6911 0 0.05% 3 0 N/A
CVE-2026-31952 0 0.06% 1 0 N/A
CVE-2026-41429 0 0.02% 1 0 N/A
CVE-2026-33662 0 0.07% 2 0 N/A
CVE-2026-33666 0 0.04% 2 0 N/A
CVE-2026-41421 0 0.03% 2 0 N/A

CVE-2026-7160
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-27T22:16:18.690000

2 posts

A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed from remote. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-27T22:37:48.000Z ##

🟠 CVE-2026-7160 - High (8.8)

A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed fro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T22:37:48.000Z ##

🟠 CVE-2026-7160 - High (8.8)

A vulnerability was determined in Tenda HG3 2.0. This vulnerability affects the function formTracert of the file /boaform/formTracert. Executing a manipulation of the argument datasize can lead to command injection. The attack may be performed fro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7155
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T21:31:12

2 posts

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-27T21:28:13.000Z ##

🔴 CVE-2026-7155 - Critical (9.8)

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:28:13.000Z ##

🔴 CVE-2026-7155 - Critical (9.8)

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setLoginPasswordCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument admpass leads to os c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7154
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T21:31:12

2 posts

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument tty_server can lead to os command injection. The attack can be launched remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T21:18:02.000Z ##

🔴 CVE-2026-7154 - Critical (9.8)

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument tty_server can lead to os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:18:02.000Z ##

🔴 CVE-2026-7154 - Critical (9.8)

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setAdvancedInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument tty_server can lead to os...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7151
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-27T21:31:12

2 posts

A vulnerability was determined in Tenda HG3 2.0. Impacted is the function formUploadConfig of the file /boaform/formIPv6Routing. This manipulation of the argument destNet causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-27T21:00:40.000Z ##

🟠 CVE-2026-7151 - High (8.8)

A vulnerability was determined in Tenda HG3 2.0. Impacted is the function formUploadConfig of the file /boaform/formIPv6Routing. This manipulation of the argument destNet causes stack-based buffer overflow. It is possible to initiate the attack re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:00:40.000Z ##

🟠 CVE-2026-7151 - High (8.8)

A vulnerability was determined in Tenda HG3 2.0. Impacted is the function formUploadConfig of the file /boaform/formIPv6Routing. This manipulation of the argument destNet causes stack-based buffer overflow. It is possible to initiate the attack re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7153
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T21:31:12

2 posts

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sys_info results in os command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T21:00:05.000Z ##

🔴 CVE-2026-7153 - Critical (9.8)

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sys_in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:00:05.000Z ##

🔴 CVE-2026-7153 - Critical (9.8)

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setMiniuiHomeInfoShow of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument sys_in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7152
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T21:31:12

2 posts

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument telnet_enabled leads to os command injection. It is possible to launch the attack remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-04-27T20:59:56.000Z ##

🔴 CVE-2026-7152 - Critical (9.8)

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument telnet_enabled leads to os c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T20:59:56.000Z ##

🔴 CVE-2026-7152 - Critical (9.8)

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setTelnetCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument telnet_enabled leads to os c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6741
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-27T21:31:11

2 posts

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 5.4.1. This is due to a missing authorization check in the execute() method of the connect-customer-to-wp-user ability, which only requires the customer__edit capability granted to the latepoint_agent role by default, without verifying wheth

thehackerwire@mastodon.social at 2026-04-27T21:00:16.000Z ##

🟠 CVE-2026-6741 - High (8.8)

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 5.4.1. This is due to a missing authorization check in the execute() method of the con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:00:16.000Z ##

🟠 CVE-2026-6741 - High (8.8)

The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 5.4.1. This is due to a missing authorization check in the execute() method of the con...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30350
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-27T21:31:02

2 posts

An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

thehackerwire@mastodon.social at 2026-04-27T22:01:02.000Z ##

🟠 CVE-2026-30350 - High (7.5)

An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T22:01:02.000Z ##

🟠 CVE-2026-30350 - High (7.5)

An issue in the /store/items/search endpoint of Agent Protocol server commit e9a89f allows attackers to cause a Denial of Service (DoS) via a crafted POST request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7156
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T21:16:44

4 posts

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.

offseq at 2026-04-27T23:00:33.557Z ##

🚨 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) is vulnerable to OS command injection (CVE-2026-7156, CVSS 9.3). Exploit is public — remote attackers can fully compromise devices. Disable remote mgmt & restrict access now. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-27T21:17:53.000Z ##

🔴 CVE-2026-7156 - Critical (9.8)

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-27T23:00:33.000Z ##

🚨 CRITICAL: Totolink A8000RU (7.1cu.643_b20200521) is vulnerable to OS command injection (CVE-2026-7156, CVSS 9.3). Exploit is public — remote attackers can fully compromise devices. Disable remote mgmt & restrict access now. radar.offseq.com/threat/cve-20 #OffSeq #CVE20267156 #IoTSecurity

##

thehackerwire@mastodon.social at 2026-04-27T21:17:53.000Z ##

🔴 CVE-2026-7156 - Critical (9.8)

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument HTTP results in os command injection. The att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42039
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-27T19:50:46.320000

2 posts

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a RangeError. This vulnerability is fixed in 1.15.1 and 0.31.1.

thehackerwire@mastodon.social at 2026-04-27T23:06:11.000Z ##

🟠 CVE-2026-42039 - High (7.5)

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a Range...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T23:06:11.000Z ##

🟠 CVE-2026-42039 - High (7.5)

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.1 and 0.31.1, toFormData recursively walks nested objects with no depth limit, so a deeply nested value passed as request data crashes the Node.js process with a Range...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30351
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-27T19:18:46.690000

2 posts

A path traversal vulnerability in the UI/static component of leonvanzyl autocoder commit 79d02a allows attackers to read arbitrary files via sending crafted URL path containing traversal sequences.

thehackerwire@mastodon.social at 2026-04-27T16:25:13.000Z ##

🟠 CVE-2026-30351 - High (7.5)

A path traversal vulnerability in the UI/static component of leonvanzyl autocoder commit 79d02a allows attackers to read arbitrary files via sending crafted URL path containing traversal sequences.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:25:13.000Z ##

🟠 CVE-2026-30351 - High (7.5)

A path traversal vulnerability in the UI/static component of leonvanzyl autocoder commit 79d02a allows attackers to read arbitrary files via sending crafted URL path containing traversal sequences.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41419
(7.6 HIGH)

EPSS: 0.03%

updated 2026-04-27T19:10:45.587000

1 posts

4ga Boards is a boards system for realtime project management. Prior to 3.3.5, a path traversal vulnerability allows an authenticated user with board import privileges to make the server ingest arbitrary host files as board attachments during BOARDS archive import. Once imported, the file can be downloaded through the normal application interface, resulting in unauthorized local file disclosure. T

thehackerwire@mastodon.social at 2026-04-24T19:41:12.000Z ##

🟠 CVE-2026-41419 - High (7.6)

4ga Boards is a boards system for realtime project management. Prior to 3.3.5, a path traversal vulnerability allows an authenticated user with board import privileges to make the server ingest arbitrary host files as board attachments during BOAR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40858
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-27T18:57:20.293000

4 posts

The camel-infinispan component's ProtoStream-based remote aggregation repository deserializes data read from a remote Infinispan cache using java.io.ObjectInputStream without applying any ObjectInputFilter. An attacker who can write to the Infinispan cache used by a Camel application can inject a crafted serialized Java object that, when read during normal aggregation repository operations such as

1 repos

https://github.com/dinosn/apache-camel

thehackerwire@mastodon.social at 2026-04-27T16:01:03.000Z ##

🟠 CVE-2026-40858 - High (8.8)

The camel-infinispan component's ProtoStream-based remote aggregation repository deserializes data read from a remote Infinispan cache using java.io.ObjectInputStream without applying any ObjectInputFilter. An attacker who can write to the Infinis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-27T10:30:27.817Z ##

🔴 CRITICAL: CVE-2026-40858 in Apache Camel's camel-infinispan lets attackers with cache write access trigger arbitrary code execution. Patch to 4.20.0/4.14.7/4.18.2 ASAP! More info: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-27T16:01:03.000Z ##

🟠 CVE-2026-40858 - High (8.8)

The camel-infinispan component's ProtoStream-based remote aggregation repository deserializes data read from a remote Infinispan cache using java.io.ObjectInputStream without applying any ObjectInputFilter. An attacker who can write to the Infinis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-27T10:30:27.000Z ##

🔴 CRITICAL: CVE-2026-40858 in Apache Camel's camel-infinispan lets attackers with cache write access trigger arbitrary code execution. Patch to 4.20.0/4.14.7/4.18.2 ASAP! More info: radar.offseq.com/threat/cve-20 #OffSeq #ApacheCamel #Infosec #CVE2026_40858

##

CVE-2026-5940
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

2 posts

Calling a function that triggers a UI refresh after removing comments via a script may access an invalidated object, leading to program crashes.

thehackerwire@mastodon.social at 2026-04-27T15:00:42.000Z ##

🟠 CVE-2026-5940 - High (7.8)

Calling a function that triggers a UI refresh after removing comments via a script may access an invalidated object, leading to program crashes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T15:00:42.000Z ##

🟠 CVE-2026-5940 - High (7.8)

Calling a function that triggers a UI refresh after removing comments via a script may access an invalidated object, leading to program crashes.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32688
(0 None)

EPSS: 0.00%

updated 2026-04-27T18:57:20.293000

1 posts

Allocation of Resources Without Limits or Throttling vulnerability in elixir-plug plug_cowboy allows unauthenticated remote denial of service via atom table exhaustion. Plug.Cowboy.Conn.conn/1 in lib/plug/cowboy/conn.ex calls String.to_atom/1 on the value returned by :cowboy_req.scheme/1. For HTTP/2 connections, cowlib passes the client-supplied :scheme pseudo-header value through verbatim withou

tylerayoung@fosstodon.org at 2026-04-27T13:57:29.000Z ##

If you're using plug_cowboy, update to the newly-released v2.8.1 to patch a denial-of-service vulnerability related to atom exhaustion.

cna.erlef.org/cves/CVE-2026-32

#ElixirLang

##

CVE-2026-41409
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

2 posts

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed. Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, and 2.2.0 <= 2.2.5. The problem is resolved in Apache MINA 2.0.28, 2.1.

thehackerwire@mastodon.social at 2026-04-27T10:29:10.000Z ##

🔴 CVE-2026-41409 - Critical (9.8)

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T10:29:10.000Z ##

🔴 CVE-2026-41409 - Critical (9.8)

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6785
(8.1 HIGH)

EPSS: 0.07%

updated 2026-04-27T18:57:20.293000

2 posts

Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150, Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird 150, and Thunderbird

Matchbook3469@mastodon.social at 2026-04-27T09:05:21.000Z ##

🟠 New security advisory:

CVE-2026-6785 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-04-26T20:06:45.000Z ##

🟠 CVE-2026-6785 - High (8.1)

Memory safety bugs present in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7080
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

3 posts

A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. Such manipulation of the argument delno leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

offseq at 2026-04-27T09:00:29.764Z ##

⚠️ HIGH severity: Tenda F456 (v1.0.0.5) buffer overflow in httpd's fromPPTPUserSetting (CVE-2026-7080) enables remote code execution or DoS. No patch yet — restrict device exposure & monitor for updates. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-27T09:00:29.000Z ##

⚠️ HIGH severity: Tenda F456 (v1.0.0.5) buffer overflow in httpd's fromPPTPUserSetting (CVE-2026-7080) enables remote code execution or DoS. No patch yet — restrict device exposure & monitor for updates. Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE20267080

##

thehackerwire@mastodon.social at 2026-04-27T03:30:32.000Z ##

🟠 CVE-2026-7080 - High (8.8)

A security vulnerability has been detected in Tenda F456 1.0.0.5. This impacts the function fromPPTPUserSetting of the file /goform/PPTPUserSetting of the component httpd. Such manipulation of the argument delno leads to buffer overflow. The attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7097
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

2 posts

A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T08:27:53.000Z ##

🟠 CVE-2026-7097 - High (8.8)

A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T08:27:53.000Z ##

🟠 CVE-2026-7097 - High (8.8)

A weakness has been identified in Tenda F456 1.0.0.5. This issue affects the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter of the component httpd. This manipulation of the argument page causes buffer overflow. The atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7096
(8.8 HIGH)

EPSS: 0.29%

updated 2026-04-27T18:57:20.293000

2 posts

A security flaw has been discovered in Tenda HG3 2.0 300003070. This vulnerability affects the function formgponConf of the file /boaform/admin/formgponConf. The manipulation of the argument fmgpon_loid results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T08:27:43.000Z ##

🟠 CVE-2026-7096 - High (8.8)

A security flaw has been discovered in Tenda HG3 2.0 300003070. This vulnerability affects the function formgponConf of the file /boaform/admin/formgponConf. The manipulation of the argument fmgpon_loid results in os command injection. It is possi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T08:27:43.000Z ##

🟠 CVE-2026-7096 - High (8.8)

A security flaw has been discovered in Tenda HG3 2.0 300003070. This vulnerability affects the function formgponConf of the file /boaform/admin/formgponConf. The manipulation of the argument fmgpon_loid results in os command injection. It is possi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3868
(0 None)

EPSS: 0.09%

updated 2026-04-27T18:57:20.293000

2 posts

An improper handling of the length parameter inconsistency vulnerability has been identified in Moxa’s Secure Router. Because of improper validation of length parameters in the HTTPS management interface, an unauthenticated remote attacker could send specially crafted requests that trigger a buffer overflow condition, causing the web service to become unresponsive. Successful exploitation may resu

offseq at 2026-04-27T07:30:27.833Z ##

⚠️ HIGH severity: CVE-2026-3868 affects Moxa EDR-8010 v1.0 routers. Remote attackers can trigger a DoS via HTTPS mgmt interface buffer overflow. No patch yet — restrict access & monitor for outages. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-27T07:30:27.000Z ##

⚠️ HIGH severity: CVE-2026-3868 affects Moxa EDR-8010 v1.0 routers. Remote attackers can trigger a DoS via HTTPS mgmt interface buffer overflow. No patch yet — restrict access & monitor for outages. radar.offseq.com/threat/cve-20 #OffSeq #Moxa #Infosec #ICS

##

CVE-2026-7056
(8.8 HIGH)

EPSS: 0.09%

updated 2026-04-27T18:57:20.293000

1 posts

A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be performed from remote. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-26T23:00:28.000Z ##

🟠 CVE-2026-7056 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. Impacted is the function fromSafeUrlFilter of the file /goform/SafeUrlFilter of the component httpd. The manipulation of the argument page results in buffer overflow. The attack may be performed ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7057
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A flaw has been found in Tenda F456 1.0.0.5. The affected element is an unknown function of the file /goform/setcfm of the component httpd. This manipulation of the argument funcname/funcpara1 causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-26T22:59:47.000Z ##

🟠 CVE-2026-7057 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. The affected element is an unknown function of the file /goform/setcfm of the component httpd. This manipulation of the argument funcname/funcpara1 causes buffer overflow. It is possible to initiate the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7035
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A vulnerability was determined in Tenda FH1202 1.2.0.14. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. Executing a manipulation of the argument Go can lead to stack-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-26T12:32:02.000Z ##

🟠 CVE-2026-7035 - High (8.8)

A vulnerability was determined in Tenda FH1202 1.2.0.14. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. Executing a manipulation of the argument Go can lead to stack-based buffer overflow. The a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7029
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

1 posts

A weakness has been identified in Tenda F456 1.0.0.5. The impacted element is the function fromaddressNat of the file /goform/addressNat. Executing a manipulation of the argument menufacturer/Go can lead to buffer overflow. The attack may be performed from remote. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-26T09:59:48.000Z ##

🟠 CVE-2026-7029 - High (8.8)

A weakness has been identified in Tenda F456 1.0.0.5. The impacted element is the function fromaddressNat of the file /goform/addressNat. Executing a manipulation of the argument menufacturer/Go can lead to buffer overflow. The attack may be perfo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7026
(4.5 MEDIUM)

EPSS: 0.04%

updated 2026-04-27T18:57:20.293000

1 posts

A vulnerability was determined in D-Link DGS-3420 1.50.018. This issue affects some unknown processing of the component System Information Settings Page. This manipulation of the argument System Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized.

offseq@infosec.exchange at 2026-04-26T07:30:27.000Z ##

MEDIUM severity alert: CVE-2026-7026 in D-Link DGS-3420 v1.50.018 allows remote XSS via System Info Settings Page. Exploit is public. Assess your devices and monitor for abuse. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #XSS

##

CVE-2026-6988
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T18:57:20.293000

2 posts

A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue affects the function formRoute of the file /boaform/formRouting of the component Boa Service. This manipulation of the argument nextHop causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-04-26T01:30:27.000Z ##

⚠️ HIGH severity: Tenda HG10 (HG7_HG9_HG10re_300001138_en_xpon) buffer overflow via Boa Service (formRoute). Remote RCE/DoS risk. Exploit public, patch pending. Restrict access & monitor Tenda updates. CVE-2026-6988 radar.offseq.com/threat/cve-20 #OffSeq #IoT #Vuln

##

thehackerwire@mastodon.social at 2026-04-25T19:59:49.000Z ##

🟠 CVE-2026-6988 - High (8.8)

A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue affects the function formRoute of the file /boaform/formRouting of the component Boa Service. This manipulation of the argument nextHop causes buffer overflow. It is ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41328
(9.1 CRITICAL)

EPSS: 0.08%

updated 2026-04-27T18:57:20.293000

2 posts

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack requires two HTTP POSTs to port 8080. The first sets up a schema predicate with @unique @index(exact) @lang vi

offseq@infosec.exchange at 2026-04-25T04:30:28.000Z ##

🚨 CVE-2026-41328: CRITICAL DQL injection in dgraph-io Dgraph (<25.3.3) allows unauthenticated full DB read! Exploit via crafted POSTs to port 8080. Patch to 25.3.3+ or enable ACL to mitigate. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE202641328 #GraphQL #infosec

##

thehackerwire@mastodon.social at 2026-04-24T19:41:36.000Z ##

🔴 CVE-2026-41328 - Critical (9.1)

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41248
(9.1 CRITICAL)

EPSS: 0.09%

updated 2026-04-27T18:57:20.293000

2 posts

Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach downstream handlers. This vulnerability is fixed in @clerk/astro 1.5.7, 2.17.10, and 3.0.15; @clerk/nextjs 5.7.6, 6.39.2, and 7.2.1; @clerk/nuxt 1.13.28 and

offseq@infosec.exchange at 2026-04-25T00:00:40.000Z ##

🚨 CRITICAL: CVE-2026-41248 affects clerk astro, nextjs, nuxt — lets attackers bypass middleware in affected JS libs. Update to fixed versions ASAP to prevent unauthorized access. Patches available now. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #ClerkJS

##

thehackerwire@mastodon.social at 2026-04-24T22:00:01.000Z ##

🔴 CVE-2026-41248 - Critical (9.1)

Clerk JavaScript is the official JavaScript repository for Clerk authentication. createRouteMatcher in @clerk/nextjs, @clerk/nuxt, and @clerk/astro can be bypassed by certain crafted requests, allowing them to skip middleware gating and reach down...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42171
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

1 posts

NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the references).

thehackerwire@mastodon.social at 2026-04-24T22:59:49.000Z ##

🟠 CVE-2026-42171 - High (7.8)

NSIS (Nullsoft Scriptable Install System) 3.06.1 before 3.12 sometimes uses the Low IL temp directory when executing as SYSTEM, allowing local attackers to gain privileges (if they can cause my_GetTempFileName to return 0, as shown in the referenc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41478
(9.9 CRITICAL)

EPSS: 0.03%

updated 2026-04-27T18:57:20.293000

1 posts

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync routes allows any authenticated low-privilege user with read access to at least one table to inject arbitrary SQL through sync parameters. This can lead to full database exfiltration, including admin password hashes and confi

thehackerwire@mastodon.social at 2026-04-24T21:59:50.000Z ##

🔴 CVE-2026-41478 - Critical (9.9)

Saltcorn is an extensible, open source, no-code database application builder. Prior to 1.4.6, 1.5.6, and 1.6.0-beta.5, a SQL injection vulnerability in Saltcorn’s mobile-sync routes allows any authenticated low-privilege user with read access to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41477
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T18:57:20.293000

1 posts

Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlier, Deskflow daemon runs as SYSTEM and exposes an IPC named pipe with WorldAccessOption enabled. The daemon processes privileged commands without authentication, allowing any local unprivileged user to execute arbitrary commands as SYSTEM. Affects both stable v1.20.0 + and Continuous v1.26.0.134 prerelease.

thehackerwire@mastodon.social at 2026-04-24T20:41:18.000Z ##

🟠 CVE-2026-41477 - High (7.8)

Deskflow is a keyboard and mouse sharing app. In 1.20.0, 1.26.0.134, and earlier, Deskflow daemon runs as SYSTEM and exposes an IPC named pipe with WorldAccessOption enabled. The daemon processes privileged commands without authentication, allowi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22337
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-27T18:37:59.213000

2 posts

Incorrect Privilege Assignment vulnerability in Directorist Directorist Social Login allows Privilege Escalation.This issue affects Directorist Social Login: from n/a before 2.1.4.

thehackerwire@mastodon.social at 2026-04-27T15:23:04.000Z ##

🔴 CVE-2026-22337 - Critical (9.8)

Incorrect Privilege Assignment vulnerability in Directorist Directorist Social Login allows Privilege Escalation.This issue affects Directorist Social Login: from n/a before 2.1.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T15:23:04.000Z ##

🔴 CVE-2026-22337 - Critical (9.8)

Incorrect Privilege Assignment vulnerability in Directorist Directorist Social Login allows Privilege Escalation.This issue affects Directorist Social Login: from n/a before 2.1.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42379
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-27T18:37:59.213000

2 posts

Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper Templately allows Retrieve Embedded Sensitive Data.This issue affects Templately: from n/a through 3.6.1.

thehackerwire@mastodon.social at 2026-04-27T10:29:19.000Z ##

🟠 CVE-2026-42379 - High (7.7)

Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper Templately allows Retrieve Embedded Sensitive Data.This issue affects Templately: from n/a through 3.6.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T10:29:19.000Z ##

🟠 CVE-2026-42379 - High (7.7)

Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper Templately allows Retrieve Embedded Sensitive Data.This issue affects Templately: from n/a through 3.6.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7122
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T18:36:42.937000

2 posts

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-27T14:23:44.000Z ##

🔴 CVE-2026-7122 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. It ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T14:23:44.000Z ##

🔴 CVE-2026-7122 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. This impacts the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument enable leads to os command injection. It ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7136
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T18:35:53.583000

2 posts

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wanIdx can lead to os command injection. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T16:24:19.000Z ##

🔴 CVE-2026-7136 - Critical (9.8)

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wanIdx can lead to os ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:24:19.000Z ##

🔴 CVE-2026-7136 - Critical (9.8)

A weakness has been identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setDmzCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument wanIdx can lead to os ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31673
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-27T18:32:22.917000

2 posts

In the Linux kernel, the following vulnerability has been resolved: af_unix: read UNIX_DIAG_VFS data under unix_state_lock Exact UNIX diag lookups hold a reference to the socket, but not to u->path. Meanwhile, unix_release_sock() clears u->path under unix_state_lock() and drops the path reference after unlocking. Read the inode and device numbers for UNIX_DIAG_VFS while holding unix_state_lock(

thehackerwire@mastodon.social at 2026-04-27T23:06:00.000Z ##

🟠 CVE-2026-31673 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

af_unix: read UNIX_DIAG_VFS data under unix_state_lock

Exact UNIX diag lookups hold a reference to the socket, but not to
u->path. Meanwhile, unix_release_sock() clears u->path ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T23:06:00.000Z ##

🟠 CVE-2026-31673 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

af_unix: read UNIX_DIAG_VFS data under unix_state_lock

Exact UNIX diag lookups hold a reference to the socket, but not to
u->path. Meanwhile, unix_release_sock() clears u->path ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31682
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-27T18:32:22.917000

2 posts

In the Linux kernel, the following vulnerability has been resolved: bridge: br_nd_send: linearize skb before parsing ND options br_nd_send() parses neighbour discovery options from ns->opt[] and assumes that these options are in the linear part of request. Its callers only guarantee that the ICMPv6 header and target address are available, so the option area can still be non-linear. Parsing ns->

thehackerwire@mastodon.social at 2026-04-27T23:05:51.000Z ##

🔴 CVE-2026-31682 - Critical (9.1)

In the Linux kernel, the following vulnerability has been resolved:

bridge: br_nd_send: linearize skb before parsing ND options

br_nd_send() parses neighbour discovery options from ns->opt[] and
assumes that these options are in the linear part ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T23:05:51.000Z ##

🔴 CVE-2026-31682 - Critical (9.1)

In the Linux kernel, the following vulnerability has been resolved:

bridge: br_nd_send: linearize skb before parsing ND options

br_nd_send() parses neighbour discovery options from ns->opt[] and
assumes that these options are in the linear part ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31680
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-27T18:32:22.917000

2 posts

In the Linux kernel, the following vulnerability has been resolved: net: ipv6: flowlabel: defer exclusive option free until RCU teardown `ip6fl_seq_show()` walks the global flowlabel hash under the seq-file RCU read-side lock and prints `fl->opt->opt_nflen` when an option block is present. Exclusive flowlabels currently free `fl->opt` as soon as `fl->users` drops to zero in `fl_release()`. Howe

thehackerwire@mastodon.social at 2026-04-27T23:00:41.000Z ##

🟠 CVE-2026-31680 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: flowlabel: defer exclusive option free until RCU teardown

`ip6fl_seq_show()` walks the global flowlabel hash under the seq-file
RCU read-side lock and prints `fl->opt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T23:00:41.000Z ##

🟠 CVE-2026-31680 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: flowlabel: defer exclusive option free until RCU teardown

`ip6fl_seq_show()` walks the global flowlabel hash under the seq-file
RCU read-side lock and prints `fl->opt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31678
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-27T18:32:22.917000

2 posts

In the Linux kernel, the following vulnerability has been resolved: openvswitch: defer tunnel netdev_put to RCU release ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already detached the device. Dropping the netdev reference in destroy can race with concurrent readers that still observe vport->dev. Do not release vport->dev in ovs_netdev_tunnel_destroy(). Instead, let vport_netdev

thehackerwire@mastodon.social at 2026-04-27T23:00:27.000Z ##

🟠 CVE-2026-31678 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: defer tunnel netdev_put to RCU release

ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already
detached the device. Dropping the netdev reference in des...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T23:00:27.000Z ##

🟠 CVE-2026-31678 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

openvswitch: defer tunnel netdev_put to RCU release

ovs_netdev_tunnel_destroy() may run after NETDEV_UNREGISTER already
detached the device. Dropping the netdev reference in des...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31676
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-27T18:32:22.917000

2 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: only handle RESPONSE during service challenge Only process RESPONSE packets while the service connection is still in RXRPC_CONN_SERVICE_CHALLENGING. Check that state under state_lock before running response verification and security initialization, then use a local secured flag to decide whether to queue the secured-conne

thehackerwire@mastodon.social at 2026-04-27T23:00:16.000Z ##

🟠 CVE-2026-31676 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: only handle RESPONSE during service challenge

Only process RESPONSE packets while the service connection is still in
RXRPC_CONN_SERVICE_CHALLENGING. Check that state unde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T23:00:16.000Z ##

🟠 CVE-2026-31676 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: only handle RESPONSE during service challenge

Only process RESPONSE packets while the service connection is still in
RXRPC_CONN_SERVICE_CHALLENGING. Check that state unde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31675
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-27T18:32:22.917000

2 posts

In the Linux kernel, the following vulnerability has been resolved: net/sched: sch_netem: fix out-of-bounds access in packet corruption In netem_enqueue(), the packet corruption logic uses get_random_u32_below(skb_headlen(skb)) to select an index for modifying skb->data. When an AF_PACKET TX_RING sends fully non-linear packets over an IPIP tunnel, skb_headlen(skb) evaluates to 0. Passing 0 to g

thehackerwire@mastodon.social at 2026-04-27T22:03:40.000Z ##

🟠 CVE-2026-31675 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_netem: fix out-of-bounds access in packet corruption

In netem_enqueue(), the packet corruption logic uses
get_random_u32_below(skb_headlen(skb)) to select an inde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T22:03:40.000Z ##

🟠 CVE-2026-31675 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_netem: fix out-of-bounds access in packet corruption

In netem_enqueue(), the packet corruption logic uses
get_random_u32_below(skb_headlen(skb)) to select an inde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31685
(9.4 CRITICAL)

EPSS: 0.02%

updated 2026-04-27T18:32:22.917000

2 posts

In the Linux kernel, the following vulnerability has been resolved: netfilter: ip6t_eui64: reject invalid MAC header for all packets `eui64_mt6()` derives a modified EUI-64 from the Ethernet source address and compares it with the low 64 bits of the IPv6 source address. The existing guard only rejects an invalid MAC header when `par->fragoff != 0`. For packets with `par->fragoff == 0`, `eui64_m

thehackerwire@mastodon.social at 2026-04-27T22:03:30.000Z ##

🔴 CVE-2026-31685 - Critical (9.4)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ip6t_eui64: reject invalid MAC header for all packets

`eui64_mt6()` derives a modified EUI-64 from the Ethernet source address
and compares it with the low 64 bits of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T22:03:30.000Z ##

🔴 CVE-2026-31685 - Critical (9.4)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: ip6t_eui64: reject invalid MAC header for all packets

`eui64_mt6()` derives a modified EUI-64 from the Ethernet source address
and compares it with the low 64 bits of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31683
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-27T18:32:22.917000

2 posts

In the Linux kernel, the following vulnerability has been resolved: batman-adv: avoid OGM aggregation when skb tailroom is insufficient When OGM aggregation state is toggled at runtime, an existing forwarded packet may have been allocated with only packet_len bytes, while a later packet can still be selected for aggregation. Appending in this case can hit skb_put overflow conditions. Reject agg

thehackerwire@mastodon.social at 2026-04-27T22:03:20.000Z ##

🟠 CVE-2026-31683 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: avoid OGM aggregation when skb tailroom is insufficient

When OGM aggregation state is toggled at runtime, an existing forwarded
packet may have been allocated with o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T22:03:20.000Z ##

🟠 CVE-2026-31683 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

batman-adv: avoid OGM aggregation when skb tailroom is insufficient

When OGM aggregation state is toggled at runtime, an existing forwarded
packet may have been allocated with o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-38934
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-27T18:32:15

4 posts

Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.3.5. and before allows a remote attacker to escalate privileges and obtain sensitive information via the public/settings_process.php

1 repos

https://github.com/VadlaReddySai/diskoverdata-cve-writeups

thehackerwire@mastodon.social at 2026-04-27T21:17:12.000Z ##

🟠 CVE-2026-38934 - High (8.8)

Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.3.5. and before allows a remote attacker to escalate privileges and obtain sensitive information via the public/settings_process.php

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:31.000Z ##

🟠 CVE-2026-38934 - High (8.8)

Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.3.5. and before allows a remote attacker to escalate privileges and obtain sensitive information via the public/settings_process.php

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:17:12.000Z ##

🟠 CVE-2026-38934 - High (8.8)

Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.3.5. and before allows a remote attacker to escalate privileges and obtain sensitive information via the public/settings_process.php

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:31.000Z ##

🟠 CVE-2026-38934 - High (8.8)

Cross Site Request Forgery vulnerability in diskoverdata diskover-community v.2.3.5. and before allows a remote attacker to escalate privileges and obtain sensitive information via the public/settings_process.php

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7140
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T18:32:15

4 posts

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The attack may be performed from remote. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-27T21:17:02.000Z ##

🔴 CVE-2026-7140 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:22.000Z ##

🔴 CVE-2026-7140 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:17:02.000Z ##

🔴 CVE-2026-7140 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:22.000Z ##

🔴 CVE-2026-7140 - Critical (9.8)

A vulnerability has been found in Totolink A8000RU 7.1cu.643_b20200521. Impacted is the function CsteSystem of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Such manipulation of the argument HTTP leads to os command injection. The at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7139
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T18:32:15

2 posts

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-27T21:01:00.000Z ##

🔴 CVE-2026-7139 - Critical (9.8)

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:01:00.000Z ##

🔴 CVE-2026-7139 - Critical (9.8)

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument mode causes os command injection. The a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41463
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-27T18:32:15

2 posts

ProjeQtor versions 7.0 through 12.4.3 contain a ZipSlip path traversal vulnerability in the plugin upload functionality that allows authenticated attackers with upload permissions to write files outside the intended extraction directory by crafting ZIP archives with directory traversal sequences. Attackers can exploit unvalidated archive extraction to write a PHP webshell to a web-accessible direc

thehackerwire@mastodon.social at 2026-04-27T16:25:03.000Z ##

🟠 CVE-2026-41463 - High (8.8)

ProjeQtor versions 7.0 through 12.4.3 contain a ZipSlip path traversal vulnerability in the plugin upload functionality that allows authenticated attackers with upload permissions to write files outside the intended extraction directory by craftin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:25:03.000Z ##

🟠 CVE-2026-41463 - High (8.8)

ProjeQtor versions 7.0 through 12.4.3 contain a ZipSlip path traversal vulnerability in the plugin upload functionality that allows authenticated attackers with upload permissions to write files outside the intended extraction directory by craftin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7138
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T18:32:15

2 posts

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setNtpCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tz results in os command injection. The attack can be executed remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-27T16:24:09.000Z ##

🔴 CVE-2026-7138 - Critical (9.8)

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setNtpCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tz results in os command inject...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:24:09.000Z ##

🔴 CVE-2026-7138 - Critical (9.8)

A vulnerability was detected in Totolink A8000RU 7.1cu.643_b20200521. This vulnerability affects the function setNtpCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument tz results in os command inject...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7137
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T18:32:15

2 posts

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setStorageCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument sambaEnabled leads to os command injection. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-27T16:24:00.000Z ##

🔴 CVE-2026-7137 - Critical (9.8)

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setStorageCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument sambaEnabled leads to os co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:24:00.000Z ##

🔴 CVE-2026-7137 - Critical (9.8)

A security vulnerability has been detected in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setStorageCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument sambaEnabled leads to os co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-69689
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-27T18:32:09

2 posts

The Fan Control application V251 contains an improper privilege handling vulnerability in its Open File Dialog. The dialog processes user-supplied paths with elevated permissions, which can be exploited by a local attacker to perform actions with administrator-level privileges.

thehackerwire@mastodon.social at 2026-04-27T21:00:50.000Z ##

🟠 CVE-2025-69689 - High (8.8)

The Fan Control application V251 contains an improper privilege handling vulnerability in its Open File Dialog. The dialog processes user-supplied paths with elevated permissions, which can be exploited by a local attacker to perform actions with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:00:50.000Z ##

🟠 CVE-2025-69689 - High (8.8)

The Fan Control application V251 contains an improper privilege handling vulnerability in its Open File Dialog. The dialog processes user-supplied paths with elevated permissions, which can be exploited by a local attacker to perform actions with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30352
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T18:32:07

2 posts

A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.

thehackerwire@mastodon.social at 2026-04-27T16:43:10.000Z ##

🔴 CVE-2026-30352 - Critical (9.8)

A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:43:10.000Z ##

🔴 CVE-2026-30352 - Critical (9.8)

A remote code execution (RCE) vulnerability in the /devserver/start endpoint of leonvanzyl autocoder commit 79d02a allows attackers to execute arbitrary code via providing a crafted command parameter.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41462
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T18:32:07

2 posts

ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inject arbitrary SQL expressions through the username field at the authentication endpoint to create privileged accounts, read sensitive data, and execute op

thehackerwire@mastodon.social at 2026-04-27T16:24:54.000Z ##

🔴 CVE-2026-41462 - Critical (9.8)

ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inje...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:24:54.000Z ##

🔴 CVE-2026-41462 - Critical (9.8)

ProjeQtor versions 7.0 through 12.4.3 contain an unauthenticated SQL injection vulnerability in the login functionality where the login variable is directly concatenated into a SQL query without parameterization or sanitization. Attackers can inje...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33454
(9.4 CRITICAL)

EPSS: 0.02%

updated 2026-04-27T18:32:06

2 posts

The Camel-Mail component is vulnerable to Camel message header injection. The custom header filter strategy used by the component (MailHeaderFilterStrategy) only filters the 'out' direction via setOutFilterStartsWith, while it does not configure the 'in' direction via setInFilterStartsWith. As a result, when a Camel application consumes mail through camel-mail (for example via from(\"imap://...\")

thehackerwire@mastodon.social at 2026-04-27T17:00:30.000Z ##

🔴 CVE-2026-33454 - Critical (9.4)

The Camel-Mail component is vulnerable to Camel message header injection. The custom header filter strategy used by the component (MailHeaderFilterStrategy) only filters the 'out' direction via setOutFilterStartsWith, while it does not configure t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T17:00:30.000Z ##

🔴 CVE-2026-33454 - Critical (9.4)

The Camel-Mail component is vulnerable to Camel message header injection. The custom header filter strategy used by the component (MailHeaderFilterStrategy) only filters the 'out' direction via setOutFilterStartsWith, while it does not configure t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40022
(8.2 HIGH)

EPSS: 0.04%

updated 2026-04-27T18:32:06

2 posts

When authentication is enabled on the Apache Camel embedded HTTP server or embedded management server (camel-platform-http-main) and a non-root context path such as /api or /admin is configured via camel.server.path or camel.management.path, the BasicAuthenticationConfigurer and JWTAuthenticationConfigurer classes derive the authentication path from properties.getPath() when camel.server.authentic

thehackerwire@mastodon.social at 2026-04-27T17:00:20.000Z ##

🟠 CVE-2026-40022 - High (8.2)

When authentication is enabled on the Apache Camel embedded HTTP server or embedded management server (camel-platform-http-main) and a non-root context path such as /api or /admin is configured via camel.server.path or camel.management.path, the B...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T17:00:20.000Z ##

🟠 CVE-2026-40022 - High (8.2)

When authentication is enabled on the Apache Camel embedded HTTP server or embedded management server (camel-platform-http-main) and a non-root context path such as /api or /admin is configured via camel.server.path or camel.management.path, the B...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41635
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T18:32:05

2 posts

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed. The fix checks if the class is present in the accepted class filter before calling Class.forName().  Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0

thehackerwire@mastodon.social at 2026-04-27T22:01:21.000Z ##

🔴 CVE-2026-41635 - Critical (9.8)

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed.

The fix che...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T22:01:21.000Z ##

🔴 CVE-2026-41635 - Critical (9.8)

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed.

The fix che...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40860
(9.8 CRITICAL)

EPSS: 0.30%

updated 2026-04-27T18:32:05

2 posts

JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding class in camel-sjms, deserialized the payload of incoming JMS ObjectMessage values via javax.jms.ObjectMessage.getObject() without applying any ObjectInputFilter, class allowlist or class denylist. Because this code path is reached whenever the mapJmsMessage option is enabled (the default) and Camel acts as a JMS consumer,

thehackerwire@mastodon.social at 2026-04-27T22:01:11.000Z ##

🔴 CVE-2026-40860 - Critical (9.8)

JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding class in camel-sjms, deserialized the payload of incoming JMS ObjectMessage values via javax.jms.ObjectMessage.getObject() without applying any ObjectInputFilter, class al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T22:01:11.000Z ##

🔴 CVE-2026-40860 - Critical (9.8)

JmsBinding.extractBodyFromJms() in camel-jms, and the equivalent JmsBinding class in camel-sjms, deserialized the payload of incoming JMS ObjectMessage values via javax.jms.ObjectMessage.getObject() without applying any ObjectInputFilter, class al...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40453
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-04-27T18:32:05

2 posts

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was not applied to five non-HTTP HeaderFilterStrategy implementations: JmsHeaderFilterStrategy and ClassicJmsHeaderFilterStrategy in camel-jms, SjmsHeaderFilte

thehackerwire@mastodon.social at 2026-04-27T17:03:51.000Z ##

🔴 CVE-2026-40453 - Critical (9.9)

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T17:03:51.000Z ##

🔴 CVE-2026-40453 - Critical (9.9)

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40048
(7.8 HIGH)

EPSS: 0.07%

updated 2026-04-27T18:32:05

2 posts

The Camel-PQC FileBasedKeyLifecycleManager class deserializes the contents of `<keyId>.key` files in the configured key directory using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. The cast to `java.security.KeyPair` is evaluated only after `readObject()` has already returned, so any `readObject()` side effects in the deserialized object run befor

thehackerwire@mastodon.social at 2026-04-27T17:03:42.000Z ##

🟠 CVE-2026-40048 - High (7.8)

The Camel-PQC FileBasedKeyLifecycleManager class deserializes the contents of `.key` files in the configured key directory using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. The cast to `java.secu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T17:03:42.000Z ##

🟠 CVE-2026-40048 - High (7.8)

The Camel-PQC FileBasedKeyLifecycleManager class deserializes the contents of `.key` files in the configured key directory using java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. The cast to `java.secu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41066
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-27T17:59:05.297000

1 posts

lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_entities option explicitly to resolve_entities='internal' or resolve_entities=False disables the local file access. This vulnerability is fixed in 6.1.0.

thehackerwire@mastodon.social at 2026-04-24T19:44:51.000Z ##

🟠 CVE-2026-41066 - High (7.5)

lxml is a library for processing XML and HTML in the Python language. Prior to 6.1.0, using either of the two parsers in the default configuration (with resolve_entities=True) allows untrusted XML input to read local files. Setting the resolve_ent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28950
(6.2 MEDIUM)

EPSS: 0.01%

updated 2026-04-27T17:07:44.363000

1 posts

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device.

PC_Fluesterer@social.tchncs.de at 2026-04-27T08:35:45.000Z ##

Apple Notfall-Update gegen Datenschutz-Loch

Apple hat gerade iOS/iPadOS 26.4.2 und iOS/iPadOS 18.7.8 veröffentlicht. Der einzige Zweck dieser Updates außer der Reihe besteht darin, die Sicherheitslücke CVE-2026-28950 zu schließen. Apple verschweigt (hier und hier), dass das FBI diese Lücke bereits ausgenutzt hat, um Informationen aus dem iPhone eines Verdächtigen auszulesen, die eigentlich geschützt sein sollten. Das geht so:

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Mobilfunk #Warnung #0day #apple #chat #datenschutz #ios #messenger #privacy #privatsphäre #sicherheit #spionage #UnplugApple #UnplugTrump #wissen

##

CVE-2026-40897
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T16:43:12

1 posts

### Impact This security vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users can evaluate arbitrary expressions using the mathjs expression parser. ### Patches The issue was introduced in mathjs `v13.1.1`, and patched in mathjs `v15.2.0`. ### Workarounds There is no workaround without upgrading to

thehackerwire@mastodon.social at 2026-04-24T19:42:32.000Z ##

🟠 CVE-2026-40897 - High (8.8)

Math.js is an extensive math library for JavaScript and Node.js. From 13.1.1 to before 15.2.0, a vulnerability allowed executing arbitrary JavaScript via the expression parser of mathjs. You can be affected when you have an application where users...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41176(CVSS UNKNOWN)

EPSS: 2.79%

updated 2026-04-27T16:23:08

1 posts

### Summary The RC endpoint `options/set` is exposed without `AuthRequired: true`, but it can mutate global runtime configuration, including the RC option block itself. An unauthenticated attacker can set `rc.NoAuth=true`, which disables the authorization gate for many RC methods registered with `AuthRequired: true` on reachable RC servers that are started without global HTTP authentication. This

Nuclei template

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-41433
(8.4 HIGH)

EPSS: 0.02%

updated 2026-04-27T16:19:42

1 posts

### Summary A flaw in the Java agent injection path allows a local attacker controlling a Java workload to overwrite arbitrary host files when Java injection is enabled and OBI is running with elevated privileges. The injector trusted `TMPDIR` from the target process and used unsafe file creation semantics, enabling both filesystem boundary escape and symlink-based file clobbering. ### Remediati

thehackerwire@mastodon.social at 2026-04-24T20:59:49.000Z ##

🟠 CVE-2026-41433 - High (8.4)

OpenTelemetry eBPF Instrumentation provides eBPF instrumentation based on the OpenTelemetry standard. From 0.4.0 to before 0.8.0, a flaw in the Java agent injection path allows a local attacker controlling a Java workload to overwrite arbitrary ho...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41428
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-04-27T16:19:35

1 posts

### Summary The `authenticated` middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against `ctx.request.url`. Since `ctx.request.url` in Koa includes the query string, an attacker can access any protected endpoint by appending a public endpoint path as a query parameter. For example, `POST /api/global/users/search?x=/api/system/status` bypasses all authenti

thehackerwire@mastodon.social at 2026-04-24T20:41:28.000Z ##

🔴 CVE-2026-41428 - Critical (9.1)

Budibase is an open-source low-code platform. Prior to 3.35.4, the authenticated middleware uses unanchored regular expressions to match public (no-auth) endpoint patterns against ctx.request.url. Since ctx.request.url in Koa includes the query st...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33453
(10.0 CRITICAL)

EPSS: 0.55%

updated 2026-04-27T15:31:59

2 posts

Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Apache Camel Camel-Coap component. Apache Camel's camel-coap component is vulnerable to Camel message header injection, leading to remote code execution when routes forward CoAP requests to header-sensitive producers (e.g. camel-exec) The camel-coap component maps incoming CoAP request URI query param

1 repos

https://github.com/dinosn/apache-camel

thehackerwire@mastodon.social at 2026-04-27T15:23:14.000Z ##

🔴 CVE-2026-33453 - Critical (10)

Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Apache Camel Camel-Coap component.

Apache Camel's camel-coap component is vulnerable to Camel message header injection, leading to remote code executi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T15:23:14.000Z ##

🔴 CVE-2026-33453 - Critical (10)

Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Apache Camel Camel-Coap component.

Apache Camel's camel-coap component is vulnerable to Camel message header injection, leading to remote code executi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7124
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T15:31:01

2 posts

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument addrPrefixLen can lead to os command injection. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-27T14:00:12.000Z ##

🔴 CVE-2026-7124 - Critical (9.8)

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument addrPrefix...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T14:00:12.000Z ##

🔴 CVE-2026-7124 - Critical (9.8)

A vulnerability was determined in Totolink A8000RU 7.1cu.643_b20200521. Affected by this vulnerability is the function setIpv6LanCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Executing a manipulation of the argument addrPrefix...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7123
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T15:31:00

2 posts

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument setIptvCfg results in os command injection. The attack can be initiated remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-27T14:00:02.000Z ##

🔴 CVE-2026-7123 - Critical (9.8)

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument setIptvCfg results in os command inject...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T14:00:02.000Z ##

🔴 CVE-2026-7123 - Critical (9.8)

A vulnerability was found in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function setIptvCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. Performing a manipulation of the argument setIptvCfg results in os command inject...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7125
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T15:31:00

2 posts

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-04-27T13:59:52.000Z ##

🔴 CVE-2026-7125 - Critical (9.8)

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge leads to os command...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T13:59:52.000Z ##

🔴 CVE-2026-7125 - Critical (9.8)

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. Affected by this issue is the function setWiFiEasyCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge leads to os command...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40473
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-27T15:30:52

4 posts

The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter wraps an IoBuffer in a java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. When a Camel route uses camel-mina as a TCP or UDP consumer and requests conversion to ObjectInput (for example via getBody(ObjectInput.class) or @Body ObjectInput), an attacker sending a crafted seria

1 repos

https://github.com/dinosn/apache-camel

thehackerwire@mastodon.social at 2026-04-27T21:17:22.000Z ##

🟠 CVE-2026-40473 - High (8.8)

The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter wraps an IoBuffer in a java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. When a Camel route uses camel-mina as a TCP or U...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:42.000Z ##

🟠 CVE-2026-40473 - High (8.8)

The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter wraps an IoBuffer in a java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. When a Camel route uses camel-mina as a TCP or U...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:17:22.000Z ##

🟠 CVE-2026-40473 - High (8.8)

The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter wraps an IoBuffer in a java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. When a Camel route uses camel-mina as a TCP or U...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T21:16:42.000Z ##

🟠 CVE-2026-40473 - High (8.8)

The camel-mina component's MinaConverter.toObjectInput(IoBuffer) type converter wraps an IoBuffer in a java.io.ObjectInputStream without applying any ObjectInputFilter or class-loading restrictions. When a Camel route uses camel-mina as a TCP or U...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41208
(8.8 HIGH)

EPSS: 0.23%

updated 2026-04-27T15:14:22.080000

1 posts

Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Versions of @paperclipai/server prior to 2026.416.0 contain a privilege escalation vulnerability that allows an attacker with an Agent API key to execute arbitrary OS commands on the Paperclip server host. An attacker with an agent credential can escalate privileges from the agent runtime to the Pap

thehackerwire@mastodon.social at 2026-04-25T22:00:01.000Z ##

🟠 CVE-2026-41208 - High (8.8)

Paperclip is a Node.js server and React UI that orchestrates a team of AI agents to run a business. Versions of @paperclipai/server prior to 2026.416.0 contain a privilege escalation vulnerability that allows an attacker with an Agent API key to e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25660
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-27T14:48:20.843000

1 posts

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Authentication bypass occurs when the URL ends with Authentication with certain function calls.  This bypass allows assigning arbitrary permission to any user existing in CodeChecker. This issue affects CodeChecker: through 6.27.3.

offseq@infosec.exchange at 2026-04-25T10:30:26.000Z ##

Ericsson CodeChecker (≤6.27.3) is vulnerable to CRITICAL auth bypass (CVE-2026-25660). Attackers can assign permissions via crafted URLs. Restrict access & monitor for changes. Patch not yet available. radar.offseq.com/threat/cve-20 #OffSeq #vulnerability #CodeChecker #infosec

##

CVE-2026-5943
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-27T12:30:49

2 posts

Document structural anomalies caused inconsistencies between page element relationships and internal index states. When scripts triggered document modifications, object reference validity was not properly maintained, leading to a crash when accessing an invalid pointer during page information queries.

thehackerwire@mastodon.social at 2026-04-27T15:01:03.000Z ##

🟠 CVE-2026-5943 - High (7.8)

Document structural anomalies caused inconsistencies between page element relationships and internal index states. When scripts triggered document modifications, object reference validity was not properly maintained, leading to a crash when access...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T15:01:03.000Z ##

🟠 CVE-2026-5943 - High (7.8)

Document structural anomalies caused inconsistencies between page element relationships and internal index states. When scripts triggered document modifications, object reference validity was not properly maintained, leading to a crash when access...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7121
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-27T12:30:49

2 posts

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument wizard causes os command injection. It is possible to initiate the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-27T14:24:02.000Z ##

🔴 CVE-2026-7121 - Critical (9.8)

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument wizard causes os command injection. It is possib...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T14:24:02.000Z ##

🔴 CVE-2026-7121 - Critical (9.8)

A flaw has been found in Totolink A8000RU 7.1cu.643_b20200521. This affects the function setWizardCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. This manipulation of the argument wizard causes os command injection. It is possib...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7119
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-27T12:30:49

2 posts

A vulnerability was detected in Tenda HG3 2.0. The impacted element is an unknown function of the file /boaform/formCountrystr. The manipulation of the argument countrystr results in os command injection. The attack may be performed from remote. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-27T14:23:53.000Z ##

🟠 CVE-2026-7119 - High (8.8)

A vulnerability was detected in Tenda HG3 2.0. The impacted element is an unknown function of the file /boaform/formCountrystr. The manipulation of the argument countrystr results in os command injection. The attack may be performed from remote. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T14:23:53.000Z ##

🟠 CVE-2026-7119 - High (8.8)

A vulnerability was detected in Tenda HG3 2.0. The impacted element is an unknown function of the file /boaform/formCountrystr. The manipulation of the argument countrystr results in os command injection. The attack may be performed from remote. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5941
(7.8 HIGH)

EPSS: 0.02%

updated 2026-04-27T12:30:45

2 posts

Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.

thehackerwire@mastodon.social at 2026-04-27T15:00:52.000Z ##

🟠 CVE-2026-5941 - High (7.8)

Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T15:00:52.000Z ##

🟠 CVE-2026-5941 - High (7.8)

Parsing logic flaws cause non-signature data to be misidentified as valid signatures when processing malformed form field hierarchies, leading to invalid memory writes and program crashes during internal data structure construction.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22336
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-04-27T12:30:44

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Directorist Booking allows SQL Injection.This issue affects Directorist Booking: from n/a before 3.0.2.

thehackerwire@mastodon.social at 2026-04-27T16:00:53.000Z ##

🔴 CVE-2026-22336 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Directorist Booking allows SQL Injection.This issue affects Directorist Booking: from n/a before 3.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:00:53.000Z ##

🔴 CVE-2026-22336 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Directorist Booking allows SQL Injection.This issue affects Directorist Booking: from n/a before 3.0.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7101
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T09:34:46

2 posts

A vulnerability has been found in Tenda F456 1.0.0.5. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. The manipulation leads to buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-27T17:03:33.000Z ##

🟠 CVE-2026-7101 - High (8.8)

A vulnerability has been found in Tenda F456 1.0.0.5. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. The manipulation leads to buffer overflow. Remote exploitation of the attack is possible. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T17:03:33.000Z ##

🟠 CVE-2026-7101 - High (8.8)

A vulnerability has been found in Tenda F456 1.0.0.5. This affects the function fromWrlclientSet of the file /goform/WrlclientSet of the component httpd. The manipulation leads to buffer overflow. Remote exploitation of the attack is possible. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7100
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T09:34:40

2 posts

A flaw has been found in Tenda F456 1.0.0.5. The impacted element is the function fromNatlimitof of the file /goform/Natlimit of the component httpd. Executing a manipulation can lead to buffer overflow. The attack may be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-27T17:00:40.000Z ##

🟠 CVE-2026-7100 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. The impacted element is the function fromNatlimitof of the file /goform/Natlimit of the component httpd. Executing a manipulation can lead to buffer overflow. The attack may be launched remotely. The ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T17:00:40.000Z ##

🟠 CVE-2026-7100 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. The impacted element is the function fromNatlimitof of the file /goform/Natlimit of the component httpd. Executing a manipulation can lead to buffer overflow. The attack may be launched remotely. The ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7099
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T09:34:40

2 posts

A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the function formQuickIndex of the file /goform/QuickIndex of the component httpd. Performing a manipulation of the argument mit_linktype results in buffer overflow. The attack may be initiated remotely. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-27T16:01:12.000Z ##

🟠 CVE-2026-7099 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the function formQuickIndex of the file /goform/QuickIndex of the component httpd. Performing a manipulation of the argument mit_linktype results in buffer overflow. The a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T16:01:12.000Z ##

🟠 CVE-2026-7099 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. The affected element is the function formQuickIndex of the file /goform/QuickIndex of the component httpd. Performing a manipulation of the argument mit_linktype results in buffer overflow. The a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7098
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T09:34:40

2 posts

A security vulnerability has been detected in Tenda F456 1.0.0.5. Impacted is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. Such manipulation of the argument page leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-27T10:29:29.000Z ##

🟠 CVE-2026-7098 - High (8.8)

A security vulnerability has been detected in Tenda F456 1.0.0.5. Impacted is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. Such manipulation of the argument page leads to buffer overflow. The attack ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T10:29:29.000Z ##

🟠 CVE-2026-7098 - High (8.8)

A security vulnerability has been detected in Tenda F456 1.0.0.5. Impacted is the function fromDhcpListClient of the file /goform/DhcpListClient of the component httpd. Such manipulation of the argument page leads to buffer overflow. The attack ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7081
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T06:31:33

3 posts

A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

offseq at 2026-04-27T06:00:27.529Z ##

🛡️ CVE-2026-7081: HIGH-severity buffer overflow in Tenda F456 v1.0.0.5 (fromGstDhcpSetSer, httpd). Remote exploit possible, no patch yet. Limit remote access & watch for Tenda updates. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-27T06:00:27.000Z ##

🛡️ CVE-2026-7081: HIGH-severity buffer overflow in Tenda F456 v1.0.0.5 (fromGstDhcpSetSer, httpd). Remote exploit possible, no patch yet. Limit remote access & watch for Tenda updates. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec #IoT

##

thehackerwire@mastodon.social at 2026-04-27T04:19:05.000Z ##

🟠 CVE-2026-7081 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. Remote exploitation...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7082
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T06:31:33

2 posts

A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Executing a manipulation of the argument Go can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-04-27T04:30:27.000Z ##

⚠️ CVE-2026-7082: HIGH severity buffer overflow in Tenda F456 v1.0.0.5 (formWrlExtraSet in httpd). Attack is remote and exploit is public. Audit exposure & restrict remote mgmt ASAP. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tenda #CVE20267082

##

thehackerwire@mastodon.social at 2026-04-27T04:19:15.000Z ##

🟠 CVE-2026-7082 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function formWrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Executing a manipulation of the argument Go can lead to buffer overflow. The attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7079
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T03:30:34

1 posts

A weakness has been identified in Tenda F456 1.0.0.5. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. This manipulation of the argument wanmode causes buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T04:00:24.000Z ##

🟠 CVE-2026-7079 - High (8.8)

A weakness has been identified in Tenda F456 1.0.0.5. This affects the function fromAdvSetWan of the file /goform/AdvSetWan of the component httpd. This manipulation of the argument wanmode causes buffer overflow. The attack may be initiated remot...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7078
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T03:30:34

1 posts

A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element is the function fromSetIpBind of the file /goform/SetIpBind of the component httpd. The manipulation of the argument page results in buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-27T03:30:51.000Z ##

🟠 CVE-2026-7078 - High (8.8)

A security flaw has been discovered in Tenda F456 1.0.0.5. The impacted element is the function fromSetIpBind of the file /goform/SetIpBind of the component httpd. The manipulation of the argument page results in buffer overflow. The attack can be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7106
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T03:30:34

1 posts

The Highland Software Custom Role Manager plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 1.0.0. This is due to insufficient authorization checks in the hscrm_save_user_roles() function, which is hooked to the personal_options_update action accessible by any authenticated user. This makes it possible for authenticated attackers, with Subscriber-level acce

thehackerwire@mastodon.social at 2026-04-27T03:30:42.000Z ##

🟠 CVE-2026-7106 - High (8.8)

The Highland Software Custom Role Manager plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 1.0.0. This is due to insufficient authorization checks in the hscrm_save_user_roles() function, which is hooked t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7069
(8.0 HIGH)

EPSS: 0.03%

updated 2026-04-27T00:30:33

1 posts

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer overflow. The attack needs to be approached within the local network. The exploit has been released to the public and may be used for attacks. This vulne

thehackerwire@mastodon.social at 2026-04-27T00:21:30.000Z ##

🟠 CVE-2026-7069 - High (8)

A security flaw has been discovered in D-Link DIR-825 up to 3.00b32. This impacts the function AddPortMapping of the file upnpsoap.c of the component miniupnpd. Performing a manipulation of the argument NewPortMappingDescription results in buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7068
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-27T00:30:33

1 posts

A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the function NMBD_process of the file sserver.c of the component nmbd. Such manipulation leads to buffer overflow. The attack can only be initiated within the local network. The exploit is publicly available and might be used. This vulnerability only affects products that are no longer supported by the maintainer.

thehackerwire@mastodon.social at 2026-04-27T00:21:18.000Z ##

🟠 CVE-2026-7068 - High (8.8)

A vulnerability was identified in D-Link DIR-825 3.00b32. This affects the function NMBD_process of the file sserver.c of the component nmbd. Such manipulation leads to buffer overflow. The attack can only be initiated within the local network. Th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7055
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T00:30:33

1 posts

A security vulnerability has been detected in Tenda F456 1.0.0.5. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component httpd. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-26T23:00:19.000Z ##

🟠 CVE-2026-7055 - High (8.8)

A security vulnerability has been detected in Tenda F456 1.0.0.5. This issue affects the function fromVirtualSer of the file /goform/VirtualSer of the component httpd. The manipulation of the argument menufacturer/Go leads to buffer overflow. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7054
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T00:30:33

1 posts

A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects the function fromPptpUserAdd of the file /goform/PPTPDClient of the component httpd. Executing a manipulation of the argument opttype/usernamewith can lead to buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-26T23:00:06.000Z ##

🟠 CVE-2026-7054 - High (8.8)

A weakness has been identified in Tenda F456 1.0.0.5. This vulnerability affects the function fromPptpUserAdd of the file /goform/PPTPDClient of the component httpd. Executing a manipulation of the argument opttype/usernamewith can lead to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7053
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-27T00:30:33

1 posts

A security flaw has been discovered in Tenda F456 1.0.0.5. This affects the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Performing a manipulation of the argument page results in buffer overflow. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-26T22:59:57.000Z ##

🟠 CVE-2026-7053 - High (8.8)

A security flaw has been discovered in Tenda F456 1.0.0.5. This affects the function frmL7ProtForm of the file /goform/L7Prot of the component httpd. Performing a manipulation of the argument page results in buffer overflow. Remote exploitation of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33277
(8.8 HIGH)

EPSS: 0.23%

updated 2026-04-27T00:30:28

2 posts

An OS command Injection issue exists in LogonTracer prior to v2.0.0. An arbitrary OS command may be executed by a logged-in user.

offseq@infosec.exchange at 2026-04-27T03:00:28.000Z ##

⚠️ HIGH severity: OS command injection in JPCERT/CC LogonTracer before v2.0.0 (CVE-2026-33277). Logged-in users can run arbitrary OS commands. Restrict access & monitor logs until patch available. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #LogonTracer #Infosec

##

thehackerwire@mastodon.social at 2026-04-27T00:22:28.000Z ##

🟠 CVE-2026-33277 - High (8.8)

An OS command Injection issue exists in LogonTracer prior to v2.0.0. An arbitrary OS command may be executed by a logged-in user.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42363
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-04-27T00:30:27

2 posts

An insufficient encryption vulnerability exists in the Device Authentication functionality of GeoVision GV-IP Device Utility 9.0.5. Listening to broadcast packets can lead to credentials leak. An attacker can listen to broadcast messages to trigger this vulnerability. When interacting with various Geovision devices on the network, the utility may send privileged commands; in order to do so, the

offseq@infosec.exchange at 2026-04-27T01:30:27.000Z ##

🚨CRITICAL: CVE-2026-42363 in GeoVision GV-IP Device Utility 9.0.5 exposes admin creds via UDP broadcast with weak encryption. Attackers on LAN can take full control. Limit access, avoid untrusted networks, and watch for patches. radar.offseq.com/threat/cve-20 #OffSeq #infosec #IoTSecurity

##

thehackerwire@mastodon.social at 2026-04-27T00:21:39.000Z ##

🔴 CVE-2026-42363 - Critical (9.3)

An insufficient encryption vulnerability exists in the Device Authentication functionality of GeoVision GV-IP Device Utility 9.0.5. Listening to broadcast packets can lead to credentials leak. An attacker can listen to broadcast messages to trigge...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6786
(8.1 HIGH)

EPSS: 0.06%

updated 2026-04-26T21:30:30

2 posts

Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

Matchbook3469@mastodon.social at 2026-04-27T11:51:33.000Z ##

⚠️ New security advisory:

CVE-2026-6786 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-04-26T20:06:54.000Z ##

🟠 CVE-2026-6786 - High (8.1)

Memory safety bugs present in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7039
(7.8 HIGH)

EPSS: 0.06%

updated 2026-04-26T15:30:27

1 posts

A security vulnerability has been detected in tufantunc ssh-mcp up to 1.5.0. The affected element is the function shell.write of the file src/index.ts. Such manipulation of the argument Description leads to command injection. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has

thehackerwire@mastodon.social at 2026-04-26T13:19:27.000Z ##

🟠 CVE-2026-7039 - High (7.8)

A security vulnerability has been detected in tufantunc ssh-mcp up to 1.5.0. The affected element is the function shell.write of the file src/index.ts. Such manipulation of the argument Description leads to command injection. The attack must be ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7037
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-04-26T12:31:47

2 posts

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

offseq@infosec.exchange at 2026-04-27T00:00:36.000Z ##

CVE-2026-7037: Totolink A8000RU (7.1cu.643_b20200521) — CRITICAL OS command injection flaw. Remote, unauthenticated exploit enables full device compromise. Restrict access & monitor systems. No patch yet. radar.offseq.com/threat/cve-20 #OffSeq #CVE #infosec #IoT

##

thehackerwire@mastodon.social at 2026-04-26T12:31:52.000Z ##

🔴 CVE-2026-7037 - Critical (9.8)

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru results in os c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7034
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-26T12:31:47

1 posts

A vulnerability was found in Tenda FH1202 1.2.0.14(408). Affected by this issue is the function WrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Performing a manipulation of the argument Go results in stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made public and could be used.

thehackerwire@mastodon.social at 2026-04-26T12:32:12.000Z ##

🟠 CVE-2026-7034 - High (8.8)

A vulnerability was found in Tenda FH1202 1.2.0.14(408). Affected by this issue is the function WrlExtraSet of the file /goform/WrlExtraSet of the component httpd. Performing a manipulation of the argument Go results in stack-based buffer overflow...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7033
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-26T12:31:47

1 posts

A vulnerability has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function fromSafeClientFilter of the file /goform/SafeClientFilter. Such manipulation of the argument menufacturer/Go leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-04-26T12:04:58.000Z ##

🟠 CVE-2026-7033 - High (8.8)

A vulnerability has been found in Tenda F456 1.0.0.5. Affected by this vulnerability is the function fromSafeClientFilter of the file /goform/SafeClientFilter. Such manipulation of the argument menufacturer/Go leads to buffer overflow. The attack ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7032
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-26T12:31:47

1 posts

A flaw has been found in Tenda F456 1.0.0.5. Affected is the function SafeEmailFilter of the file /goform/SafeEmailFilter. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-26T12:04:49.000Z ##

🟠 CVE-2026-7032 - High (8.8)

A flaw has been found in Tenda F456 1.0.0.5. Affected is the function SafeEmailFilter of the file /goform/SafeEmailFilter. This manipulation of the argument page causes buffer overflow. The attack can be initiated remotely. The exploit has been pu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7031
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-26T12:31:47

2 posts

A vulnerability was detected in Tenda F456 1.0.0.5. This impacts the function fromSafeMacFilter of the file /goform/SafeMacFilter. The manipulation of the argument page results in buffer overflow. It is possible to launch the attack remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-04-26T10:30:26.000Z ##

🔒 CVE-2026-7031: HIGH-severity buffer overflow in Tenda F456 (v1.0.0.5). Remote, no user interaction needed. Exploit public, no patch yet. Limit device exposure & monitor for updates. More: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity #NetSec

##

thehackerwire@mastodon.social at 2026-04-26T10:17:43.000Z ##

🟠 CVE-2026-7031 - High (8.8)

A vulnerability was detected in Tenda F456 1.0.0.5. This impacts the function fromSafeMacFilter of the file /goform/SafeMacFilter. The manipulation of the argument page results in buffer overflow. It is possible to launch the attack remotely. The ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7030
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-26T12:31:36

1 posts

A security vulnerability has been detected in Tenda F456 1.0.0.5. This affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used.

thehackerwire@mastodon.social at 2026-04-26T10:17:52.000Z ##

🟠 CVE-2026-7030 - High (8.8)

A security vulnerability has been detected in Tenda F456 1.0.0.5. This affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page leads to buffer overflow. It is possible to initiate the attack remo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7028
(4.7 MEDIUM)

EPSS: 0.01%

updated 2026-04-26T09:32:42

1 posts

A security flaw has been discovered in CodeAstro Online Job Portal 1.0. The affected element is an unknown function of the file /admin/jobs-admins/delete-jobs.php of the component All Jobs Page. Performing a manipulation of the argument ID results in sql injection. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks.

1 repos

https://github.com/Xmyronn/CVE-2026-7028-SQLI

offseq@infosec.exchange at 2026-04-26T09:00:26.000Z ##

MEDIUM severity: CVE-2026-7028 impacts CodeAstro Online Job Portal 1.0. SQL injection possible via /admin/jobs-admins/delete-jobs.php (ID param). Exploit is public — monitor for attacks and restrict access! radar.offseq.com/threat/cve-20 #OffSeq #SQLi #Vulnerability #InfoSec

##

CVE-2026-7019
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-26T06:31:22

2 posts

A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be carried out remotely. The exploit is publicly available and might be used.

offseq@infosec.exchange at 2026-04-26T06:00:27.000Z ##

🛑 HIGH severity: Buffer overflow in Tenda F456 (v1.0.0.5) via /goform/P2pListFilter ('menufacturer/Go'). Public exploit available, no patch. Limit exposure & monitor systems. CVE-2026-7019. radar.offseq.com/threat/cve-20 #OffSeq #Tenda #Vuln #BufferOverflow

##

thehackerwire@mastodon.social at 2026-04-26T05:20:47.000Z ##

🟠 CVE-2026-7019 - High (8.8)

A vulnerability was identified in Tenda F456 1.0.0.5. The impacted element is the function fromP2pListFilter of the file /goform/P2pListFilter. The manipulation of the argument menufacturer/Go leads to buffer overflow. The attack is possible to be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42255
(7.2 HIGH)

EPSS: 0.03%

updated 2026-04-26T06:31:21

1 posts

Technitium DNS Server before 15.0 allows DNS traffic amplification via cyclic name server delegation.

offseq@infosec.exchange at 2026-04-26T04:30:27.000Z ##

⚠️ CVE-2026-42255 (HIGH): Technitium DNS Server <15.0 is vulnerable to DNS amplification via cyclic delegation (CWE-684). No patch yet — monitor DNS traffic & apply filtering. radar.offseq.com/threat/cve-20 #OffSeq #DNS #Infosec #Vuln

##

CVE-2026-7015
(2.4 LOW)

EPSS: 0.03%

updated 2026-04-26T03:30:26

1 posts

A vulnerability has been found in MaxSite CMS up to 109.3. This issue affects some unknown processing of the component Guestbook Plugin. Such manipulation of the argument f_text/f_slug/f_limit/f_email leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 109.4 is capable of addressing this issue. The n

offseq@infosec.exchange at 2026-04-26T03:00:27.000Z ##

⚠️ CVE-2026-7015: MEDIUM XSS in MaxSite CMS (109.0 – 109.3) via Guestbook Plugin. Exploit public — remote attackers can target f_text/f_slug/f_limit/f_email. Patch in 109.4 (8a3946bd...). Upgrade now. Details: radar.offseq.com/threat/cve-20 #OffSeq #XSS #MaxSiteCMS #Vuln

##

CVE-2026-6992
(7.2 HIGH)

EPSS: 0.12%

updated 2026-04-25T18:33:03

1 posts

A vulnerability was identified in Linksys MR9600 2.0.6.206937. This affects the function BTRequestGetSmartConnectStatus of the file /etc/init.d/run_central2.sh of the component JNAP Action Handler. The manipulation of the argument pin leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this d

offseq@infosec.exchange at 2026-04-26T00:00:39.000Z ##

🚨 HIGH severity (CVSS 8.6) OS command injection in Linksys MR9600 (2.0.6.206937) — CVE-2026-6992. Remote attackers can gain control via the 'pin' argument. Exploit is public, no fix yet. Restrict remote access & monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Linksys

##

CVE-2026-6951
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-25T06:30:30

3 posts

Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling pr

canartuc@mastodon.social at 2026-04-27T13:02:17.000Z ##

simple-git (the Node.js git wrapper sitting inside half of npm build pipelines) disclosed CVE-2026-6951 on April 25. Severity 9.8. It lets an attacker run any command on the build server. The new patch finishes a 2022 patch that blocked the "-c" flag and forgot "--config" was the same option. Snyk pulled telemetry: 73% of 9M weekly installs were on the broken patch at disclosure.

#OpenSource #CyberSecurity #SupplyChain

##

thehackerwire@mastodon.social at 2026-04-25T20:23:48.000Z ##

🔴 CVE-2026-6951 - Critical (9.8)

Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](security.snyk.io/vuln/SNYK-JS-) that blocks the -c option but not the equivalent ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-25T06:00:27.000Z ##

🚩 CRITICAL: CVE-2026-6951 in simple-git <3.36.0 enables remote code execution via untrusted input to the options argument. Upgrade or block untrusted input! Impact: full system compromise. More: radar.offseq.com/threat/cve-20 #OffSeq #RCE #simplegit #Security

##

CVE-2025-50229
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-04-24T21:33:02

1 posts

Jizhicms v2.5.4 is vulnerable to SQL injection in the product editing module.

thehackerwire@mastodon.social at 2026-04-25T21:59:51.000Z ##

🔴 CVE-2025-50229 - Critical (9.8)

Jizhicms v2.5.4 is vulnerable to SQL injection in the product editing module.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-7399
(8.8 HIGH)

EPSS: 82.26%

updated 2026-04-24T21:33:00

3 posts

Improper limitation of a pathname to a restricted directory vulnerability in Samsung MagicINFO 9 Server version before 21.1050 allows attackers to write arbitrary file as system authority.

Nuclei template

1 repos

https://github.com/davidxbors/CVE-2024-7399-POC

secdb@infosec.exchange at 2026-04-24T20:00:16.000Z ##

🚨 [CISA-2026:0424] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-57726 (secdb.nttzen.cloud/cve/detail/)
- Name: SimpleHelp Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: simple-help.com/kb---security- ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-57728 (secdb.nttzen.cloud/cve/detail/)
- Name: SimpleHelp Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: simple-help.com/kb---security- ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7399 (secdb.nttzen.cloud/cve/detail/)
- Name: Samsung MagicINFO 9 Server Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Samsung
- Product: MagicINFO 9 Server
- Notes: security.samsungtv.com/securit ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-29635 (secdb.nttzen.cloud/cve/detail/)
- Name: D-Link DIR-823X Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: D-Link
- Product: DIR-823X
- Notes: supportannouncement.us.dlink.c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260424 #cisa20260424 #cve_2024_57726 #cve_2024_57728 #cve_2024_7399 #cve_2025_29635 #cve202457726 #cve202457728 #cve20247399 #cve202529635

##

cisakevtracker@mastodon.social at 2026-04-24T18:01:08.000Z ##

CVE ID: CVE-2024-7399
Vendor: Samsung
Product: MagicINFO 9 Server
Date Added: 2026-04-24
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-04-24T17:29:17.000Z ##

Broadcom has a new advisory for a critical vulnerability:

Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat support.broadcom.com/web/ecx/s #Broadcom #Apache

CISA has updated the KEV catalogue:

- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Samsung #DLink

Cisco has two advisories for high-severity vulnerabilities:

- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi

- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-41472(CVSS UNKNOWN)

EPSS: 0.67%

updated 2026-04-24T21:32:03

1 posts

CyberPanel versions prior to 2.4.4 contain a stored cross-site scripting vulnerability in the AI Scanner dashboard where the POST /api/ai-scanner/callback endpoint lacks authentication and allows unauthenticated attackers to inject malicious JavaScript by overwriting the findings_json field of ScanHistory records. Attackers can inject JavaScript that executes in an administrator's authenticated se

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-41044
(8.8 HIGH)

EPSS: 0.10%

updated 2026-04-24T21:32:00

1 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All. An authenticated attacker can use the admin web console page to construct a malicious broker name that bypasses name validation to include an xbean binding that can be later used by a VM transport to load a remote Spring XML applicatio

thehackerwire@mastodon.social at 2026-04-24T20:10:20.000Z ##

🟠 CVE-2026-41044 - High (8.8)

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All.

An authenticated attacker can use the admin web console page to construct a malici...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40466
(8.8 HIGH)

EPSS: 0.21%

updated 2026-04-24T21:32:00

1 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ. An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a connector using an HTTP Discovery transport via BrokerView.addNetworkConnector or BrokerView.addConnector through Jolokia if the activemq-http module is on th

thehackerwire@mastodon.social at 2026-04-24T20:10:11.000Z ##

🟠 CVE-2026-40466 - High (8.8)

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ.

An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a conne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23902
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-24T21:32:00

1 posts

Incorrect Authorization vulnerability in Apache DolphinScheduler allows authenticated users with system login permissions to use tenants that are not defined on the platform during workflow execution. This issue affects Apache DolphinScheduler versions prior to 3.4.1.  Users are recommended to upgrade to version 3.4.1, which fixes this issue.

thehackerwire@mastodon.social at 2026-04-24T20:10:02.000Z ##

🟠 CVE-2026-23902 - High (8.1)

Incorrect Authorization vulnerability in Apache DolphinScheduler allows authenticated users with system login permissions to use tenants that are not defined on the platform during workflow execution.

This issue affects Apache DolphinScheduler ve...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40887
(9.1 CRITICAL)

EPSS: 5.38%

updated 2026-04-24T21:10:19

1 posts

## Summary An unauthenticated SQL injection vulnerability exists in the Vendure Shop API. A user-controlled query string parameter is interpolated directly into a raw SQL expression without parameterization or validation, allowing an attacker to execute arbitrary SQL against the database. This affects all supported database backends (PostgreSQL, MySQL/MariaDB, SQLite). The Admin API is also affe

Nuclei template

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-41273
(8.2 HIGH)

EPSS: 0.06%

updated 2026-04-24T21:01:23

1 posts

### Summary Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated with a public chatflow. By accessing a public chatflow configuration endpoint, an attacker can retrieve internal workflow data, including OAuth credential identifiers, which can then be used to refresh and obtain valid OAuth 2.0 access tokens wit

thehackerwire@mastodon.social at 2026-04-25T01:11:29.000Z ##

🟠 CVE-2026-41273 - High (8.2)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, Flowise contains an authentication bypass vulnerability that allows an unauthenticated attacker to obtain OAuth 2.0 access tokens associated w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41275
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-24T21:01:15

1 posts

**Summary:** The password reset functionality on [cloud.flowiseai.com](http://cloud.flowiseai.com/) sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This behavior introduces the risk of a man-in-the-middle (MITM) attack, where an attacker on the same network as the user (e.g., public Wi-Fi) can intercept the reset link and gain unauthorized access to the victim’s acco

thehackerwire@mastodon.social at 2026-04-25T01:00:25.000Z ##

🟠 CVE-2026-41275 - High (7.5)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the password reset functionality on cloud.flowiseai.com sends a reset password link over the unsecured HTTP protocol instead of HTTPS. This be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41276
(9.8 CRITICAL)

EPSS: 0.18%

updated 2026-04-24T21:01:10

1 posts

ZDI-CAN-28762: Flowise AccountService resetPassword Authentication Bypass Vulnerability -- ABSTRACT ------------------------------------- Trend Micro's Zero Day Initiative has identified a vulnerability affecting the following products: Flowise - Flowise -- VULNERABILITY DETAILS ------------------------ * Version tested: 3.0.12 * Installer file: hxxps://github.com/FlowiseAI/Flowise * Platform

thehackerwire@mastodon.social at 2026-04-25T01:00:36.000Z ##

🔴 CVE-2026-41276 - Critical (9.8)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, this vulnerability allows remote attackers to bypass authentication on affected installations of FlowiseAI Flowise. Authentication is not requ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41277
(8.8 HIGH)

EPSS: 0.12%

updated 2026-04-24T21:01:05

1 posts

### Summary A Mass Assignment vulnerability in the DocumentStore creation endpoint allows authenticated users to control the primary key (id) and internal state fields of DocumentStore entities. Because the service uses repository.save() with a client-supplied primary key, the POST create endpoint behaves as an implicit UPSERT operation. This enables overwriting existing DocumentStore objects. I

thehackerwire@mastodon.social at 2026-04-25T01:00:46.000Z ##

🟠 CVE-2026-41277 - High (8.8)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Mass Assignment vulnerability in the DocumentStore creation endpoint allows authenticated users to control the primary key (id) and internal...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41279
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-24T21:00:53

1 posts

### Summary The text-to-speech generation endpoint (`POST /api/v1/text-to-speech/generate`) is whitelisted (no auth) and accepts a `credentialId` directly in the request body. When called without a `chatflowId`, the endpoint uses the provided `credentialId` to decrypt the stored credential (e.g., OpenAI or ElevenLabs API key) and generate speech. ### Root Cause ```typescript // packages/server/

thehackerwire@mastodon.social at 2026-04-25T01:10:36.000Z ##

🟠 CVE-2026-41279 - High (7.5)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the text-to-speech generation endpoint (POST /api/v1/text-to-speech/generate) is whitelisted (no auth) and accepts a credentialId directly in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41265
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-04-24T20:58:07

1 posts

ZDI-CAN-29412: FlowiseAI Flowise Airtable_Agent Code Injection Remote Code Execution Vulnerability Trend Micro's Zero Day Initiative has identified a vulnerability affecting the following products: Flowise - Flowise -- VULNERABILITY DETAILS ------------------------ * Version tested: 3.0.13 * Installer file: hxxps://github.com/FlowiseAI/Flowise * Platform tested: Ubuntu 25.10 --- ### Analy

thehackerwire@mastodon.social at 2026-04-25T02:00:02.000Z ##

🔴 CVE-2026-41265 - Critical (9.8)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the Airtable_Agents class. The issue results from the lack of proper sandboxing when evaluat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41266
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-24T20:58:07

1 posts

### Summary `/api/v1/public-chatbotConfig/:id `ep exposes sensitive data including API keys, HTTP authorization headers and internal configuration without any authentication. An attacker with knowledge just of a chatflow UUID can retrieve credentials stored in password type fields and HTTP headers, leading to credential theft and more. ### Details Knowledge of chatflow UUID can be obtained from

thehackerwire@mastodon.social at 2026-04-25T01:10:46.000Z ##

🟠 CVE-2026-41266 - High (7.5)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, /api/v1/public-chatbotConfig/:id ep exposes sensitive data including API keys, HTTP authorization headers and internal configuration without a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41180
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-24T20:52:12

1 posts

### Summary The upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later writes using the decoded `req.params.uploadId`. In deployments that use a supported custom `PSITRANSFER_UPLOAD_DIR` whose basename prefixes a startup-loaded JavaScript path, such as `conf`, an unauthenticated attacker can create `co

thehackerwire@mastodon.social at 2026-04-25T22:00:10.000Z ##

🟠 CVE-2026-41180 - High (7.5)

PsiTransfer is an open source, self-hosted file sharing solution. Prior to version 2.4.3, the upload PATCH flow under `/files/:uploadId` validates the mounted request path using the still-encoded `req.path`, but the downstream tus handler later wr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41137
(8.8 HIGH)

EPSS: 0.28%

updated 2026-04-24T20:44:06

1 posts

### Summary The CSVAgent allows providing a custom Pandas CSV read code. Due to lack of sanitization, an attacker can provide the following payload: `DataFrame({'foo': ['bar!']});import os;os.system('whoami')` that will get interpolated and executed by the server. ### Details The code in question that introduces the issue is in [CSVAgent.ts](https://github.com/FlowiseAI/Flowise/blob/78674897270d5

thehackerwire@mastodon.social at 2026-04-25T01:11:39.000Z ##

🟠 CVE-2026-41137 - High (8.8)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, The CSVAgent allows providing a custom Pandas CSV read code. Due to lack of sanitization, an attacker can provide a command injection payload ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-57728
(7.2 HIGH)

EPSS: 50.59%

updated 2026-04-24T19:27:00.700000

3 posts

SimpleHelp remote support software v5.5.7 and before allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.

secdb@infosec.exchange at 2026-04-24T20:00:16.000Z ##

🚨 [CISA-2026:0424] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-57726 (secdb.nttzen.cloud/cve/detail/)
- Name: SimpleHelp Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: simple-help.com/kb---security- ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-57728 (secdb.nttzen.cloud/cve/detail/)
- Name: SimpleHelp Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: simple-help.com/kb---security- ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7399 (secdb.nttzen.cloud/cve/detail/)
- Name: Samsung MagicINFO 9 Server Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Samsung
- Product: MagicINFO 9 Server
- Notes: security.samsungtv.com/securit ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-29635 (secdb.nttzen.cloud/cve/detail/)
- Name: D-Link DIR-823X Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: D-Link
- Product: DIR-823X
- Notes: supportannouncement.us.dlink.c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260424 #cisa20260424 #cve_2024_57726 #cve_2024_57728 #cve_2024_7399 #cve_2025_29635 #cve202457726 #cve202457728 #cve20247399 #cve202529635

##

cisakevtracker@mastodon.social at 2026-04-24T18:01:23.000Z ##

CVE ID: CVE-2024-57728
Vendor: SimpleHelp
Product: SimpleHelp
Date Added: 2026-04-24
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-04-24T17:29:17.000Z ##

Broadcom has a new advisory for a critical vulnerability:

Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat support.broadcom.com/web/ecx/s #Broadcom #Apache

CISA has updated the KEV catalogue:

- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Samsung #DLink

Cisco has two advisories for high-severity vulnerabilities:

- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi

- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-39920
(9.8 CRITICAL)

EPSS: 0.20%

updated 2026-04-24T18:31:18

2 posts

BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console using default credentials, upload a malicious Java archive as a web service, and execute arbitrary com

offseq@infosec.exchange at 2026-04-25T09:00:27.000Z ##

🔥 CVE-2026-39920: BridgeHead FileStore <24A has a CRITICAL flaw — Apache Axis2 admin exposed with default creds, allowing unauthenticated remote OS command execution. Restrict access, change creds & monitor! Patch status pending. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Cybersecurity

##

thehackerwire@mastodon.social at 2026-04-24T20:07:25.000Z ##

🔴 CVE-2026-39920 - Critical (9.8)

BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS command...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-29635
(8.8 HIGH)

EPSS: 58.94%

updated 2026-04-24T18:30:36

4 posts

A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.

beyondmachines1@infosec.exchange at 2026-04-26T08:01:09.000Z ##

Mirai Botnet Exploits Critical RCE Flaw in End-of-Life D-Link Routers

A Mirai-based botnet campaign is actively exploiting CVE-2025-29635, a command injection flaw in end-of-life D-Link DIR-823X routers, to execute remote code via crafted POST requests and enlist devices for DDoS attacks.

**If you are using D-Link DIR-823X routerm you are under attack. Make sure its management interface is isolated from the internet and accessible only from trusted networks. Since this device is end-of-life with no patch coming for CVE-2025-29635, replace it with a currently supported model.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-04-24T20:00:16.000Z ##

🚨 [CISA-2026:0424] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-57726 (secdb.nttzen.cloud/cve/detail/)
- Name: SimpleHelp Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: simple-help.com/kb---security- ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-57728 (secdb.nttzen.cloud/cve/detail/)
- Name: SimpleHelp Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: simple-help.com/kb---security- ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7399 (secdb.nttzen.cloud/cve/detail/)
- Name: Samsung MagicINFO 9 Server Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Samsung
- Product: MagicINFO 9 Server
- Notes: security.samsungtv.com/securit ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-29635 (secdb.nttzen.cloud/cve/detail/)
- Name: D-Link DIR-823X Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: D-Link
- Product: DIR-823X
- Notes: supportannouncement.us.dlink.c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260424 #cisa20260424 #cve_2024_57726 #cve_2024_57728 #cve_2024_7399 #cve_2025_29635 #cve202457726 #cve202457728 #cve20247399 #cve202529635

##

cisakevtracker@mastodon.social at 2026-04-24T18:00:52.000Z ##

CVE ID: CVE-2025-29635
Vendor: D-Link
Product: DIR-823X
Date Added: 2026-04-24
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-04-24T17:29:17.000Z ##

Broadcom has a new advisory for a critical vulnerability:

Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat support.broadcom.com/web/ecx/s #Broadcom #Apache

CISA has updated the KEV catalogue:

- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Samsung #DLink

Cisco has two advisories for high-severity vulnerabilities:

- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi

- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2024-57726
(8.8 HIGH)

EPSS: 49.10%

updated 2026-04-24T18:30:36

3 posts

SimpleHelp remote support software v5.5.7 and before has a vulnerability that allows low-privileges technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.

secdb@infosec.exchange at 2026-04-24T20:00:16.000Z ##

🚨 [CISA-2026:0424] CISA Adds 4 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 4 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2024-57726 (secdb.nttzen.cloud/cve/detail/)
- Name: SimpleHelp Missing Authorization Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: simple-help.com/kb---security- ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-57728 (secdb.nttzen.cloud/cve/detail/)
- Name: SimpleHelp Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: SimpleHelp
- Product: SimpleHelp
- Notes: simple-help.com/kb---security- ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2024-7399 (secdb.nttzen.cloud/cve/detail/)
- Name: Samsung MagicINFO 9 Server Path Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Samsung
- Product: MagicINFO 9 Server
- Notes: security.samsungtv.com/securit ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2025-29635 (secdb.nttzen.cloud/cve/detail/)
- Name: D-Link DIR-823X Command Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: D-Link
- Product: DIR-823X
- Notes: supportannouncement.us.dlink.c ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260424 #cisa20260424 #cve_2024_57726 #cve_2024_57728 #cve_2024_7399 #cve_2025_29635 #cve202457726 #cve202457728 #cve20247399 #cve202529635

##

cisakevtracker@mastodon.social at 2026-04-24T18:01:38.000Z ##

CVE ID: CVE-2024-57726
Vendor: SimpleHelp
Product: SimpleHelp
Date Added: 2026-04-24
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

AAKL@infosec.exchange at 2026-04-24T17:29:17.000Z ##

Broadcom has a new advisory for a critical vulnerability:

Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat support.broadcom.com/web/ecx/s #Broadcom #Apache

CISA has updated the KEV catalogue:

- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Samsung #DLink

Cisco has two advisories for high-severity vulnerabilities:

- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi

- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2026-6912
(8.8 HIGH)

EPSS: 0.15%

updated 2026-04-24T17:56:41.280000

2 posts

Improperly controlled modification of dynamically-determined object attributes in the Cognito User Pool configuration in AWS Ops Wheel before PR #165 allows remote authenticated users to escalate to deployment admin privileges and manage Cognito user accounts via a crafted UpdateUserAttributes API call that sets the custom:deployment_admin attribute. To remediate this issue, users should redeploy

thehackerwire@mastodon.social at 2026-04-24T19:42:23.000Z ##

🟠 CVE-2026-6912 - High (8.8)

Improperly controlled modification of dynamically-determined object attributes in the Cognito User Pool configuration in AWS Ops Wheel before PR #165 allows remote authenticated users to escalate to deployment admin privileges and manage Cognito u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

awssecurityfeed@infosec.exchange at 2026-04-24T17:00:01.000Z ##

Issue with AWS Ops Wheel (CVE-2026-6911 and CVE-2026-6912

Bulletin ID: 2026-018-AWS Scope: AWS Content Type: Important (requires attention) Publication Date: 2026/04/24 09:15 AM PDT
Description:
AWS Ops Wheel is an open-source tool that helps teams make random selections using a virtua...

aws.amazon.com/security/securi

#aws #security

##

CVE-2026-41271
(8.3 HIGH)

EPSS: 0.06%

updated 2026-04-24T16:37:54.877000

1 posts

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers to force the server to make arbitrary HTTP requests to internal and external systems. By injecting malicious prompt templates, attackers can bypass the in

thehackerwire@mastodon.social at 2026-04-25T01:11:19.000Z ##

🟠 CVE-2026-41271 - High (8.3)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, a Server-Side Request Forgery (SSRF) vulnerability exists in FlowiseAI's POST/GET API Chain components that allows unauthenticated attackers t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41278
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-24T16:31:51.023000

1 posts

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GET /api/v1/public-chatflows/:id endpoint returns the full chatflow object without sanitization for public chatflows. Docker validation revealed this is worse than initially assessed: the sanitizeFlowDataForPublicEndpoint function does NOT exist in the released v3.0.13 Docker image. Both pu

thehackerwire@mastodon.social at 2026-04-25T01:10:26.000Z ##

🟠 CVE-2026-41278 - High (7.5)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the GET /api/v1/public-chatflows/:id endpoint returns the full chatflow object without sanitization for public chatflows. Docker validation re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33524
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-24T16:25:17

1 posts

## Summary ### Unbounded Memory Allocation (all platforms) A crafted payload as small as 4-5 bytes can force memory allocations of up to 16 GB, crashing any process with an OOM error (Denial of Service). **Affected code (C++):** - `cpp/runtime/src/zserio/Array.h` (line 1029) — `m_rawArray.reserve(readLength)` with unchecked `readLength` - `cpp/runtime/src/zserio/BitStreamReader.h` (lines 249, 2

thehackerwire@mastodon.social at 2026-04-24T19:41:46.000Z ##

🟠 CVE-2026-33524 - High (7.5)

Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, a crafted payload as small as 4-5 bytes can force memory allocations of up to 16 GB, crashing any process with an OOM error ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41492
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-24T16:15:29

2 posts

### Summary Dgraph `v25.3.2` still exposes the process command line through the unauthenticated `/debug/vars` endpoint on Alpha. Because the admin token is commonly supplied via the `--security "token=..."` startup flag, an unauthenticated attacker can retrieve that token and replay it in the `X-Dgraph-AuthToken` header to access admin-only endpoints. This is a variant of the previously fixed `/d

offseq@infosec.exchange at 2026-04-25T01:30:29.000Z ##

⚠️ CRITICAL: dgraph-io Dgraph (< 25.3.3) leaks admin tokens via unauthenticated /debug/vars endpoint. Attackers can gain admin access! Patch to 25.3.3+ ASAP. CVE-2026-41492 | More: radar.offseq.com/threat/cve-20 #OffSeq #CVE202641492 #Dgraph #Vulnerability

##

thehackerwire@mastodon.social at 2026-04-24T19:41:02.000Z ##

🔴 CVE-2026-41492 - Critical (9.8)

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, Dgraphl exposes the process command line through the unauthenticated /debug/vars endpoint on Alpha. Because the admin token is commonly supplied via the --security "token=..."...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41327
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-24T15:41:25

3 posts

## 1. Executive Summary A vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configuration where ACL is not enabled. The attack is a single HTTP POST to `/mutate?commitNow=true` containing a crafted `cond` field in an upsert mutation. The `cond` value is concatenated directly into a

offseq@infosec.exchange at 2026-04-25T03:00:27.000Z ##

🚨 CRITICAL vuln: CVE-2026-41327 in dgraph-io dgraph (<25.3.3). Unauthenticated attacker can exfiltrate all DB data with a crafted POST via upsert mutation. Upgrade to 25.3.3+ or enable ACL ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Vuln #GraphQL #DataLeak

##

thehackerwire@mastodon.social at 2026-04-24T19:44:11.000Z ##

🔴 CVE-2026-41327 - Critical (9.1)

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-24T19:41:35.000Z ##

🔴 CVE-2026-41327 - Critical (9.1)

Dgraph is an open source distributed GraphQL database. Prior to 25.3.3, a vulnerability has been found in Dgraph that gives an unauthenticated attacker full read access to every piece of data in the database. This affects Dgraph's default configur...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21728
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-24T15:33:39

1 posts

Tempo queries with large limits can cause large memory allocations which can impact the availability of the service, depending on its deployment strategy. Mitigation can be done by setting max_result_limit in the search config, e.g. to 262144 (2^18).

thehackerwire@mastodon.social at 2026-04-24T22:00:34.000Z ##

🟠 CVE-2026-21728 - High (7.5)

Tempo queries with large limits can cause large memory allocations which can impact the availability of the service, depending on its deployment strategy.

Mitigation can be done by setting max_result_limit in the search config, e.g. to 262144 (2^...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6919
(9.7 CRITICAL)

EPSS: 0.11%

updated 2026-04-24T15:33:34

2 posts

Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

nyanbinary@infosec.exchange at 2026-04-25T11:42:26.000Z ##

@andrewnez hm, is that search correct? The 343 on linked NVD page seems to include e.g. CVE-2026-6919 which isnt really related?

It's not an in any way relevant difference (4 false associations) but now I am really curious why those are associated....

##

thehackerwire@mastodon.social at 2026-04-25T02:00:12.000Z ##

🔴 CVE-2026-6919 - Critical (9.6)

Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21515
(10.0 CRITICAL)

EPSS: 0.08%

updated 2026-04-24T15:32:39

2 posts

Exposure of sensitive information to an unauthorized actor in Azure IOT Central allows an authorized attacker to elevate privileges over a network.

Matchbook3469@mastodon.social at 2026-04-27T11:51:34.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-04-20 to 2026-04-26

Roundup | CRITICAL
CVEs: CVE-2026-21515, CVE-2026-32613, CVE-2026-33819

Cybersecurity roundup for 2026-04-20 to 2026-04-26. 10 CVE advisories, 2 breach reports, 5 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#CyberSecurity #CVE #ThreatHunting

##

thehackerwire@mastodon.social at 2026-04-24T20:07:44.000Z ##

🔴 CVE-2026-21515 - Critical (9.9)

Exposure of sensitive information to an unauthorized actor in Azure IOT Central allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5367
(8.6 HIGH)

EPSS: 0.03%

updated 2026-04-24T15:32:39

1 posts

A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds of a packet. This out-of-bounds read can lead to the disclosure of sensitive information stored in heap memory, which is then returned to the attacker's

thehackerwire@mastodon.social at 2026-04-24T20:07:35.000Z ##

🟠 CVE-2026-5367 - High (8.6)

A flaw was found in OVN (Open Virtual Network). A remote attacker, by sending crafted DHCPv6 (Dynamic Host Configuration Protocol for IPv6) SOLICIT packets with an inflated Client ID length, could cause the ovn-controller to read beyond the bounds...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41264
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-04-24T15:15:17.923000

1 posts

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the CSV_Agents class. The issue results from the lack of proper sandboxing when evaluating an LLM generated python script. An attacker can leverage this vulnerability to execute code in the context of the user running the server. Using prompt in

thehackerwire@mastodon.social at 2026-04-25T01:59:53.000Z ##

🔴 CVE-2026-41264 - Critical (9.8)

Flowise is a drag & drop user interface to build a customized large language model flow. Prior to 3.1.0, the specific flaw exists within the run method of the CSV_Agents class. The issue results from the lack of proper sandboxing when evaluating a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33694
(0 None)

EPSS: 0.01%

updated 2026-04-24T14:50:56.203000

1 posts

This vulnerability allows an attacker to create a junction, enabling the deletion of arbitrary files with SYSTEM privileges. As a result, this condition potentially facilitates arbitrary code execution, whereby an attacker may exploit the vulnerability to execute malicious code with elevated SYSTEM privileges.

undercodenews@mastodon.social at 2026-04-27T10:10:45.000Z ##

Tenable Fixes High-Severity Nessus Agent Flaw That Could Grant SYSTEM-Level Access on Windows

Introduction Tenable has released an urgent security update after discovering a serious vulnerability in its widely used Nessus Agent software for Windows. The flaw, identified as CVE-2026-33694, could allow attackers with limited local access to escalate privileges and potentially execute malicious code with SYSTEM-level permissions, the highest privilege level in Windows…

undercodenews.com/tenable-fixe

##

CVE-2026-27841
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-24T14:39:56.310000

1 posts

A vulnerability in SenseLive X3050's web management interface allows state-changing operations to be triggered without proper Cross-Site Request Forgery (CSRF) protections. Because the application does not enforce server-side validation of request origin or implement CSRF tokens, a malicious external webpage could cause a user's browser to submit unauthorized configuration requests to the device.

thehackerwire@mastodon.social at 2026-04-24T23:59:51.000Z ##

🟠 CVE-2026-27841 - High (8.1)

A vulnerability in SenseLive X3050's web management interface allows state-changing operations to be triggered without proper Cross-Site Request Forgery (CSRF) protections. Because the application does not enforce server-side validation of reque...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27843
(9.1 CRITICAL)

EPSS: 0.07%

updated 2026-04-24T14:39:56.310000

1 posts

A vulnerability exists in SenseLive X3050's web management interface that allows critical configuration parameters to be modified without sufficient authentication or server-side validation. By applying unsupported or disruptive values to recovery mechanisms and network settings, an attacker can induce a persistent lockout state. Because the device lacks a physical reset button, recovery requires

thehackerwire@mastodon.social at 2026-04-24T23:00:42.000Z ##

🔴 CVE-2026-27843 - Critical (9.1)

A vulnerability exists in SenseLive X3050's web management interface that allows critical configuration parameters to be modified without sufficient authentication or server-side validation. By applying unsupported or disruptive values to recover...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1950
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-24T14:39:28.770000

1 posts

Delta Electronics AS320T has No checking of the length of the buffer with the file name vulnerability.

thehackerwire@mastodon.social at 2026-04-24T22:00:53.000Z ##

🔴 CVE-2026-1950 - Critical (9.8)

Delta Electronics AS320T has
No checking of the length of the buffer with the file name vulnerability.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1952
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-24T09:30:36

1 posts

Delta Electronics AS320T has denial of service via the undocumented subfunction vulnerability.

thehackerwire@mastodon.social at 2026-04-24T22:00:44.000Z ##

🔴 CVE-2026-1952 - Critical (9.8)

Delta Electronics AS320T has denial of service via the undocumented subfunction vulnerability.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35064
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-24T00:32:04

1 posts

A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated discovery of deployed units through the vendor’s management protocol, enabling identification of device presence, identifiers, and management interfaces without requiring credentials. Because discovery functions are exposed by the underlying service rather than gated by authentication, an attacker on the same network

thehackerwire@mastodon.social at 2026-04-24T23:02:01.000Z ##

🟠 CVE-2026-35064 - High (7.5)

A vulnerability in SenseLive X3050’s management ecosystem allows unauthenticated discovery of deployed units through the vendor’s management protocol, enabling identification of device presence, identifiers, and management interfaces without...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39462
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-24T00:32:04

1 posts

A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseLive Config 2.0 tool, the interface may indicate that the password update was successful; however, the system may continue to accept the previous or default

thehackerwire@mastodon.social at 2026-04-24T22:05:56.000Z ##

🟠 CVE-2026-39462 - High (8.1)

A vulnerability exists in SenseLive X3050’s web management interface in which password updates are not reliably applied due to improper handling of credential changes on the backend. After the device undergoes a factory restore using the SenseL...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35503
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-04-24T00:32:04

1 posts

A vulnerability in SenseLive X3050’s web management interface allows authentication logic to be performed entirely on the client side, relying on hardcoded values within browser-executed scripts rather than server-side verification. An attacker with access to the login page could retrieve these exposed parameters and gain unauthorized access to administrative functionality.

thehackerwire@mastodon.social at 2026-04-24T22:05:47.000Z ##

🔴 CVE-2026-35503 - Critical (9.8)

A vulnerability in SenseLive X3050’s web management interface allows authentication logic to be performed entirely on the client side, relying on hardcoded values within browser-executed scripts rather than server-side verification. An attacker...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40630
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-04-24T00:32:04

1 posts

A vulnerability in  SenseLive X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the intended authentication mechanism and directly interact with sensitive configuration functions.

thehackerwire@mastodon.social at 2026-04-24T22:05:38.000Z ##

🔴 CVE-2026-40630 - Critical (9.8)

A vulnerability in 
SenseLive

X3050’s web management interface allows unauthorized access to certain configuration endpoints due to improper access control enforcement. An attacker with network access to the device may be able to bypass the i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25775
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-24T00:32:03

1 posts

A vulnerability in SenseLive X3050’s remote management service allows firmware retrieval and update operations to be performed without authentication or authorization. The service accepts firmware-related requests from any reachable host and does not verify user privileges, integrity of uploaded images, or the authenticity of provided firmware.

thehackerwire@mastodon.social at 2026-04-24T23:02:10.000Z ##

🔴 CVE-2026-25775 - Critical (9.8)

A vulnerability in SenseLive X3050’s remote management service allows firmware retrieval and update operations to be performed without authentication or authorization. The service accepts firmware-related requests from any reachable host and d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40623
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-24T00:32:03

1 posts

A vulnerability in SenseLive X3050's web management interface allows critical system and network configuration parameters to be modified without sufficient validation and safety controls. Due to inadequate enforcement of constraints on sensitive functions, parameters such as IP addressing, watchdog timers, reconnect intervals, and service ports can be set to unsupported or unsafe values. These con

thehackerwire@mastodon.social at 2026-04-24T23:00:32.000Z ##

🟠 CVE-2026-40623 - High (8.1)

A vulnerability in SenseLive X3050's web management interface allows critical system and network configuration parameters to be modified without sufficient validation and safety controls. Due to inadequate enforcement of constraints on sensitive...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40620
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-24T00:32:03

1 posts

A vulnerability in SenseLive X3050’s embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management connections from any reachable host, enabling unrestricted modification of critical configuration parameters, operational modes, and device state through a vendor

thehackerwire@mastodon.social at 2026-04-24T23:00:22.000Z ##

🔴 CVE-2026-40620 - Critical (9.8)

A vulnerability in SenseLive X3050’s embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management conne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33819
(10.0 CRITICAL)

EPSS: 0.27%

updated 2026-04-24T00:31:58

1 posts

Deserialization of untrusted data in Microsoft Bing allows an unauthorized attacker to execute code over a network.

Matchbook3469@mastodon.social at 2026-04-27T11:51:34.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-04-20 to 2026-04-26

Roundup | CRITICAL
CVEs: CVE-2026-21515, CVE-2026-32613, CVE-2026-33819

Cybersecurity roundup for 2026-04-20 to 2026-04-26. 10 CVE advisories, 2 breach reports, 5 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#CyberSecurity #CVE #ThreatHunting

##

CVE-2026-24303
(9.6 CRITICAL)

EPSS: 0.04%

updated 2026-04-24T00:31:58

1 posts

Improper access control in Microsoft Partner Center allows an authorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-04-25T00:00:10.000Z ##

🔴 CVE-2026-24303 - Critical (9.6)

Improper access control in Microsoft Partner Center allows an authorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26150
(8.6 HIGH)

EPSS: 0.06%

updated 2026-04-24T00:31:58

1 posts

Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.

thehackerwire@mastodon.social at 2026-04-25T00:00:00.000Z ##

🟠 CVE-2026-26150 - High (8.6)

Server-side request forgery (ssrf) in Microsoft Purview allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32613
(9.9 CRITICAL)

EPSS: 0.08%

updated 2026-04-23T18:30:37.510000

1 posts

Spinnaker is an open source, multi-cloud continuous delivery platform. Echo like some other services, uses SPeL (Spring Expression Language) to process information - specifically around expected artifacts. In versions prior to 2026.1.0, 2026.0.1, 2025.4.2, and 2025.3.2, unlike orca, it was NOT restricting that context to a set of trusted classes, but allowing FULL JVM access. This enabled a user t

1 repos

https://github.com/ZeroPathAI/spinnaker-poc

Matchbook3469@mastodon.social at 2026-04-27T11:51:34.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-04-20 to 2026-04-26

Roundup | CRITICAL
CVEs: CVE-2026-21515, CVE-2026-32613, CVE-2026-33819

Cybersecurity roundup for 2026-04-20 to 2026-04-26. 10 CVE advisories, 2 breach reports, 5 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#CyberSecurity #CVE #ThreatHunting

##

CVE-2026-41179(CVSS UNKNOWN)

EPSS: 5.98%

updated 2026-04-23T10:52:57

1 posts

### Summary The RC endpoint `operations/fsinfo` is exposed without `AuthRequired: true` and accepts attacker-controlled `fs` input. Because `rc.GetFs(...)` supports inline backend definitions, an unauthenticated attacker can instantiate an attacker-controlled backend on demand. For the WebDAV backend, `bearer_token_command` is executed during backend initialization, making single-request unauthent

Nuclei template

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-22007
(2.9 LOW)

EPSS: 0.02%

updated 2026-04-22T15:31:39

1 posts

Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u481, 8u481-b50, 8u481-perf, 11.0.30, 17.0.18, 21.0.10, 25.0.2, 26; Oracle GraalVM for JDK: 17.0.18 and 21.0.10; Oracle GraalVM Enterprise Edition: 21.3.17. Difficult to exploit vulnerability allo

linux@activitypub.awakari.com at 2026-04-27T20:20:32.000Z ## Debian OpenJDK DSA-6231-1 Important Crypto Key Issues CVE-2026-22007 Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in incorrect generation of cryptograp...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-6770
(6.5 MEDIUM)

EPSS: 0.06%

updated 2026-04-22T15:07:23.650000

3 posts

Other issue in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

undercodenews@mastodon.social at 2026-04-27T11:43:51.000Z ##

Firefox CVE-2026-6770 Vulnerability Exposes Private Browsing and Tor Users to Cross-Site Fingerprinting Risks + Video

Introduction A newly disclosed security vulnerability affecting Mozilla Firefox and Thunderbird has raised serious concerns across the privacy and cybersecurity community. Tracked as CVE-2026-6770, the flaw undermines fundamental expectations of anonymity in private browsing environments, including Tor Browser sessions. What makes this issue…

undercodenews.com/firefox-cve-

##

Mozilla@activitypub.awakari.com at 2026-04-27T11:36:33.000Z ## InfoSec News Nuggets 04/27/2026 Firefox Vulnerability Allows Tor User Fingerprinting Researchers disclosed CVE-2026-6770, an IndexedDB issue that can let sites correlate a user’s activity across ...

#InfoSec #News #Nuggets #AboutDFIR #Lotus #Wiper #news #nuggets #Pack2TheRoot

Origin | Interest | Match ##

Mozilla@activitypub.awakari.com at 2026-04-27T10:49:04.000Z ## Firefox bug CVE-2026-6770 enabled cross-site tracking and Tor fingerprinting CVE-2026-6770 let attackers fingerprint Firefox and Tor users, even in Private mode. Firefox 150 and Tor Browser 15.0.10...

#Breaking #News #Security #CVE-2026-6770 #fingerprinting #Firefox #Hacking #hacking #news #information #security

Origin | Interest | Match ##

CVE-2026-6799
(6.3 MEDIUM)

EPSS: 1.41%

updated 2026-04-22T00:31:48

1 posts

A security flaw has been discovered in Comfast CF-N1-S 2.6.0.1. Affected by this issue is some unknown functionality of the file /cgi-bin/mbox-config?method=SET&section=ping_config of the component Endpoint. Performing a manipulation of the argument destination results in command injection. The attack can be initiated remotely. The exploit has been released to the public and may be used for attack

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-38834
(7.3 HIGH)

EPSS: 5.28%

updated 2026-04-21T21:32:31

1 posts

Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerability in the do_ping_action function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-3298(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-04-21T21:31:23

1 posts

The method "sock_recvfrom_into()" of "asyncio.ProacterEventLoop" (Windows only) was missing a boundary check for the data buffer when using nbytes parameter. This allowed for an out-of-bounds buffer write if data was larger than the buffer size. Non-Windows platforms are not affected.

beyondmachines1@infosec.exchange at 2026-04-25T08:01:09.000Z ##

Python asyncio Vulnerability Exposes Windows Systems to Remote Code Execution

A high-severity out-of-bounds write vulnerability (CVE-2026-3298) in Python's asyncio module on Windows allows remote attackers to cause memory corruption or execute arbitrary code. The flaw affects Python versions 3.11 through 3.14 and requires immediate patching or code-level mitigations.

**If you're running Python applications on Windows (versions 3.11 through 3.14) that use asyncio for network communication, upgrade to the latest patched Python version as soon as it's available. Until then, avoid using the sock_recvfrom_into() method with untrusted network traffic, and watch for unexpected crashes on your Windows Python servers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-40050
(9.8 CRITICAL)

EPSS: 0.32%

updated 2026-04-21T18:32:04

2 posts

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does not affect Next-Gen SIEM customers. The vulnerability exists in a specific cluster API endpoint that, if exposed, allows a remote attacker to read arbitrar

netsecio@mastodon.social at 2026-04-27T19:31:55.000Z ##

📰 Critical Unauthenticated Path Traversal Flaw Found in CrowdStrike LogScale

🚨 CRITICAL FLAW: CrowdStrike patches an unauthenticated path traversal vulnerability (CVE-2026-40050) in self-hosted LogScale. The bug could allow remote attackers to read any file on the server. Patch immediately! #CyberSecurity #Vulnerability

🔗 cyber.netsecops.io

##

beyondmachines1@infosec.exchange at 2026-04-24T20:01:09.000Z ##

CrowdStrike Patches Critical Path Traversal Vulnerability in LogScale

CrowdStrike patched a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale that allows remote attackers to read arbitrary files from self-hosted server filesystems.

**If you use self-hosted LogScale, plan a quick update to a patched version ASAP. Always keep your cluster API endpoints behind a firewall or VPN to limit exposure to attackers.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-21571(CVSS UNKNOWN)

EPSS: 1.17%

updated 2026-04-21T18:32:04

1 posts

This Critical severity OS Command Injection vulnerability was introduced in versions 9.6.0, 10.0.0, 10.1.0, 10.2.0, 11.0.0, 11.1.0, 12.0.0, and 12.1.0 of Bamboo Data Center.   This RCE (Remote Code Execution) vulnerability, with a CVSS Score of 9.4 and a CVSS Vector of CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H allows an authenticated attacker to execute commands on the remote

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2019-25714(CVSS UNKNOWN)

EPSS: 0.78%

updated 2026-04-21T18:32:04

1 posts

Seeyon OA A8 contains an unauthenticated arbitrary file write vulnerability in the /seeyon/htmlofficeservlet endpoint that allows remote attackers to write arbitrary files to the web application root by sending specially crafted POST requests with custom base64-encoded payloads. Attackers can write JSP webshells to the web root and execute them through the web server to achieve arbitrary OS comman

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5752
(9.4 CRITICAL)

EPSS: 0.02%

updated 2026-04-21T15:33:24

1 posts

Sandbox Escape Vulnerability in Terrarium allows arbitrary code execution with root privileges on a host process via JavaScript prototype chain traversal.

_r_netsec@infosec.exchange at 2026-04-24T14:28:05.000Z ##

Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes blog.barrack.ai/pyodide-sandbo

##

CVE-2026-33626
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-21T15:04:13

4 posts

## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. ## Affected Versions - **Tested on:** main branch (2026-02-04) -

vitobotta@mastodon.social at 2026-04-25T12:28:05.000Z ##

Thirteen hours from disclosure to exploitation. CVE-2026-33626 in LMDeploy is an SSRF that hits cloud metadata and internal services. If you run LMDeploy, patch it.

##

hackerworkspace@infosec.exchange at 2026-04-25T06:25:19.000Z ##

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure

thehackernews.com/2026/04/lmde

Read on HackerWorkspace: hackerworkspace.com/article/lm

#cybersecurity #aisecurity #vulnerability

##

beyondmachines1@infosec.exchange at 2026-04-24T19:01:09.000Z ##

LMDeploy AI Inference Engine Exploited Hours After SSRF Disclosure

LMDeploy's vision-language module contains a high-severity SSRF vulnerability (CVE-2026-33626) that attackers exploited within 13 hours to scan internal networks and target cloud metadata. The flaw allows unauthenticated users to bypass network restrictions by providing malicious image URLs to the inference server.

**If you're running LMDeploy, immediately update to version 0.12.3 or later to patch the SSRF vulnerability (CVE-2026-33626). Also, enforce IMDSv2 with required session tokens on your cloud instances and restrict outbound network traffic from inference servers to block credential theft and internal scanning.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

_r_netsec@infosec.exchange at 2026-04-24T16:28:05.000Z ##

Exploit su LMDeploy CVE-2026-33626: attacco SSRF immediato dopo disclosure deafnews.it/article/exploit-su

##

CVE-2025-48700
(6.1 MEDIUM)

EPSS: 18.76%

updated 2026-04-21T13:00:03.373000

1 posts

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 and 10.1. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, specifically involving crafted ta

beyondmachines1@infosec.exchange at 2026-04-26T12:01:10.000Z ##

Zimbra XSS Flaw Actively Exploited

CISA has added CVE-2025-48700, an actively exploited XSS vulnerability in Zimbra Collaboration Suite's Classic UI, to its Known Exploited Vulnerabilities Catalog. Over 10,500 are unpatched instances still exposed online despite patches being available since June 2025.

**If you run Zimbra Collaboration Suite, immediately upgrade to a patched version (ZCS 8.8.15 Patch 47, 9.0.0 Patch 43, 10.0.12, or 10.1.4 or later) since this flaw is being actively exploited. Then audit your mail servers for signs of compromise. Check for suspicious mail forwarding rules, recent TGZ exports, and unexpected MFA or application password changes.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-5965
(9.8 CRITICAL)

EPSS: 8.66%

updated 2026-04-21T06:30:32

1 posts

NewSoftOA developed by NewSoft has an OS Command Injection vulnerability, allowing unauthenticated local attackers to inject arbitrary OS commands and execute them on the server.

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-20133
(6.5 MEDIUM)

EPSS: 1.20%

updated 2026-04-20T21:32:43

1 posts

A vulnerability in Cisco Catalyst SD-WAN Manager could allow an unauthenticated, remote attacker to view sensitive information on an affected system. This vulnerability is due to insufficient file system access restrictions. An attacker could exploit this vulnerability by accessing the API of an affected system. A successful exploit could allow the attacker to read sensitive information on the un

LLMs@activitypub.awakari.com at 2026-04-26T17:42:22.000Z ## CISA Orders Agencies to Secure Cisco SD-WAN Systems After New Flaw Hits Exploited List CISA has added CVE-2026-20133, a Cisco Catalyst SD-WAN Manager vulnerability, to its Known Exploited Vulnerabi...

#News

Origin | Interest | Match ##

CVE-2026-34197
(8.8 HIGH)

EPSS: 65.07%

updated 2026-04-16T19:59:38.107000

1 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

9 repos

https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

https://github.com/keraattin/CVE-2026-34197

https://github.com/DEVSECURITYSPRO/CVE-2026-34197

https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197

https://github.com/dinosn/CVE-2026-34197

https://github.com/hg0434hongzh0/CVE-2026-34197

https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-

https://github.com/0xBlackash/CVE-2026-34197

https://github.com/Catherines77/ActiveMQ-EXPtools

thehackerwire@mastodon.social at 2026-04-24T20:10:11.000Z ##

🟠 CVE-2026-40466 - High (8.8)

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ.

An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a conne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32202
(4.3 MEDIUM)

EPSS: 0.09%

updated 2026-04-14T18:30:51

2 posts

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

CVE-2026-34478(CVSS UNKNOWN)

EPSS: 0.15%

updated 2026-04-14T00:13:31

1 posts

Apache Log4j Core's [`Rfc5424Layout`](https://logging.apache.org/log4j/2.x/manual/layouts.html#RFC5424Layout), in versions 2.21.0 through 2.25.3, is vulnerable to log injection via CRLF sequences due to undocumented renames of security-relevant configuration attributes. Two distinct issues affect users of stream-based syslog services who configure Rfc5424Layout directly: * The `newLineEscape`

eed3si9n@mastodon.social at 2026-04-27T06:50:09.000Z ##

released sbt 1.12.10, featuring
- update to log4j 2.25.4, fixing CVE-2026-34477, CVE-2026-34478, CVE-2026-34479, and CVE-2026-34480
- eviction error in `Test` configuration, backported from sbt 2.x
eed3si9n.com/sbt-1.12.10 #Scala

##

CVE-2026-34479(CVSS UNKNOWN)

EPSS: 0.16%

updated 2026-04-14T00:11:01

1 posts

The `Log4j1XmlLayout` from the Apache Log4j 1-to-Log4j 2 bridge fails to escape characters forbidden by the XML 1.0 standard, producing malformed XML output. Conforming XML parsers are required to reject documents containing such characters with a fatal error, which may cause downstream log processing systems to drop or fail to index affected records. Two groups of users are affected: * Those us

eed3si9n@mastodon.social at 2026-04-27T06:50:09.000Z ##

released sbt 1.12.10, featuring
- update to log4j 2.25.4, fixing CVE-2026-34477, CVE-2026-34478, CVE-2026-34479, and CVE-2026-34480
- eviction error in `Test` configuration, backported from sbt 2.x
eed3si9n.com/sbt-1.12.10 #Scala

##

CVE-2026-34480(CVSS UNKNOWN)

EPSS: 0.15%

updated 2026-04-13T23:57:23

1 posts

Apache Log4j Core's [`XmlLayout`](https://logging.apache.org/log4j/2.x/manual/layouts.html#XmlLayout), in versions up to and including 2.25.3, fails to sanitize characters forbidden by the [XML 1.0 specification](https://www.w3.org/TR/xml/#charsets), producing invalid XML output whenever a log message or MDC value contains such characters. The impact depends on the StAX implementation in use:

eed3si9n@mastodon.social at 2026-04-27T06:50:09.000Z ##

released sbt 1.12.10, featuring
- update to log4j 2.25.4, fixing CVE-2026-34477, CVE-2026-34478, CVE-2026-34479, and CVE-2026-34480
- eviction error in `Test` configuration, backported from sbt 2.x
eed3si9n.com/sbt-1.12.10 #Scala

##

CVE-2026-21643
(9.8 CRITICAL)

EPSS: 43.14%

updated 2026-04-13T18:31:39

1 posts

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Nuclei template

2 repos

https://github.com/0xBlackash/CVE-2026-21643

https://github.com/alirezac0/CVE-2026-21643

cyberveille@mastobot.ping.moi at 2026-04-27T20:30:25.000Z ##

📢 CVE-2026-21643 : Injection SQL critique dans FortiClient EMS activement exploitée
📝 ## 🔍 Contexte

Rapport publié le 27 avril 2026 par CrowdSec sur la plateforme VulnTracking, basé sur...
📖 cyberveille : cyberveille.ch/posts/2026-04-2
🌐 source : crowdsec.net/vulntracking-repo
#CISA_KEV #CVE_2026_21643 #Cyberveille

##

CVE-2026-34477
(0 None)

EPSS: 0.14%

updated 2026-04-13T15:02:06.187000

1 posts

The fix for CVE-2025-68161 https://logging.apache.org/security.html#CVE-2025-68161 was incomplete: it addressed hostname verification only when enabled via the log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName system property, but not when configured through the verifyHostName https://logging.apache.org/log4j/2.x/manual/appende

eed3si9n@mastodon.social at 2026-04-27T06:50:09.000Z ##

released sbt 1.12.10, featuring
- update to log4j 2.25.4, fixing CVE-2026-34477, CVE-2026-34478, CVE-2026-34479, and CVE-2026-34480
- eviction error in `Test` configuration, backported from sbt 2.x
eed3si9n.com/sbt-1.12.10 #Scala

##

CVE-2026-35414
(4.2 MEDIUM)

EPSS: 0.02%

updated 2026-04-02T18:31:50

1 posts

OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.

netsecio@mastodon.social at 2026-04-27T19:31:34.000Z ##

📰 Decade-Old OpenSSH Flaw (CVE-2026-35414) Allows Full Root Access, Exploits Hard to Detect

🚨 CRITICAL: A 15-year-old flaw in OpenSSH (CVE-2026-35414) allows attackers to gain full root access. The bug is trivial to exploit and hard to detect in logs. Update to OpenSSH 10.3p1 immediately! 🛡️ #OpenSSH #CVE #Linux #CyberSecurity

🔗 cyber.netsecops.io

##

CVE-2026-4747
(8.8 HIGH)

EPSS: 0.09%

updated 2026-04-01T15:30:57

2 posts

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerabl

2 repos

https://github.com/kaleth4/CVE-2026-4747-

https://github.com/kaleth4/CVE-2026-4747

grahamperrin@bsd.cafe at 2026-04-27T05:37:16.000Z ##

@bagder maybe edit your post to show his full name:

Devansh Batham.

In a post to Substack, Devansh (surname unknown, @chocolatemilkcultleader) is horribly mistaken about Claude, Carlini, and FreeBSD CVE-2026-4747.

Thanks.

Cc @sszuecs

#human #slop #confusion #AI #FreeBSD

##

grahamperrin@bsd.cafe at 2026-04-27T05:37:16.000Z ##

@bagder maybe edit your post to show his full name:

Devansh Batham.

In a post to Substack, Devansh (surname unknown, @chocolatemilkcultleader) is horribly mistaken about Claude, Carlini, and FreeBSD CVE-2026-4747.

Thanks.

Cc @sszuecs

#human #slop #confusion #AI #FreeBSD

##

CVE-2026-27966
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-02-27T15:47:29

1 posts

# 1. Summary The CSV Agent node in Langflow hardcodes `allow_dangerous_code=True`, which automatically exposes LangChain’s Python REPL tool (`python_repl_ast`). As a result, an attacker can execute arbitrary Python and OS commands on the server via prompt injection, leading to full Remote Code Execution (RCE). # 2. Description ## 2.1 Intended Functionality When building a flow such as *ChatIn

1 repos

https://github.com/Anon-Cyber-Team/CVE-2026-27966--RCE-in-Langflow

metasploit@infosec.exchange at 2026-04-24T20:35:01.000Z ##

The latest Metasploit Weekly Wrapup is here! Highlights include a new RCE exploit for Langflow (CVE-2026-27966), improved check method visibility with detailed reasoning, and updates for legacy SMB targets. Plus 3 other new modules!

Read more: rapid7.com/blog/post/pt-metasp

##

CVE-2026-2526
(6.3 MEDIUM)

EPSS: 0.38%

updated 2026-02-18T21:31:21

2 posts

A vulnerability was found in Wavlink WL-WN579A3 up to 20210219. This impacts the function multi_ssid of the file /cgi-bin/wireless.cgi. Performing a manipulation of the argument SSID2G2 results in command injection. The attack may be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

hackmag at 2026-04-27T18:00:04.498Z ##

⚪️ Kaspersky Lab experts discover vulnerability in Snapdragon chipsets

🗨️ Experts from Kaspersky ICS CERT have discovered a vulnerability in Qualcomm Snapdragon chipsets. The issue was found in the BootROM boot firmware, which is embedded at the hardware level. Chipsets from these series are widely used in smartphones, tablets, automotive…

🔗 hackmag.com/news/cve-2026-2526

##

hackmag@infosec.exchange at 2026-04-27T18:00:04.000Z ##

⚪️ Kaspersky Lab experts discover vulnerability in Snapdragon chipsets

🗨️ Experts from Kaspersky ICS CERT have discovered a vulnerability in Qualcomm Snapdragon chipsets. The issue was found in the BootROM boot firmware, which is embedded at the hardware level. Chipsets from these series are widely used in smartphones, tablets, automotive…

🔗 hackmag.com/news/cve-2026-2526

#news

##

CVE-2026-25253
(8.8 HIGH)

EPSS: 0.09%

updated 2026-02-02T23:41:06

1 posts

## Summary The Control UI trusts `gatewayUrl` from the query string without validation and auto-connects on load, sending the stored gateway token in the WebSocket connect payload. Clicking a crafted link or visiting a malicious site can send the token to an attacker-controlled server. The attacker can then connect to the victim's local gateway, modify config (sandbox, tool policies), and invoke

11 repos

https://github.com/KajzingerAkos/CVE-2026-25253

https://github.com/adibirzu/openclaw-security-monitor

https://github.com/FrigateCaptain/openclaw_vulnerabilities_and_solutions

https://github.com/msaleme/start-here

https://github.com/Ckokoski/moatbot-security

https://github.com/Cyber-Warrior-Network/trust-gate-mcp

https://github.com/al4n4n/CVE-2026-25253-research

https://github.com/Joseph19820124/openclaw-vuln-report

https://github.com/ZhaoymOvO/openclaw-1click-rce-env

https://github.com/EQSTLab/CVE-2026-25253

https://github.com/ethiack/moltbot-1click-rce

fediverse@weandthecolor.com at 2026-04-26T11:52:39.000Z ##

OpenClaw Hardware Requirements: Everything You Need to Run This AI Agent in 2026

This post contains affiliate links. We may earn a commission if you click on them and make a purchase. It’s at no extra cost to you and helps us run this site. Thanks for your support!

Regarding AI, it seems like everyone’s been talking about OpenClaw lately. The project exploded on GitHub before most people had even heard the name — passing 100,000 stars inside two months, spawning Reddit threads, Discord servers, and a wave of setup guides from developers who couldn’t stop talking about it. By the time the wider tech press noticed, a serious community had already formed around it. That kind of organic momentum is rare, and it usually means something real is happening.

What makes OpenClaw compelling isn’t a single feature. It’s the premise: a proactive, always-on AI assistant that runs entirely on your own hardware, connects to the messaging apps you already use, and never hands your data to someone else’s server. No subscriptions. No cloud lock-in. You own the whole stack. For a growing number of developers and technically curious people, that combination proved irresistible.

But here’s the catch: the official documentation lists “4GB RAM” as the minimum requirement. That figure is technically accurate and practically misleading. The real OpenClaw hardware requirements depend entirely on how you deploy it — and if you pick the wrong machine, your agent will stall, swap, and crash at the worst possible moment. This guide cuts through the vague specs and gives you the honest picture.

What Is OpenClaw, and Why Should You Care About It Right Now?

OpenClaw is a free, open-source AI agent framework that turns large language models into autonomous personal assistants running 24/7 on your own hardware. Austrian developer Peter Steinberger originally launched it in November 2025 under the name Clawdbot. After a brief naming detour through “Moltbot,” it became OpenClaw in January 2026. By February, Steinberger had joined OpenAI — and committed to keeping the project open-source under MIT license through a newly established non-profit foundation.

The latest stable release as of April 2026 is v2026.4.12. The project is actively maintained with regular releases, and a large community is building skills, integrations, and deployment guides daily.

[🖼 Adobe Creative Cloud All Apps]

What OpenClaw Actually Does

OpenClaw isn’t a chatbot. It doesn’t wait for you to open an app and type a question. Instead, it operates proactively through a heartbeat daemon and scheduled tasks. Think of it as a persistent operator living on your machine, not a reactive text box in a browser tab.

You interact with it through the messaging platforms you already use. The supported channel list includes WhatsApp, Telegram, Slack, Discord, Signal, iMessage, Google Chat, Microsoft Teams, Matrix, IRC, LINE, and over a dozen more. You text your agent from your phone. It executes tasks on your hardware. Results come back through the same channel.

Its core capabilities include browser automation via Playwright, file management, scheduled tasks, API integrations, voice interaction on macOS and iOS, and a live Canvas workspace for visual agent output. A community-driven skill marketplace called ClawHub offers over 700 additional extensions. The skill system is modular — each skill is a Markdown file stored in your local workspace directory.

OpenClaw Is Model-Agnostic

You choose the AI brain. OpenClaw works with Anthropic Claude, OpenAI GPT-4o, Google Gemini, DeepSeek, and local models through Ollama or llama.cpp. It auto-switches to backup models if your primary choice becomes unavailable — which matters a great deal in production automation scenarios.

The Honest Truth About OpenClaw Hardware Requirements

The OpenClaw gateway process itself is a Node.js application. It proxies messages, manages sessions, and orchestrates tool calls. That core process is lightweight — it spends most of its time waiting for API responses rather than grinding through computation. But “can run” and “runs well” are fundamentally different states, and the gap between them grows wider as you add features.

What I call the Deployment Multiplier Effect is the single concept most guides skip over. Your resource usage doesn’t scale linearly with agents or tasks. It scales exponentially once you enable browser automation, local model inference, or multi-agent routing. A machine that handles one text-based agent comfortably will collapse under two browser-automated agents running concurrently.

Minimum OpenClaw System Requirements

These are the absolute floor values. OpenClaw will start and handle basic tasks at these specs, but you’ll hit limits quickly under sustained load.

  • CPU: 2 cores / 4 threads
  • RAM: 4GB
  • Storage: 10–20GB SSD (not HDD)
  • OS: macOS, Linux (Ubuntu 22.04+ recommended), or Windows via WSL2
  • Node.js: Version 22 or higher (not 18, not 20)
  • Network: Stable outbound HTTPS access

The 4GB RAM floor exists because the OpenClaw gateway process alone consumes 400–800MB at idle. Add Node.js runtime overhead, your operating system, and Docker if you use it — and a 2GB machine is already in trouble before you run a single task. Users who try 1GB VPS instances report out-of-memory kills during Docker builds and chronic swapping during normal operation.

The Node.js version requirement deserves emphasis. OpenClaw absolutely requires Node.js 22 or higher. Running it on Node 18 or 20 produces cryptic errors about import statements and missing modules. Install Node 22 via Homebrew on macOS, NVM on Linux, or the official installer on Windows before anything else.

Recommended OpenClaw Hardware for Single-Agent Deployments

For one agent doing text-based tasks through Telegram, Slack, or WhatsApp — with no browser automation and no local LLMs — these specs ensure consistent, comfortable performance:

  • CPU: 6–8 threads (Intel i5 / AMD Ryzen 5 or equivalent)
  • RAM: 8–16GB
  • Storage: 20–50GB NVMe SSD
  • Network: 2.5GbE recommended for API-heavy workflows

NVMe drives reduce model load times by approximately 40% compared to SATA SSDs. That difference is noticeable in daily use, especially when OpenClaw loads skills, writes logs, and manages session persistence simultaneously.

OpenClaw Hardware Requirements by Deployment Scenario

The right hardware depends on what you’re actually running. Let me walk through five distinct deployment tiers using a framework I call the Agent Footprint Stack — a way of thinking about resource allocation as a layered budget rather than a flat spec sheet.

Tier 1 — Lightweight Gateway (Personal Use, Cloud APIs Only)

This is the bread-and-butter OpenClaw setup. One agent, text-based tasks, no browser, no local models. The gateway runs, routes your messages, calls Claude or GPT-4o, and returns results.

  • RAM needed: 4–8GB
  • CPU: 4 threads minimum
  • Storage: 20GB SSD
  • Best hardware pick: Raspberry Pi 5 (8GB) — approximately $80 — handles this workload well if you’re disciplined about resource allocation
  • Cloud alternative: DigitalOcean $12/month droplet (2 vCPUs, 2GB RAM) works for minimal setups; upgrade to the $24/month tier (4GB RAM) for comfortable headroom

The Pi 5 excels at orchestrating cloud API calls. You’re not running local inference here, so compute requirements stay low. The tradeoff is latency on complex multi-tool sequences — expect occasional slowdowns during tasks that combine web search, file operations, and API calls in rapid succession.

Tier 2 — Browser Automation Enabled

Browser automation is one of OpenClaw’s strongest features. It is also the single biggest hardware multiplier in the entire stack. Each Playwright browser instance consumes 200–400MB of RAM and generates significant CPU load during page rendering.

  • RAM needed: 8–16GB (the jump from 4GB is not optional here)
  • CPU: 8 threads minimum
  • Storage: 30–50GB NVMe
  • Best hardware pick: GEEKOM A5 2025 (AMD Ryzen 5 7430U, 32GB RAM) — approximately $545

A 4GB machine running the gateway (400–800MB) plus one browser instance (200–400MB) plus OS and Docker overhead is already at 70–80% memory utilization before any tasks begin. Two concurrent browser instances on 4GB cause swapping, which kills response times and can crash the container mid-task.

Tier 3 — Multi-Agent Deployment

Running two or more OpenClaw agents on the same server means each agent runs its own gateway process with separate configuration, memory, and session state. Budget 2–3GB of RAM per agent for comfortable headroom.

  • RAM needed: 16–32GB
  • CPU: 12+ threads
  • Storage: 50–100GB NVMe
  • Best hardware pick: Mac Mini M4 (16GB base model, approximately $599) — developers report running 8 simultaneous OpenClaw agents with zero thermal throttling thanks to the unified memory architecture
  • Alternative: Mini PCs from ASUS NUC, Beelink, or Minisforum lines at $400–700; prioritize models with replaceable RAM and dual NVMe slots

Two agents on a 4GB VPS will run, but both degrade under concurrent load. Three agents on 4GB don’t work. The gateway processes compete for memory, and the first one to get killed takes down its entire workflow mid-execution. For cloud hosting, DigitalOcean’s 8GB droplet at $24/month or a Hetzner CX43 at approximately $14/month handles two agents reliably.

Tier 4 — Local Model Inference (Ollama Integration)

This is where OpenClaw hardware requirements make a genuine leap. Running a local LLM through Ollama eliminates API costs and keeps all inference on-device — but it demands a completely different class of hardware.

An 8-billion-parameter model like Llama 3 8B, quantized to 4-bit precision, requires approximately 6GB of RAM just to load the model weights. Your operating system needs 4GB on top of that. Add OpenClaw’s context window management, and 16GB of RAM is the absolute floor for local inference. In practice, 32GB is the realistic baseline for responsive agent execution.

  • RAM needed: 32–64GB
  • CPU: NPU or GPU strongly preferred
  • Storage: 100GB+ NVMe (model files are large)
  • Best hardware pick for 7B–13B models: ACEMAGIC F5A (AMD Ryzen AI 9 HX 370, 50 TOPS dedicated NPU) — approximately $650; the NPU handles LLM inference independently, keeping primary CPU cores free for other tasks
  • Best hardware pick for 70B+ models: ACEMAGIC M1A PRO+ (AMD Ryzen AI MAX+ 395, 128GB LPDDR5x, 126 TOPS total) — designed explicitly for heavy multi-agent and large-model workloads

Standard CPUs can run LLM inference, but forcing matrix multiplication through general-purpose cores spikes power consumption above 65 watts and generates significant heat. Neural Processing Units handle the same workload at a fraction of the energy draw — which matters enormously for 24/7 always-on deployments.

Tier 5 — Enterprise and Production Deployment

For teams running OpenClaw as business-critical infrastructure — customer message routing, automated reporting, time-sensitive CRM updates — the hardware calculus shifts entirely toward reliability and uptime over raw cost efficiency.

  • RAM: 32–128GB
  • CPU: 16+ threads or dedicated server hardware
  • Storage: RAID-backed NVMe or enterprise SSD
  • Network: Dedicated IP, monitored uptime
  • Container orchestration: Docker with PM2 process management, or Kubernetes for multi-gateway scaling

Consumer laptops are built for burst performance. Running an AI agent at 100% computational load for 72 hours straight on a laptop will cause thermal throttling — CPU cores dropping from 4.5GHz to 2.1GHz as heat builds. Dedicated hardware with active cooling isn’t about peak performance. It’s about consistency.

Supported Operating Systems and Architecture

OpenClaw supports three primary operating environments. macOS and Linux run the gateway natively. Windows requires WSL2 (Ubuntu is recommended inside WSL2). For server deployments, Linux is the most predictable and well-documented option.

On the architecture side, OpenClaw auto-detects your CPU architecture. Both x86_64 and ARM64 are fully supported. Apple Silicon (M1 through M4) receives native support via the macOS menu bar app or CLI. AWS Graviton 2, 3, and 4 instances are fully supported and often deliver better price-to-performance ratios than x86 equivalents for cloud deployments. The Raspberry Pi 5 on ARM64 works well for the lightweight Tier 1 scenario described above.

Memory Architecture: Understanding the OpenClaw RAM Budget

Here’s a framework I find genuinely useful when planning OpenClaw deployments — the RAM Budget Formula. Add up these components to calculate your actual memory requirement before you buy hardware:

  • Base gateway process: ~300MB
  • Per active messaging channel: ~100MB each
  • Per WebSocket client: ~10MB each
  • Per sandbox container: 256MB–1GB each
  • Browser instance (if enabled): 500MB–2GB
  • Local LLM weights (if running locally): varies by model size
  • Overhead buffer: add 20% to your total

Sum those numbers for your specific configuration, add 20%, and that’s your real RAM floor — not the 4GB figure in the README. This formula also explains why storage matters beyond just holding files. OpenClaw generates more disk writes than you might expect. Log accumulation, session files, memory persistence data, and Node.js module cache collectively consume significant space over time. The 20GB storage recommendation is double the minimum precisely to accommodate this growth.

How to Install OpenClaw Locally

The installation process is straightforward if you follow the correct sequence. These are the verified steps for a local deployment on Linux or macOS.

Step 1 — Verify Your Node.js Version

Before anything else, confirm you’re running Node.js 22 or higher. Run node --version in your terminal. If the output shows v18 or v20, install v22 via NVM on Linux (nvm install 22) or Homebrew on macOS (brew install node@22). An incorrect Node version is the most common cause of installation failures.

Step 2 — Clone the Repository

OpenClaw’s official repository lives at github.com/openclaw/openclaw. Clone it with git clone https://github.com/openclaw/openclaw.git, then navigate into the directory with cd openclaw.

Step 3 — Install Dependencies

The project prefers pnpm for package management. Run pnpm install to pull all dependencies. Installation typically takes 2–3 minutes, depending on your connection speed.

Step 4 — Run the Onboarding Setup

Run pnpm openclaw setup for first-time configuration. This writes the local config and workspace structure. Alternatively, run openclaw onboard in your terminal — the onboarding wizard guides you step-by-step through gateway setup, channel configuration, and skill installation. It’s the recommended path for new users.

Step 5 — Run the Diagnostics

Always run openclaw doctor after installation. This command surfaces misconfigured settings, missing dependencies, and risky DM policy configurations before they cause silent failures. Fixing issues at this stage saves hours of debugging later.

Step 6 — Start the Gateway

Start the gateway with pnpm gateway:watch for development (auto-reloads on changes) or configure it as a daemon using PM2 for always-on production deployment. PM2 ensures the gateway automatically restarts after crashes or system reboots.

Step 7 — Connect Your First Channel

Connect a messaging channel through the dashboard or CLI. For Telegram, create a bot through @BotFather, copy the token, and pair it through the OpenClaw interface. Once connected, you can interact with your agent from any device where you use that platform.

Advantages and Disadvantages of OpenClaw

The Case For OpenClaw

The privacy argument is the strongest one. Your data, sessions, and credentials never leave your hardware. For anyone handling sensitive personal or professional information, that’s not a feature — it’s a requirement. Local-first deployment also eliminates recurring API gateway costs over time.

The multi-channel approach is genuinely elegant. Most AI tools force you into their interface. OpenClaw meets you where you already are — your existing messaging apps. That reduces friction to nearly zero for daily use.

The model-agnostic design future-proofs your setup. When a better model launches, you switch providers in your config file. You’re not locked into one company’s product roadmap.

The extensibility through ClawHub skills and the open-source nature mean the community continuously expands what OpenClaw can do. Over 700 skills are available, and building custom skills in Markdown is accessible even for non-developers.

The Honest Downsides

OpenClaw is what I’d call a Sharp Knife Tool — powerful and precise, but unforgiving of mistakes. It requires comfortable familiarity with the command line, JSON configuration files, and basic server management concepts. If you’ve never used a terminal, this is not where you start.

Security demands active management. The critical CVE-2026-25253 Remote Code Execution vulnerability exposed unpatched deployments in early 2026. Always run openclaw update --force followed by openclaw security audit to verify your installation is patched and hardened. Skill permissions deserve scrutiny — a skill requesting shell execution access outside your workspace is a red flag worth taking seriously.

Hardware costs are real. A capable, always-on mini PC costs $400–700. That’s a one-time cost that pays back against subscription services over time, but the upfront investment is higher than cloud alternatives.

Foundation governance is still evolving. The non-profit foundation Steinberger announced has not yet published full governance documents as of April 2026. For teams evaluating long-term enterprise use, that’s a legitimate uncertainty to factor in.

OpenClaw Hardware Recommendations: Buying Guide by Budget

Let me translate all of this into concrete purchase recommendations organized by budget and use case. These reflect actual performance data from the community and hardware specifications verified as of April 2026.

Under $250 — Learning and Testing Only

The Intel N100 Mini PC (approximately $150–250) works as an entry point for learning the OpenClaw CLI, testing workflows, and API integration testing. Four efficient cores at 3.4GHz, 16GB RAM, and a 512GB SSD handle single-agent, cloud-API-only setups at low power draw. Don’t use this for browser automation or local inference.

The Raspberry Pi 5 (8GB) at approximately $80 is viable for Tier 1 personal use with strict resource discipline. Great for experimenting with the framework before committing to dedicated hardware.

$300–$500 — Single Agent, Serious Use

The Beelink MINI S13 (approximately $300–400, Intel i5-1235U, 12 threads, 16GB RAM, 500GB NVMe) handles single-agent deployments with cloud APIs reliably. A solid everyday choice if you don’t need local inference.

The GMKtec G3 Plus (approximately $300–400, 12 threads, 16GB RAM, 512GB NVMe) offers an upgrade path for light multi-agent testing. Good value for the price if you plan to grow into the platform gradually.

$480–$680 — Production-Grade Single or Multi-Agent

The GEEKOM A5 2025 (AMD Ryzen 5 7430U) is the community’s most recommended all-around choice. At 16GB RAM for approximately $480–580, it handles single-agent plus browser automation. Furthermore, at 32GB for approximately $545, it’s the go-to for 2–3 concurrent agents. And at 64GB for approximately $680, it offers maximum future-proofing for local model experimentation.

The Mac Mini M4 (16GB, approximately $599) deserves special consideration. Its unified memory architecture eliminates CPU-GPU memory transfer bottlenecks. Developers consistently report running 8 simultaneous OpenClaw agents with zero thermal throttling. If you’re already in the Apple ecosystem, this is the clear recommendation.

$650+ — Local Inference and Heavy Workloads

The ACEMAGIC F5A (AMD Ryzen AI 9 HX 370, 50 TOPS dedicated NPU, approximately $650) is purpose-built for always-on local model inference. The NPU handles LLM computation independently, keeping primary CPU cores available for other tasks. The OCuLink port enables connection to external desktop GPUs without Thunderbolt bandwidth limitations — useful if you plan to train models later.

For teams running 70B+ parameter models or deploying multiple concurrent inference instances, the ACEMAGIC M1A PRO+ (AMD Ryzen AI MAX+ 395, 128GB LPDDR5x, approximately $1,200+) provides workstation-grade memory bandwidth. Unified 128GB memory allows loading 70B parameter models entirely into RAM with zero swapping.

Security Hardening: Running OpenClaw Safely

A few non-negotiable security practices should accompany every OpenClaw deployment. These are not optional considerations — they’re the difference between a useful tool and a liability.

Run the gateway under a dedicated OS user account with no access to your personal home directory. If using Docker, mount only specific folders the agent needs — read-only mounts for sensitive documents prevent deletion while still allowing the agent to learn from them. Whitelist only your own Telegram or messaging platform user ID in the config file. Use a dedicated API key with a hard daily spending limit of $5–$10.

Approach ClawHub skill installation with the same diligence you’d apply to installing npm packages in production. Review requested permissions before installing. A weather skill requesting shell execution access is a significant red flag. The OpenClaw Foundation runs automated security scans on ClawHub submissions, but community-published skills carry inherent third-party risk.

The Future of OpenClaw Hardware: An Editorial Perspective

Something interesting is happening in the mini PC market right now. Hardware manufacturers are starting to design explicitly for AI agent hosting — not gaming, not general productivity, but always-on inference. The AMD Ryzen AI NPU line, NVIDIA’s NemoClaw reference stack for DGX Spark, and Apple Silicon’s unified memory architecture all point in the same direction: dedicated, efficient, local compute for autonomous agents.

The trend I’m watching closely is what the community calls “Mobile Nodes” and “Edge AI” — deploying OpenClaw not on a desktop mini PC but on compact ARM devices optimized for battery-backed, always-on operation. As LLM quantization techniques improve, 7B models will become genuinely viable on $200 hardware. That changes the access equation entirely.

My honest opinion: if you value data sovereignty and want to automate meaningful parts of your digital life, OpenClaw is the most capable self-hosted option available in April 2026. But it’s not for everyone. It rewards people who enjoy understanding how their tools work. If you want something that just works out of the box with zero configuration, this isn’t your tool. If you want control, transparency, and the ability to run a genuinely intelligent agent without sending your data to someone else’s server, OpenClaw is worth every hour of setup time.

Frequently Asked Questions About OpenClaw Hardware Requirements

What is the absolute minimum hardware to run OpenClaw?

OpenClaw requires a minimum of 2 CPU cores, 4GB RAM, and 10GB of SSD storage. You also need Node.js version 22 or higher. These specs support basic single-agent text operations only. They don’t leave sufficient headroom for browser automation, local LLMs, or sustained multi-task workflows.

Can I run OpenClaw on a Raspberry Pi?

Yes. The Raspberry Pi 5 with 8GB RAM handles Tier 1 deployments — single agent, cloud API calls only, no browser automation. ARM64 architecture is fully supported. Add a 2GB swap file for additional stability on lower-RAM Pi configurations.

Does OpenClaw work on Windows?

Yes, but only through WSL2 (Windows Subsystem for Linux). Ubuntu is the recommended WSL2 distribution. Configure WSL2 memory allocation via the .wslconfig file in your user profile directory. Native Windows execution is not supported.

How much RAM do I need to run a local LLM with OpenClaw?

16GB is the absolute minimum for running an 8B parameter model quantized to 4-bit precision. 32GB is the realistic baseline for responsive performance. A 70B parameter model requires 64–128GB of RAM to run without swapping.

What is the best mini PC for OpenClaw in 2026?

For most users, the GEEKOM A5 2025 with 32GB RAM (approximately $545) offers the best balance of capability, cost, and upgrade path. For Apple ecosystem users, the Mac Mini M4 with 16GB RAM (approximately $599) provides exceptional multi-agent performance. And for local inference workloads, the ACEMAGIC F5A with its dedicated NPU handles continuous AI computation most efficiently.

Can I run OpenClaw on a VPS without dedicated hardware?

Yes. A DigitalOcean $24/month droplet (4GB RAM) or a Hetzner CX43 ($13–14/month) handles two agents reliably. For four or more agents, move to 16GB instances or split across multiple servers. Be aware that monthly VPS costs often exceed the one-time cost of a dedicated mini PC over 12–18 months.

What is the recommended Node.js version for OpenClaw?

Node.js 22 or higher is required. Earlier versions, including Node 18 LTS and Node 20, cause installation failures and runtime errors. Always install Node 22 before attempting to install OpenClaw.

How do I verify my OpenClaw installation is configured correctly?

Run OpenCLAW Doctor immediately after installation. This command surfaces misconfigured settings, missing dependencies, and security policy issues. Run it again after any major update to confirm the installation remains healthy.

What storage type does OpenClaw require?

SSD is essential — HDD storage creates I/O bottlenecks during model loading, log writing, and session persistence. NVMe SSDs reduce model load times by approximately 40% compared to SATA SSDs. Plan for at least 20–50GB of dedicated storage, more if you enable verbose logging or run multiple agents simultaneously.

Is OpenClaw free to use?

Yes. OpenClaw is fully open-source under the MIT license. The framework itself is free. You’ll pay for the AI model API calls (typically $0.50–$2.00 per 100 tasks using Claude Sonnet) and any hardware or VPS hosting costs you choose to incur. Running local models through Ollama eliminates ongoing API costs entirely.

Check out other popular AI topics here at WE AND THE COLOR.

#ai #free #hardware #openSource #OpenClaw ##

CVE-2025-20362
(6.5 MEDIUM)

EPSS: 43.64%

updated 2025-11-06T14:51:19.950000

1 posts

Update: On November 5, 2025, Cisco became aware of a new attack variant against devices running Cisco Secure ASA Software or Cisco Secure FTD Software releases that are affected by CVE-2025-20333 and CVE-2025-20362. This attack can cause unpatched devices to unexpectedly reload, leading to denial of service (DoS) conditions. Cisco strongly recommends that all customers upgrade to the fixed softwar

Nuclei template

threatnoir@infosec.exchange at 2026-04-25T15:09:49.000Z ##

⚠️ CRITICAL: FIRESTARTER Backdoor

APT actors deployed FIRESTARTER, a persistent Linux backdoor on Cisco Firepower and Secure Firewall devices via CVE-2025-20333 and CVE-2025-20362. The malware survives firmware patches and works with LINE VIPER to maintain remote access. Any organization running these devices is at risk of undetect…

threatnoir.com/focus

#infosec #cybersecurity

##

CVE-2025-20333
(10.0 CRITICAL)

EPSS: 24.78%

updated 2025-10-22T00:33:24

1 posts

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials coul

threatnoir@infosec.exchange at 2026-04-25T15:09:49.000Z ##

⚠️ CRITICAL: FIRESTARTER Backdoor

APT actors deployed FIRESTARTER, a persistent Linux backdoor on Cisco Firepower and Secure Firewall devices via CVE-2025-20333 and CVE-2025-20362. The malware survives firmware patches and works with LINE VIPER to maintain remote access. Any organization running these devices is at risk of undetect…

threatnoir.com/focus

#infosec #cybersecurity

##

CVE-2025-59532(CVSS UNKNOWN)

EPSS: 0.05%

updated 2025-09-22T22:00:37

1 posts

Due to a bug in the sandbox configuration logic, Codex CLI could treat a model-generated `cwd` as the sandbox’s writable root, including paths outside of the folder where the user started their session. This logic bypassed the intended workspace boundary and enables arbitrary file writes and command execution where the Codex process has permissions - this did not impact the network-disabled sandb

1 repos

https://github.com/baktistr/cve-2025-59532-poc

_r_netsec@infosec.exchange at 2026-04-24T14:28:05.000Z ##

Cohere Terrarium (CVE-2026-5752) and OpenAI Codex CLI (CVE-2025-59532): a cross-CVE analysis of AI code sandbox escapes blog.barrack.ai/pyodide-sandbo

##

CVE-2025-27636(CVSS UNKNOWN)

EPSS: 35.52%

updated 2025-03-25T18:38:11

3 posts

Bypass/Injection vulnerability in Apache Camel components under particular conditions. This issue affects Apache Camel: from 4.9.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3. Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. This vulnerability is present in Camel's default incoming header filter

3 repos

https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC

https://github.com/enochgitgamefied/CVE-2025-27636-Practical-Lab

https://github.com/Crystallen1/CVE-2025-27636-demo

thehackerwire@mastodon.social at 2026-04-27T17:03:51.000Z ##

🔴 CVE-2026-40453 - Critical (9.9)

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

EUVD_Bot@mastodon.social at 2026-04-27T10:01:14.000Z ##

🚨 EUVD-2026-25791

📊 Score: n/a
📦 Product: Apache Camel CoAP, Apache Camel JMS, Apache Camel JMS (+6 more)
🏢 Vendor: Apache Software Foundation
📅 Updated: 2026-04-27

📝 The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExe...

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

thehackerwire@mastodon.social at 2026-04-27T17:03:51.000Z ##

🔴 CVE-2026-40453 - Critical (9.9)

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was no...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-52046
(9.8 CRITICAL)

EPSS: 80.14%

updated 2025-02-11T19:03:55

3 posts

The `ObjectSerializationDecoder` in Apache MINA uses Java’s native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses. This vulnerability allows attackers to exploit the deserialization process by sending specially crafted malicious serialized data, potentially leading to remote code execution (RCE) attacks. This issue affects MINA c

EUVD_Bot@mastodon.social at 2026-04-27T11:01:13.000Z ##

🚨 EUVD-2026-25809

📊 Score: 9.8/10 (CVSS v3.1)
📦 Product: Apache MINA, Apache MINA, Apache MINA
🏢 Vendor: Apache Software Foundation
📅 Updated: 2026-04-27

📝 The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class t...

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

thehackerwire@mastodon.social at 2026-04-27T10:29:10.000Z ##

🔴 CVE-2026-41409 - Critical (9.8)

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T10:29:10.000Z ##

🔴 CVE-2026-41409 - Critical (9.8)

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been exec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2023-20185
(7.4 HIGH)

EPSS: 0.17%

updated 2024-02-03T05:06:20

1 posts

A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic. This vulnerability is due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature on affected switches. An attacker with an on-path

AAKL@infosec.exchange at 2026-04-24T17:29:17.000Z ##

Broadcom has a new advisory for a critical vulnerability:

Common Components and Services for z/OS 15.0 Vulnerability in CCS Apache Tomcat support.broadcom.com/web/ecx/s #Broadcom #Apache

CISA has updated the KEV catalogue:

- CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-57728: SimpleHelp Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability cve.org/CVERecord?id=CVE-2024-

- CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability cve.org/CVERecord?id=CVE-2025- #CISA #Samsung #DLink

Cisco has two advisories for high-severity vulnerabilities:

- CVE-2023-20185: Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability sec.cloudapps.cisco.com/securi

- Informational, updated today: Continued Evolution of Persistence Mechanism Against Cisco Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense sec.cloudapps.cisco.com/securi @TalosSecurity #Cisco #infosec #vulnerability

##

CVE-2022-25912
(8.1 HIGH)

EPSS: 43.31%

updated 2023-08-17T05:02:31

1 posts

The package simple-git before 3.15.0 is vulnerable to Remote Code Execution (RCE) when enabling the `ext` transport protocol, which makes it exploitable via `clone()` method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306).

thehackerwire@mastodon.social at 2026-04-25T20:23:48.000Z ##

🔴 CVE-2026-6951 - Critical (9.8)

Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](security.snyk.io/vuln/SNYK-JS-) that blocks the -c option but not the equivalent ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25262
(0 None)

EPSS: 0.00%

2 posts

N/A

hackmag at 2026-04-27T18:00:04.498Z ##

⚪️ Kaspersky Lab experts discover vulnerability in Snapdragon chipsets

🗨️ Experts from Kaspersky ICS CERT have discovered a vulnerability in Qualcomm Snapdragon chipsets. The issue was found in the BootROM boot firmware, which is embedded at the hardware level. Chipsets from these series are widely used in smartphones, tablets, automotive…

🔗 hackmag.com/news/cve-2026-2526

##

hackmag@infosec.exchange at 2026-04-27T18:00:04.000Z ##

⚪️ Kaspersky Lab experts discover vulnerability in Snapdragon chipsets

🗨️ Experts from Kaspersky ICS CERT have discovered a vulnerability in Qualcomm Snapdragon chipsets. The issue was found in the BootROM boot firmware, which is embedded at the hardware level. Chipsets from these series are widely used in smartphones, tablets, automotive…

🔗 hackmag.com/news/cve-2026-2526

#news

##

CVE-2026-7040
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-27T15:22:55.000Z ##

🟠 CVE-2026-7040 - High (7.5)

Text::Minify::XS versions from v0.3.0 before v0.7.8 for Perl have a heap overflow when processing some malformed UTF-8 characters.

The minify functions mishandled some malformed UTF-8 characters, leading to heap corruption.

Note that the minify_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-27T15:22:55.000Z ##

🟠 CVE-2026-7040 - High (7.5)

Text::Minify::XS versions from v0.3.0 before v0.7.8 for Perl have a heap overflow when processing some malformed UTF-8 characters.

The minify functions mishandled some malformed UTF-8 characters, leading to heap corruption.

Note that the minify_...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

nemo@mas.to at 2026-04-27T12:00:41.000Z ##

Telekom's security team warns: “Pack2TheRoot” (CVE-2026-41651) in PackageKit lets low‑privilege users install/remove system packages and escalate to root — patch to PackageKit ≥1.3.5 and apply distro updates now: heise.de/en/news/Pack2TheRoot- 🔒🐧 #CyberSecurity #Linux

##

nemo@mas.to at 2026-04-27T12:00:41.000Z ##

Telekom's security team warns: “Pack2TheRoot” (CVE-2026-41651) in PackageKit lets low‑privilege users install/remove system packages and escalate to root — patch to PackageKit ≥1.3.5 and apply distro updates now: heise.de/en/news/Pack2TheRoot- 🔒🐧 #CyberSecurity #Linux

##

linux@activitypub.awakari.com at 2026-04-27T07:21:03.000Z ## Pack2TheRoot : cette vulnérabilité vieille de 12 ans menace Linux Pack2TheRoot (CVE-2026-41651), c'est le nom d'une faille de sécurité importante découverte dans un composant omniprés...

#Actu #Cybersécurité #Cybersécurité #Linux #Vulnérabilité

Origin | Interest | Match ##

benzogaga33@mamot.fr at 2026-04-25T16:20:01.000Z ##

Pack2TheRoot : une faille vieille de 12 ans offre les clés de votre Linux à n’importe qui goodtech.info/pack2theroot-fai #Sécurité #Àlaune

##

secdb@infosec.exchange at 2026-04-24T20:58:39.000Z ##

🚨 CVE-2026-41651 (Pack2TheRoot)

PackageKit vulnerable to TOCTOU Race on Transaction Flags leads to arbitrary package installation as root

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#pack2theroot #cve2026411651 #packagekit #toctou

##

linux@activitypub.awakari.com at 2026-04-24T19:46:15.000Z ## 12-year-old Pack2TheRoot bug lets Linux users gain root privileges ‘Pack2TheRoot’ flaw lets local Linux users gain root via PackageKit. CVE-2026-41651 (8.8) has existed for nearly 12 years. The...

#Hacking #Security #CVE-2026-41651 #hacking #news #information #security #news #IT #Information #Security

Origin | Interest | Match ##

hackerworkspace@infosec.exchange at 2026-04-24T18:17:27.000Z ##

Pack2TheRoot (CVE-2026-41651): Cross-Distro Local Privilege Escalation Vulnerability

github.security.telekom.com/20

Read on HackerWorkspace: hackerworkspace.com/article/pa

#cybersecurity #vulnerability #exploit

##

CVE-2026-24467
(0 None)

EPSS: 0.90%

1 posts

N/A

secdb@infosec.exchange at 2026-04-27T00:01:17.000Z ##

📈 CVE Published in last 7 days (2026-04-20 - 2026-04-27)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1459

Severity:
- Critical: 124
- High: 358
- Medium: 586
- Low: 70
- None: 321

Status:
- : 40
- Analyzed: 313
- Awaiting Analysis: 570
- Deferred: 238
- Modified: 9
- Received: 124
- Rejected: 23
- Undergoing Analysis: 142

Top CNAs:
- GitHub, Inc.: 326
- kernel.org: 257
- VulnCheck: 119
- VulDB: 114
- Oracle: 102
- MITRE: 69
- Wordfence: 67
- Canonical Ltd.: 46
- Mozilla Corporation: 42
- N/A: 40

Top Affected Products:
- UNKNOWN: 1040
- Openclaw: 42
- Mozilla Firefox: 39
- Mozilla Thunderbird: 38
- Oracle Mysql Server: 25
- Wwbn Avideo: 18
- Flowiseai Flowise: 18
- Uutils Coreutils: 14
- Silextechnology Sd-330ac Firmware: 11
- Gitlab: 11

Top EPSS Score:
- CVE-2026-5965 - 6.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41179 - 5.98 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-40887 - 4.56 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 3.22 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41176 - 2.79 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-21571 - 1.10 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-6799 - 1.06 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24467 - 0.76 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-41472 - 0.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2019-25714 - 0.60 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-6911
(0 None)

EPSS: 0.05%

3 posts

N/A

offseq@infosec.exchange at 2026-04-25T07:30:25.000Z ##

🚨 CRITICAL: CVE-2026-6911 in AWS Ops Wheel — missing JWT signature checks allow unauth access & admin control over all tenants. Patch by redeploying from the updated repo! Details: radar.offseq.com/threat/cve-20 #OffSeq #AWS #Vuln #JWT

##

thehackerwire@mastodon.social at 2026-04-24T19:41:56.000Z ##

🔴 CVE-2026-6911 - Critical (9.8)

Missing JWT signature verification in AWS Ops Wheel allows unauthenticated attackers to forge JWT tokens and gain unintended administrative access to the application, including the ability to read, modify, and delete all application data across te...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

awssecurityfeed@infosec.exchange at 2026-04-24T17:00:01.000Z ##

Issue with AWS Ops Wheel (CVE-2026-6911 and CVE-2026-6912

Bulletin ID: 2026-018-AWS Scope: AWS Content Type: Important (requires attention) Publication Date: 2026/04/24 09:15 AM PDT
Description:
AWS Ops Wheel is an open-source tool that helps teams make random selections using a virtua...

aws.amazon.com/security/securi

#aws #security

##

CVE-2026-31952
(0 None)

EPSS: 0.06%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-24T23:01:52.000Z ##

🟠 CVE-2026-31952 - High (7.6)

Xibo is an open source digital signage platform with a web content management system and Windows display player software. Versions 1.7 through 4.4.0 have an SQL injection vulnerability in the API routes inside the CMS responsible for Filtering Dat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41429
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-24T20:41:39.000Z ##

🟠 CVE-2026-41429 - High (8.8)

arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, there is a remotely reachable memory corruption issue in the NBNS packet handling path. When NetBIOS is enabled b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33662
(0 None)

EPSS: 0.07%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-24T19:44:30.000Z ##

🟠 CVE-2026-33662 - High (7.5)

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-24T19:43:08.000Z ##

🟠 CVE-2026-33662 - High (7.5)

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33666
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-24T19:44:21.000Z ##

🟠 CVE-2026-33666 - High (7.5)

Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, in BitStreamReader.h readBytes() / readString(), the setBitPosition() bounds check receives the overflowed value and is comp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-24T19:41:45.000Z ##

🟠 CVE-2026-33666 - High (7.5)

Zserio is a framework for serializing structured data with a compact and efficient way with low overhead. Prior to 2.18.1, in BitStreamReader.h readBytes() / readString(), the setBitPosition() bounds check receives the overflowed value and is comp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41421
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-24T19:42:13.000Z ##

🟠 CVE-2026-41421 - High (8.8)

SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/notification/pushMsg accepts a user-controlled ms...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-24T19:41:22.000Z ##

🟠 CVE-2026-41421 - High (8.8)

SiYuan is an open-source personal knowledge management system. Prior to 3.6.5, SiYuan desktop renders notification messages as raw HTML inside an Electron renderer. The notification route POST /api/notification/pushMsg accepts a user-controlled ms...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites