## Updated at UTC 2026-04-07T16:15:25.597382

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-20432 8.0 0.06% 2 0 2026-04-07T15:31:49 In Modem, there is a possible out of bounds write due to a missing bounds check.
CVE-2026-5627 9.1 0.00% 4 0 2026-04-07T15:30:58 A path traversal vulnerability exists in mintplex-labs/anything-llm versions up
CVE-2026-23818 8.8 0.00% 2 0 2026-04-07T15:30:58 A vulnerability has been identified in the graphical user interface (GUI) of HPE
CVE-2026-22679 9.8 0.00% 2 0 2026-04-07T15:30:53 Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthentica
CVE-2026-34197 8.8 0.06% 2 0 2026-04-07T15:30:49 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-20433 8.8 0.06% 2 0 2026-04-07T15:30:48 In Modem, there is a possible out of bounds write due to a missing bounds check.
CVE-2026-5373 8.1 0.00% 2 0 2026-04-07T15:17:47.140000 An issue that allowed all-organization administrators to promote accounts to sup
CVE-2026-4740 8.2 0.00% 2 0 2026-04-07T15:17:46.797000 A flaw was found in Open Cluster Management (OCM), the technology underlying Red
CVE-2026-35485 7.5 0.00% 2 0 2026-04-07T15:17:45.677000 text-generation-webui is an open-source web interface for running Large Language
CVE-2026-35464 7.5 0.00% 2 0 2026-04-07T15:17:44.523000 pyLoad is a free and open-source download manager written in Python. The fix for
CVE-2026-35463 8.8 0.00% 2 0 2026-04-07T15:17:44.363000 pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.
CVE-2026-35457 8.2 0.00% 2 0 2026-04-07T15:17:43.587000 libp2p-rust is the official rust language Implementation of the libp2p networkin
CVE-2026-35405 7.5 0.00% 2 0 2026-04-07T15:17:43.367000 libp2p-rust is the official rust language Implementation of the libp2p networkin
CVE-2026-35187 7.7 0.03% 2 0 2026-04-07T15:17:42.940000 pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.
CVE-2026-35164 8.8 0.21% 2 0 2026-04-07T15:17:42.303000 Brave CMS is an open-source CMS. Prior to 2.0.6, an unrestricted file upload vul
CVE-2026-34783 8.1 0.16% 1 0 2026-04-07T15:17:40.383000 Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4
CVE-2026-24660 8.1 0.00% 2 0 2026-04-07T15:17:37.213000 A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functi
CVE-2026-24450 8.1 0.00% 2 0 2026-04-07T15:17:37.040000 An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw fun
CVE-2026-35409 7.7 0.03% 2 0 2026-04-07T14:20:08 ### Summary A Server-Side Request Forgery (SSRF) protection bypass has been iden
CVE-2026-35408 8.7 0.01% 2 0 2026-04-07T14:19:50 ## Summary Directus's Single Sign-On (SSO) login pages lacked a `Cross-Origin-O
CVE-2026-3184 3.7 0.08% 1 1 2026-04-07T13:20:55.200000 A flaw was found in util-linux. Improper hostname canonicalization in the `login
CVE-2026-32186 9.8 0.09% 1 0 2026-04-07T13:20:55.200000 Microsoft Bing Elevation of Privilege Vulnerability
CVE-2026-3445 7.1 0.03% 1 0 2026-04-07T13:20:55.200000 The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User
CVE-2026-1233 7.5 0.02% 2 0 2026-04-07T13:20:55.200000 The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulner
CVE-2026-3666 8.8 0.03% 2 0 2026-04-07T13:20:55.200000 The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion i
CVE-2026-34935 9.8 0.08% 1 0 2026-04-07T13:20:55.200000 PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4
CVE-2025-47390 7.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory corruption while preprocessing IOCTL request in JPEG driver.
CVE-2026-21372 7.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory Corruption when sending IOCTL requests with invalid buffer sizes during m
CVE-2026-21376 7.8 0.01% 2 0 2026-04-07T13:20:35.010000 Memory Corruption when accessing an output buffer without validating its size du
CVE-2026-21380 7.8 0.01% 1 0 2026-04-07T13:20:35.010000 Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memor
CVE-2026-26263 8.1 0.03% 1 0 2026-04-07T13:20:35.010000 GLPI is a free asset and IT management software package. From 11.0.0 to before 1
CVE-2026-3524 8.8 0.01% 1 0 2026-04-07T13:20:35.010000 Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing af
CVE-2026-5629 8.8 0.04% 2 0 2026-04-07T13:20:35.010000 A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is
CVE-2026-5611 8.8 0.04% 1 0 2026-04-07T13:20:35.010000 A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function f
CVE-2026-5608 8.8 0.04% 2 0 2026-04-07T13:20:35.010000 A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function
CVE-2026-5558 6.3 0.01% 1 0 2026-04-07T13:20:35.010000 A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up
CVE-2026-5548 8.8 0.05% 1 0 2026-04-07T13:20:35.010000 A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by thi
CVE-2026-34989 0 0.05% 2 0 2026-04-07T13:20:11.643000 CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, mo
CVE-2026-35471 9.8 0.07% 6 0 2026-04-07T13:20:11.643000 goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile()
CVE-2026-35044 8.8 0.04% 2 0 2026-04-07T13:20:11.643000 BentoML is a Python library for building online serving systems optimized for AI
CVE-2026-0740 9.8 0.08% 4 0 2026-04-07T13:20:11.643000 The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary f
CVE-2026-35022 9.8 0.25% 4 0 2026-04-07T13:20:11.643000 Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
CVE-2026-35392 9.8 0.07% 4 0 2026-04-07T13:20:11.643000 goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in
CVE-2026-35442 8.1 0.04% 2 0 2026-04-07T13:20:11.643000 Directus is a real-time API and App dashboard for managing SQL database content.
CVE-2026-5709 8.8 0.07% 2 0 2026-04-07T13:20:11.643000 Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio
CVE-2026-5687 8.8 0.05% 2 0 2026-04-07T13:20:11.643000 A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects th
CVE-2026-35174 9.1 0.35% 2 0 2026-04-07T13:20:11.643000 Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path tra
CVE-2026-34986 7.5 0.01% 1 0 2026-04-07T13:20:11.643000 Go JOSE provides an implementation of the Javascript Object Signing and Encrypti
CVE-2026-34208 10.0 0.06% 1 0 2026-04-07T13:20:11.643000 SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks
CVE-2026-33752 8.6 0.01% 1 1 2026-04-07T13:20:11.643000 curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not
CVE-2026-31842 7.5 0.05% 2 0 2026-04-07T12:31:21 Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization
CVE-2026-34904 7.5 0.02% 2 0 2026-04-07T09:31:28 Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media
CVE-2026-34896 7.5 0.02% 2 0 2026-04-07T09:31:28 Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction,
CVE-2026-5465 8.8 0.05% 2 1 2026-04-07T09:31:28 The Booking for Appointments and Events Calendar – Amelia plugin for WordPress i
CVE-2026-1114 9.8 0.04% 4 0 2026-04-07T09:31:22 In parisneo/lollms version 2.1.0, the application's session management is vulner
CVE-2025-65115 8.8 0.07% 2 0 2026-04-07T06:30:28 Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on
CVE-2026-5686 8.8 0.02% 2 0 2026-04-07T00:30:28 A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerabili
CVE-2026-5708 8.8 0.12% 2 0 2026-04-07T00:30:28 Unsanitized control of user-modifiable attributes in the session creation compon
CVE-2026-5707 8.8 0.21% 2 0 2026-04-07T00:30:28 Unsanitized input in an OS command in the virtual desktop session name handling
CVE-2026-5685 8.8 0.05% 2 0 2026-04-07T00:30:27 A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the func
CVE-2026-5684 8.0 0.03% 2 0 2026-04-07T00:30:27 A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issu
CVE-2026-35394 8.3 0.04% 2 0 2026-04-06T23:43:56 ### Summary The `mobile_open_url` tool in mobile-mcp passes user-supplied URLs
CVE-2026-35393 9.8 0.07% 6 0 2026-04-06T23:43:51 ### Summary * POST multipart upload directory not sanitized | `httpserver/updown
CVE-2026-33540 7.5 0.03% 2 0 2026-04-06T23:42:46 hi guys, commit: 40594bd98e6d6ed993b5c6021c93fdf96d2e5851 (as-of 2026-01-31) co
CVE-2026-35209 7.5 0.03% 2 0 2026-04-06T23:42:30 ### Impact Applications that pass unsanitized user input (e.g. parsed JSON requ
CVE-2026-35043 7.8 0.07% 2 0 2026-04-06T23:42:05 Commit ce53491 (March 24) fixed command injection via `system_packages` in Docke
CVE-2026-35042 7.5 0.01% 2 0 2026-04-06T23:41:50 ## Summary `fast-jwt` does not validate the `crit` (Critical) Header Parameter
CVE-2026-35039 9.1 0.02% 2 0 2026-04-06T23:41:46 ## Impact Setting up a custom cacheKeyBuilder method which does not properly cr
CVE-2026-35171 9.8 0.30% 4 0 2026-04-06T23:41:21 ### Impact This is a **critical Remote Code Execution (RCE)** vulnerability cau
CVE-2026-35036 7.5 0.03% 1 0 2026-04-06T23:41:05 ### Summary Ech0 implements **link preview** (editor fetches a page title) thro
CVE-2026-34841 9.8 0.02% 1 0 2026-04-06T23:41:04 ### **Impact** This is a **supply chain attack** involving compromised versions
CVE-2026-33579 None 0.02% 2 1 2026-04-06T23:39:45 ## Summary The `/pair approve` command path called device approval without forw
CVE-2026-34976 10.0 0.03% 3 0 2026-04-06T23:26:04 The `restoreTenant` admin mutation is missing from the authorization middleware
CVE-2026-34950 9.1 0.02% 2 0 2026-04-06T23:25:59 ### Summary The fix for GHSA-c2ff-88x2-x9pg (CVE-2023-48223) is incomplete. The
CVE-2026-35172 7.5 0.03% 2 0 2026-04-06T23:14:52 ## summary: distribution can restore read access in `repo a` after an explicit d
CVE-2026-34938 10.0 0.10% 1 0 2026-04-06T22:54:13 ### Summary `execute_code()` in `praisonai-agents` runs attacker-controlled Pyt
CVE-2026-34934 9.8 0.05% 1 0 2026-04-06T22:53:55 ## Summary The `get_all_user_threads` function constructs raw SQL queries using
CVE-2025-54328 10.0 0.06% 3 0 2026-04-06T21:31:41 An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor,
CVE-2025-57834 7.5 0.04% 2 0 2026-04-06T21:31:41 An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Mod
CVE-2026-35020 8.4 0.06% 2 0 2026-04-06T21:31:41 Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
CVE-2026-35021 7.8 0.03% 2 0 2026-04-06T21:31:41 Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection v
CVE-2026-21373 7.8 0.01% 1 0 2026-04-06T18:33:15 Memory Corruption when accessing an output buffer without validating its size du
CVE-2026-21367 7.7 0.04% 1 0 2026-04-06T18:33:15 Transient DOS when processing nonstandard FILS Discovery Frames with out-of-rang
CVE-2026-21382 7.8 0.01% 2 0 2026-04-06T18:33:15 Memory Corruption when handling power management requests with improperly sized
CVE-2026-21378 7.8 0.01% 1 0 2026-04-06T18:33:15 Memory Corruption when accessing an output buffer without validating its size du
CVE-2026-21375 7.8 0.01% 1 0 2026-04-06T18:33:15 Memory Corruption when accessing an output buffer without validating its size du
CVE-2026-21381 7.7 0.04% 1 0 2026-04-06T18:33:15 Transient DOS when receiving a service data frame with excessive length during d
CVE-2026-21374 7.8 0.01% 2 0 2026-04-06T18:33:07 Memory Corruption when processing auxiliary sensor input/output control commands
CVE-2025-47392 8.8 0.01% 1 0 2026-04-06T18:33:06 Memory corruption when decoding corrupted satellite data files with invalid sign
CVE-2026-21371 7.8 0.01% 1 0 2026-04-06T18:33:06 Memory Corruption when retrieving output buffer with insufficient size validatio
CVE-2025-47391 7.8 0.01% 1 0 2026-04-06T18:33:05 Memory corruption while processing a frame request from user.
CVE-2025-47389 7.8 0.01% 1 0 2026-04-06T18:33:05 Memory corruption when buffer copy operation fails due to integer overflow durin
CVE-2026-35616 9.8 5.95% 29 5 2026-04-06T18:12:57.863000 A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through
CVE-2026-34752 7.5 0.04% 1 0 2026-04-06T17:32:42 ### Summary Sending an email with `__proto__:` as a header name crashes the Har
CVE-2026-28805 8.8 0.03% 1 0 2026-04-06T17:17:51 ## Description Multiple AJAX select handlers in OpenSTAManager <= 2.10.1 are vu
CVE-2026-5176 7.3 1.97% 1 0 2026-04-06T15:35:31.710000 A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. A
CVE-2026-30078 7.5 0.06% 2 0 2026-04-06T15:31:34 OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invali
CVE-2026-34885 8.5 0.03% 1 0 2026-04-06T15:31:34 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25773 8.1 0.01% 1 0 2026-04-06T15:08:34 ** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize categor
CVE-2026-5628 8.8 0.04% 2 0 2026-04-06T06:30:35 A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted i
CVE-2026-5614 8.8 0.04% 2 0 2026-04-06T06:30:29 A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the f
CVE-2026-5612 8.8 0.04% 2 0 2026-04-06T03:30:30 A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability aff
CVE-2026-5609 8.8 0.05% 1 0 2026-04-06T03:30:25 A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerabilit
CVE-2026-5613 8.8 0.04% 2 0 2026-04-06T03:30:20 A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the
CVE-2026-5610 8.8 0.04% 2 0 2026-04-06T03:30:20 A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue
CVE-2026-5605 8.8 0.02% 2 0 2026-04-06T00:30:31 A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function
CVE-2026-5604 8.8 0.05% 1 0 2026-04-06T00:30:31 A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element
CVE-2026-4272 8.1 0.11% 1 0 2026-04-06T00:30:31 Missing Authentication for Critical Function vulnerability in Honeywell Handheld
CVE-2026-5567 8.8 0.05% 1 0 2026-04-05T15:32:03 A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the funct
CVE-2026-5566 8.8 0.04% 1 0 2026-04-05T15:32:03 A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This
CVE-2026-5550 8.8 0.05% 2 0 2026-04-05T09:30:29 A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affec
CVE-2026-5544 8.8 0.04% 2 0 2026-04-05T06:32:08 A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-18053
CVE-2026-2936 7.2 0.02% 1 0 2026-04-04T12:31:04 The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to S
CVE-2026-5425 7.2 0.06% 1 0 2026-04-04T09:30:37 The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored C
CVE-2026-4896 8.1 0.01% 1 0 2026-04-04T09:30:31 The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Lis
CVE-2026-4634 7.5 0.07% 1 0 2026-04-04T06:00:48 A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulne
CVE-2026-4636 8.1 0.03% 1 0 2026-04-04T06:00:16 A flaw was found in Keycloak. An authenticated user with the uma_protection role
CVE-2026-35470 8.8 0.03% 4 0 2026-04-03T21:57:08 ## Description Six `confronta_righe.php` files across different modules in Open
CVE-2026-25197 9.1 0.03% 1 1 2026-04-03T21:31:49 A specific endpoint allows authenticated users to pivot to other user profiles b
CVE-2026-34742 8.1 0.05% 1 0 2026-04-03T19:48:25.627000 The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Mod
CVE-2025-43202 8.8 0.02% 1 0 2026-04-03T18:31:17 This issue was addressed with improved memory handling. This issue is fixed in i
CVE-2026-34453 7.5 3.47% 1 0 template 2026-04-03T16:53:22.330000 SiYuan is a personal knowledge management system. Prior to version 3.6.2, the pu
CVE-2026-31933 7.5 0.04% 1 0 2026-04-03T16:10:52.680000 Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.
CVE-2026-31931 7.5 0.05% 1 0 2026-04-03T16:10:52.680000 Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before vers
CVE-2026-28815 7.5 0.03% 1 0 2026-04-03T16:10:23.730000 A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an
CVE-2026-35467 7.5 0.02% 1 0 2026-04-03T15:30:31 The stored API keys in temporary browser client is not marked as protected allow
CVE-2026-3502 7.8 1.48% 1 2 2026-04-03T11:40:57.390000 TrueConf Client downloads application update code and applies it without perform
CVE-2026-4350 8.1 0.10% 1 0 2026-04-03T09:30:21 The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion vi
CVE-2026-35168 8.8 0.06% 1 0 2026-04-03T03:47:38 ## Description The Aggiornamenti (Updates) module in OpenSTAManager <= 2.10.1 c
CVE-2026-1668 9.8 0.37% 2 1 2026-04-02T15:32:40 The web interface on multiple Omada switches does not adequately validate certai
CVE-2026-2701 9.1 0.19% 2 0 2026-04-02T15:31:41 Authenticated user can upload a malicious file to the server and execute it, whi
CVE-2026-2699 9.8 0.41% 2 1 template 2026-04-02T15:31:40 Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica
CVE-2026-5281 8.8 3.28% 4 2 2026-04-01T21:30:28 Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote
CVE-2026-4747 8.8 0.18% 1 0 2026-04-01T15:23:23.797000 Each RPCSEC_GSS data packet is validated by a routine which checks a signature i
CVE-2026-34156 9.9 5.76% 1 2 template 2026-04-01T14:24:02.583000 NocoBase is an AI-powered no-code/low-code platform for building business applic
CVE-2026-4020 7.5 6.02% 1 0 template 2026-03-31T03:31:35 The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exp
CVE-2026-4257 9.8 19.61% 1 0 template 2026-03-31T00:31:19 The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side
CVE-2026-5105 6.3 2.16% 1 0 2026-03-30T18:32:18 A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affe
CVE-2026-5103 6.3 2.16% 1 0 2026-03-30T18:31:16 A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This i
CVE-2026-5104 6.3 2.16% 1 0 2026-03-30T18:31:16 A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b2022
CVE-2026-5102 6.3 2.16% 1 0 2026-03-30T00:31:08 A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. T
CVE-2026-33744 7.8 0.01% 2 0 2026-03-27T21:37:34 ## Summary The `docker.system_packages` field in `bentofile.yaml` accepts arbit
CVE-2025-59032 7.5 0.07% 1 0 2026-03-27T09:31:18 ManageSieve AUTHENTICATE command crashes when using literal as SASL initial resp
CVE-2026-33509 7.5 0.08% 2 0 2026-03-26T20:47:02.337000 pyLoad is a free and open-source download manager written in Python. From versio
CVE-2025-55182 10.0 66.27% 4 100 template 2025-12-10T02:00:02.557000 A pre-authentication remote code execution vulnerability exists in React Server
CVE-2024-40766 9.3 3.44% 1 0 2025-10-22T00:33:06 An improper access control vulnerability has been identified in the SonicWall So
CVE-2021-34473 9.8 94.19% 1 14 template 2025-10-22T00:32:19 Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is uni
CVE-2016-2183 7.5 40.99% 2 1 2025-04-12T10:46:40.837000 The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and
CVE-2026-28797 0 0.07% 2 0 N/A
CVE-2026-34990 0 0.01% 2 0 N/A
CVE-2026-35182 0 0.03% 2 0 N/A
CVE-2026-35203 0 0.04% 2 0 N/A
CVE-2026-35395 0 0.03% 2 0 N/A
CVE-2025-53906 0 0.02% 1 0 N/A
CVE-2026-35050 0 0.06% 2 0 N/A
CVE-2026-35045 0 0.03% 2 1 N/A
CVE-2026-34975 0 0.03% 2 0 N/A
CVE-2026-34148 0 0.04% 1 0 N/A
CVE-2026-34402 0 0.02% 1 0 N/A
CVE-2026-34982 0 0.02% 1 0 N/A
CVE-2026-33510 0 0.04% 2 0 N/A
CVE-2026-26027 0 0.05% 2 0 N/A
CVE-2026-26026 0 0.04% 2 0 N/A
CVE-2025-70951 0 0.00% 1 0 N/A
CVE-2026-27456 0 0.01% 1 0 N/A
CVE-2026-34612 0 0.14% 1 0 N/A
CVE-2026-31932 0 0.04% 1 0 N/A

CVE-2026-20432
(8.0 HIGH)

EPSS: 0.06%

updated 2026-04-07T15:31:49

2 posts

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01406170; Issue ID: MSV-4461.

thehackerwire@mastodon.social at 2026-04-07T14:52:05.000Z ##

🟠 CVE-2026-20432 - High (8)

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T14:52:05.000Z ##

🟠 CVE-2026-20432 - High (8)

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5627
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-04-07T15:30:58

4 posts

A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in `server/utils/agentFlows/index.js`. Specifically, the combination of `path.join` and `normalizePath` allows attackers to bypass directory restrictions an

thehackerwire@mastodon.social at 2026-04-07T14:44:39.000Z ##

🔴 CVE-2026-5627 - Critical (9.1)

A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-07T14:30:15.603Z ##

🚨 CVE-2026-5627: Critical path traversal in mintplex-labs/anything-llm (<=1.9.1). Attackers with high privileges can access/delete sensitive .json files. Upgrade to 1.12.1. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-07T14:44:39.000Z ##

🔴 CVE-2026-5627 - Critical (9.1)

A path traversal vulnerability exists in mintplex-labs/anything-llm versions up to and including 1.9.1, within the `AgentFlows` component. The vulnerability arises from improper handling of user input in the `loadFlow` and `deleteFlow` methods in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T14:30:15.000Z ##

🚨 CVE-2026-5627: Critical path traversal in mintplex-labs/anything-llm (<=1.9.1). Attackers with high privileges can access/delete sensitive .json files. Upgrade to 1.12.1. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #PathTraversal #Security

##

CVE-2026-23818
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:30:58

2 posts

A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploitation may redirect an authenticated user to an attacker-controlled server hosting a spoofed login page prompting the unsuspecting victim to give away th

thehackerwire@mastodon.social at 2026-04-07T13:27:13.000Z ##

🟠 CVE-2026-23818 - High (8.8)

A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T13:27:13.000Z ##

🟠 CVE-2026-23818 - High (8.8)

A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22679
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-04-07T15:30:53

2 posts

Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invoking exposed debug functionality. Attackers can craft POST requests with attacker-controlled interfaceName and methodName parameters to reach command-executi

thehackerwire@mastodon.social at 2026-04-07T13:27:04.000Z ##

🔴 CVE-2026-22679 - Critical (9.8)

Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invokin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T13:27:04.000Z ##

🔴 CVE-2026-22679 - Critical (9.8)

Weaver (Fanwei) E-cology 10.0 versions prior to 20260312 contain an unauthenticated remote code execution vulnerability in the /papi/esearch/data/devops/dubboApi/debug/method endpoint that allows attackers to execute arbitrary commands by invokin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-07T15:30:49

2 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

thehackerwire@mastodon.social at 2026-04-07T14:51:55.000Z ##

🟠 CVE-2026-34197 - High (8.8)

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.

Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T14:51:55.000Z ##

🟠 CVE-2026-34197 - High (8.8)

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.

Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20433
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-07T15:30:48

2 posts

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: MOLY01088681; Issue ID: MSV-4460.

thehackerwire@mastodon.social at 2026-04-07T14:52:14.000Z ##

🟠 CVE-2026-20433 - High (8.8)

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T14:52:14.000Z ##

🟠 CVE-2026-20433 - High (8.8)

In Modem, there is a possible out of bounds write due to a missing bounds check. This could lead to remote escalation of privilege, if a UE has connected to a rogue base station controlled by the attacker, with no additional execution privileges n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5373
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:47.140000

2 posts

An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N (8.1 High). This issue was fixed in version 4.0.260202.0 of the runZero Platform.

thehackerwire@mastodon.social at 2026-04-07T15:25:54.000Z ##

🟠 CVE-2026-5373 - High (8.1)

An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:25:54.000Z ##

🟠 CVE-2026-5373 - High (8.1)

An issue that allowed all-organization administrators to promote accounts to superuser status has been resolved. This is an instance of CWE-269: Improper Privilege Management, and has an estimated CVSS score of CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4740
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:46.797000

2 posts

A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certificate that can be approved by the OCM controller. This enables cross-cluster privilege escalation and may allow an attacker to gain control over other manag

thehackerwire@mastodon.social at 2026-04-07T15:26:03.000Z ##

🟠 CVE-2026-4740 - High (8.2)

A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certifica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:26:03.000Z ##

🟠 CVE-2026-4740 - High (8.2)

A flaw was found in Open Cluster Management (OCM), the technology underlying Red Hat Advanced Cluster Management (ACM). Improper validation of Kubernetes client certificate renewal allows a managed cluster administrator to forge a client certifica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35485
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:45.677000

2 posts

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction. Gradio does not server-side validate dropdown values, so an attacker can POST directory traversal payloads (e.g., ../../../etc/passwd) via the API and

thehackerwire@mastodon.social at 2026-04-07T15:26:15.000Z ##

🟠 CVE-2026-35485 - High (7.5)

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:26:15.000Z ##

🟠 CVE-2026-35485 - High (7.5)

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.3, an unauthenticated path traversal vulnerability in load_grammar() allows reading any file on the server filesystem with no extension restriction...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35464
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:44.523000

2 posts

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set and passes the existing path restriction because the Flask session directory is outside both PKGDIR and userdir. A user with SETTINGS and ADD permissions

thehackerwire@mastodon.social at 2026-04-07T15:27:07.000Z ##

🟠 CVE-2026-35464 - High (7.5)

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:27:07.000Z ##

🟠 CVE-2026-35464 - High (7.5)

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35463
(8.8 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:44.363000

2 posts

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to admin-only access. However, this protection is only applied to core config options, not to plugin config options. The AntiVirus plugin stores an executable

thehackerwire@mastodon.social at 2026-04-07T15:26:58.000Z ##

🟠 CVE-2026-35463 - High (8.8)

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to ad...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:26:58.000Z ##

🟠 CVE-2026-35463 - High (8.8)

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the ADMIN_ONLY_OPTIONS protection mechanism restricts security-critical configuration values (reconnect scripts, SSL certs, proxy credentials) to ad...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35457
(8.2 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:43.587000

2 posts

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, the rendezvous server stores pagination cookies without bounds. An unauthenticated peer can repeatedly issue DISCOVER requests and force unbounded memory growth. This vulnerability is fixed in 0.17.1.

thehackerwire@mastodon.social at 2026-04-07T15:27:17.000Z ##

🟠 CVE-2026-35457 - High (8.2)

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, the rendezvous server stores pagination cookies without bounds. An unauthenticated peer can repeatedly issue DISCOVER requests and force unbo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:27:17.000Z ##

🟠 CVE-2026-35457 - High (8.2)

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, the rendezvous server stores pagination cookies without bounds. An unauthenticated peer can repeatedly issue DISCOVER requests and force unbo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35405
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:43.367000

2 posts

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique namespaces in a loop and the server happily accepts every single one allocating memory for each registration with no pushback. Keep doing this long enough

thehackerwire@mastodon.social at 2026-04-07T15:27:14.000Z ##

🟠 CVE-2026-35405 - High (7.5)

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:27:14.000Z ##

🟠 CVE-2026-35405 - High (7.5)

libp2p-rust is the official rust language Implementation of the libp2p networking stack. Prior to 0.17.1, libp2p-rendezvous server has no limit on how many namespaces a single peer can register. A malicious peer can just keep registering unique n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35187
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-07T15:17:42.940000

2 posts

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the parse_urls API function in src/pyload/core/api/__init__.py fetches arbitrary URLs server-side via get_url(url) (pycurl) without any URL validation, protocol restriction, or IP blacklist. An authenticated user with ADD permission can make HTTP/HTTPS requests to internal network resources and cloud

thehackerwire@mastodon.social at 2026-04-07T04:59:51.000Z ##

🟠 CVE-2026-35187 - High (7.7)

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the parse_urls API function in src/pyload/core/api/__init__.py fetches arbitrary URLs server-side via get_url(url) (pycurl) without any URL validati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T04:59:51.000Z ##

🟠 CVE-2026-35187 - High (7.7)

pyLoad is a free and open-source download manager written in Python. In 0.5.0b3.dev96 and earlier, the parse_urls API function in src/pyload/core/api/__init__.py fetches arbitrary URLs server-side via get_url(url) (pycurl) without any URL validati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35164
(8.8 HIGH)

EPSS: 0.21%

updated 2026-04-07T15:17:42.303000

2 posts

Brave CMS is an open-source CMS. Prior to 2.0.6, an unrestricted file upload vulnerability exists in the CKEditor upload functionality. It is found in app/Http/Controllers/Dashboard/CkEditorController.php within the ckupload method. The method fails to validate uploaded file types and relies entirely on user input. This allows an authenticated user to upload executable PHP scripts and gain Remote

thehackerwire@mastodon.social at 2026-04-07T05:53:14.000Z ##

🟠 CVE-2026-35164 - High (8.8)

Brave CMS is an open-source CMS. Prior to 2.0.6, an unrestricted file upload vulnerability exists in the CKEditor upload functionality. It is found in app/Http/Controllers/Dashboard/CkEditorController.php within the ckupload method. The method fai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:53:14.000Z ##

🟠 CVE-2026-35164 - High (8.8)

Brave CMS is an open-source CMS. Prior to 2.0.6, an unrestricted file upload vulnerability exists in the CKEditor upload functionality. It is found in app/Http/Controllers/Dashboard/CkEditorController.php within the ckupload method. The method fai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34783
(8.1 HIGH)

EPSS: 0.16%

updated 2026-04-07T15:17:40.383000

1 posts

Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4, a path traversal vulnerability in Ferret's IO::FS::WRITE standard library function allows a malicious website to write arbitrary files to the filesystem of the machine running Ferret. When an operator scrapes a website that returns filenames containing ../ sequences, and uses those filenames to construct output paths

thehackerwire@mastodon.social at 2026-04-06T17:22:30.000Z ##

🟠 CVE-2026-34783 - High (8.1)

Ferret is a declarative system for working with web data. Prior to 2.0.0-alpha.4, a path traversal vulnerability in Ferret's IO::FS::WRITE standard library function allows a malicious website to write arbitrary files to the filesystem of the machi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24660
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:37.213000

2 posts

A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-04-07T15:27:32.000Z ##

🟠 CVE-2026-24660 - High (8.1)

A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:27:32.000Z ##

🟠 CVE-2026-24660 - High (8.1)

A heap-based buffer overflow vulnerability exists in the x3f_load_huffman functionality of LibRaw Commit d20315b. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24450
(8.1 HIGH)

EPSS: 0.00%

updated 2026-04-07T15:17:37.040000

2 posts

An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.

thehackerwire@mastodon.social at 2026-04-07T15:27:23.000Z ##

🟠 CVE-2026-24450 - High (8.1)

An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:27:23.000Z ##

🟠 CVE-2026-24450 - High (8.1)

An integer overflow vulnerability exists in the uncompressed_fp_dng_load_raw functionality of LibRaw Commit 8dc68e2. A specially crafted malicious file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vu...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35409
(7.7 HIGH)

EPSS: 0.03%

updated 2026-04-07T14:20:08

2 posts

### Summary A Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block requests to local and private networks could be circumvented using IPv4-Mapped IPv6 address notation. ### Details Directus implements an IP deny-list to prevent server-side requests to internal/private network ranges. The validation logic

thehackerwire@mastodon.social at 2026-04-07T03:26:20.000Z ##

🟠 CVE-2026-35409 - High (7.7)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:26:20.000Z ##

🟠 CVE-2026-35409 - High (7.7)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.16.0, a Server-Side Request Forgery (SSRF) protection bypass has been identified and fixed in Directus. The IP address validation mechanism used to block ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35408
(8.7 HIGH)

EPSS: 0.01%

updated 2026-04-07T14:19:50

2 posts

## Summary Directus's Single Sign-On (SSO) login pages lacked a `Cross-Origin-Opener-Policy` (COOP) HTTP response header. Without this header, a malicious cross-origin window that opens the Directus login page retains the ability to access and manipulate the `window` object of that page. An attacker can exploit this to intercept and redirect the OAuth authorization flow to an attacker-controlled

thehackerwire@mastodon.social at 2026-04-07T03:17:04.000Z ##

🟠 CVE-2026-35408 - High (8.7)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:17:04.000Z ##

🟠 CVE-2026-35408 - High (8.7)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, Directus's Single Sign-On (SSO) login pages lacked a Cross-Origin-Opener-Policy (COOP) HTTP response header. Without this header, a malicious cross-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3184
(3.7 LOW)

EPSS: 0.08%

updated 2026-04-07T13:20:55.200000

1 posts

A flaw was found in util-linux. Improper hostname canonicalization in the `login(1)` utility, when invoked with the `-h` option, can modify the supplied remote hostname before setting `PAM_RHOST`. A remote attacker could exploit this by providing a specially crafted hostname, potentially bypassing host-based Pluggable Authentication Modules (PAM) access control rules that rely on fully qualified d

1 repos

https://github.com/Mothra-1/CVE-2026-31844

linux@activitypub.awakari.com at 2026-04-07T08:02:25.000Z ## CVE-2026-3184 Util-linux: util-linux: access control bypass due to improper hostname canonicalization Information published.

#CVE

Origin | Interest | Match ##

CVE-2026-32186
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-04-07T13:20:55.200000

1 posts

Microsoft Bing Elevation of Privilege Vulnerability

CVE-2026-3445
(7.1 HIGH)

EPSS: 0.03%

updated 2026-04-07T13:20:55.200000

1 posts

The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to unauthorized membership payment bypass in all versions up to, and including, 4.16.11. This is due to a missing ownership verification on the `change_plan_sub_id` parameter in the `process_checkout()` function. This makes it possible for aut

offseq@infosec.exchange at 2026-04-05T04:30:26.000Z ##

🚨 HIGH severity: CVE-2026-3445 in ProfilePress plugin lets subscriber-level users bypass paid memberships via missing authorization in process_checkout(). No patch yet. Restrict privileges & monitor activity. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-1233
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-07T13:20:55.200000

2 posts

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the vendor's external telemetry server in the `Mementor_TTS_Remote_Telemetry` class. This makes it possible for unauthenticated attackers to extract and decod

offseq@infosec.exchange at 2026-04-05T03:00:26.000Z ##

CVE-2026-1233 (HIGH): The Text to Speech for WP plugin (<=1.9.8) exposes hardcoded MySQL creds, risking unauthorized write access to telemetry DB. No patch yet — disable or restrict access. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #InfoSec #CVE

##

thehackerwire@mastodon.social at 2026-04-05T01:20:09.000Z ##

🟠 CVE-2026-1233 - High (7.5)

The Text to Speech for WP (AI Voices by Mementor) plugin for WordPress is vulnerable to sensitive information exposure in all versions up to, and including, 1.9.8. This is due to the plugin containing hardcoded MySQL database credentials for the v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3666
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-07T13:20:55.200000

2 posts

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authenticated attackers, with subscriber level access and above, to delete arbitrary files on the server by embedding a crafted path traversal string in a forum po

thehackerwire@mastodon.social at 2026-04-05T01:19:59.000Z ##

🟠 CVE-2026-3666 - High (8.8)

The wpForo Forum plugin for WordPress is vulnerable to arbitrary file deletion in all versions up to, and including, 2.4.16. This is due to a missing file name/path validation against path traversal sequences. This makes it possible for authentica...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T00:00:36.000Z ##

wpForo Forum plugin for WordPress (up to 2.4.16) has a HIGH severity path traversal vuln (CVE-2026-3666) 🛡️. Authenticated users can delete server files. No patch yet — restrict permissions & watch for suspicious deletions. More: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Infosec

##

CVE-2026-34935
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-07T13:20:55.200000

1 posts

PraisonAI is a multi-agent teams system. From version 4.5.15 to before version 4.5.69, the --mcp CLI argument is passed directly to shlex.split() and forwarded through the call chain to anyio.open_process() with no validation, allowlist check, or sanitization at any hop, allowing arbitrary OS command execution as the process user. This issue has been patched in version 4.5.69.

offseq@infosec.exchange at 2026-04-04T07:30:29.000Z ##

⚠️ CRITICAL: PraisonAI (v4.5.15 - <4.5.69) vulnerable to OS command injection via - -mcp, allowing arbitrary OS commands (CVE-2026-34935). Patch to 4.5.69+ now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202634935 #PraisonAI #infosec

##

CVE-2025-47390
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory corruption while preprocessing IOCTL request in JPEG driver.

CVE-2026-21372
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.

thehackerwire@mastodon.social at 2026-04-06T17:00:10.000Z ##

🟠 CVE-2026-21372 - High (7.8)

Memory Corruption when sending IOCTL requests with invalid buffer sizes during memcpy operations.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21376
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

2 posts

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

thehackerwire@mastodon.social at 2026-04-06T16:26:31.000Z ##

🟠 CVE-2026-21376 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T16:24:16.000Z ##

🟠 CVE-2026-21376 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21380
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory.

thehackerwire@mastodon.social at 2026-04-06T16:24:25.000Z ##

🟠 CVE-2026-21380 - High (7.8)

Memory Corruption when using deprecated DMABUF IOCTL calls to manage video memory.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26263
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-07T13:20:35.010000

1 posts

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated time-based blind SQL injection exists in GLPI's Search engine. This vulnerability is fixed in 11.0.6.

thehackerwire@mastodon.social at 2026-04-06T15:35:35.000Z ##

🟠 CVE-2026-26263 - High (8.1)

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated time-based blind SQL injection exists in GLPI's Search engine. This vulnerability is fixed in 11.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3524
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

Mattermost Plugin Legal Hold versions <=1.1.4 fail to halt request processing after a failed authorization check in ServeHTTP which allows an authenticated attacker to access, create, download, and delete legal hold data via crafted API requests to the plugin's endpoints. Mattermost Advisory ID: MMSA-2026-00621

thehackerwire@mastodon.social at 2026-04-06T13:18:53.000Z ##

🟠 CVE-2026-3524 - High (8.8)

Mattermost Plugin Legal Hold versions &lt;=1.1.4 fail to halt request processing after a failed authorization check in ServeHTTP which allows an authenticated attacker to access, create, download, and delete legal hold data via crafted API request...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5629
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:35.010000

2 posts

A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

offseq@infosec.exchange at 2026-04-06T07:30:28.000Z ##

⚠️ CVE-2026-5629: High-severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remote exploit possible — public code out, no patch yet. Restrict device access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity #Belkin

##

thehackerwire@mastodon.social at 2026-04-06T06:22:15.000Z ##

🟠 CVE-2026-5629 - High (8.8)

A vulnerability was detected in Belkin F9K1015 1.00.10. The affected element is the function formSetFirewall of the file /goform/formSetFirewall. The manipulation of the argument webpage results in stack-based buffer overflow. The attack can be ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5611
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:35.010000

1 posts

A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function formCrossBandSwitch of the file /goform/formCrossBandSwitch. Performing a manipulation of the argument webpage results in stack-based buffer overflow. The attack can be initiated remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any

thehackerwire@mastodon.social at 2026-04-06T04:00:28.000Z ##

🟠 CVE-2026-5611 - High (8.8)

A vulnerability was found in Belkin F9K1015 1.00.10. This affects the function formCrossBandSwitch of the file /goform/formCrossBandSwitch. Performing a manipulation of the argument webpage results in stack-based buffer overflow. The attack can be...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5608
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:35.010000

2 posts

A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

offseq@infosec.exchange at 2026-04-06T01:30:25.000Z ##

⚠️ HIGH severity: CVE-2026-5608 in Belkin F9K1122 v1.00.33 enables remote buffer overflow via the /goform/formWlanSetup endpoint. Exploit code is public; no patch from vendor. Restrict remote mgmt access now. radar.offseq.com/threat/cve-20 #OffSeq #Belkin #Vuln

##

thehackerwire@mastodon.social at 2026-04-06T01:18:30.000Z ##

🟠 CVE-2026-5608 - High (8.8)

A vulnerability was detected in Belkin F9K1122 1.00.33. Affected is the function formWlanSetup of the file /goform/formWlanSetup. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be performed from rem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5558
(6.3 MEDIUM)

EPSS: 0.01%

updated 2026-04-07T13:20:35.010000

1 posts

A flaw has been found in PHPGurukul PHPGurukul Online Shopping Portal Project up to 2.1. Impacted is an unknown function of the file /pending-orders.php of the component Parameter Handler. This manipulation of the argument ID causes sql injection. The attack is possible to be carried out remotely. The exploit has been published and may be used.

offseq@infosec.exchange at 2026-04-05T10:30:26.000Z ##

⚠️ MEDIUM risk: CVE-2026-5558 allows SQL injection in PHPGurukul Online Shopping Portal (v2.0, 2.1) via /pending-orders.php. Exploit is public. Review your instances & restrict access if needed. Details: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #PHP #Vuln

##

CVE-2026-5548
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-07T13:20:35.010000

1 posts

A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overflow. The attack can be initiated remotely.

thehackerwire@mastodon.social at 2026-04-05T08:17:52.000Z ##

🟠 CVE-2026-5548 - High (8.8)

A vulnerability was found in Tenda AC10 16.03.10.10_multi_TDE01. Affected by this vulnerability is the function fromSysToolChangePwd of the file /bin/httpd. Performing a manipulation of the argument sys.userpass results in stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34989
(0 None)

EPSS: 0.05%

updated 2026-04-07T13:20:11.643000

2 posts

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to 31.0.0.0, the application fails to properly sanitize user-controlled input when users update their profile name (e.g., full name / username). An attacker can inject a malicious JavaScript payload into their profile name, which is then stored server-

offseq at 2026-04-07T13:00:28.532Z ##

⚠️ CRITICAL: Stored XSS in ci4-cms-erp ci4ms (<31.0.0.0) lets attackers inject JS via profile names, risking user sessions. Fixed in 31.0.0.0. Patch now! CVE-2026-34989 radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-07T13:00:28.000Z ##

⚠️ CRITICAL: Stored XSS in ci4-cms-erp ci4ms (<31.0.0.0) lets attackers inject JS via profile names, risking user sessions. Fixed in 31.0.0.0. Patch now! CVE-2026-34989 radar.offseq.com/threat/cve-20 #OffSeq #XSS #WebSecurity #CVE202634989

##

CVE-2026-35471
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-07T13:20:11.643000

6 posts

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.

offseq at 2026-04-07T08:30:26.510Z ##

🚨 CRITICAL: goshs (<2.0.0-beta.3) vulnerable to path traversal (CVE-2026-35471). Remote attackers can access/delete files outside restricted dirs. Patch with 2.0.0-beta.3 ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-07T03:16:44.000Z ##

🔴 CVE-2026-35471 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-07T00:00:37.932Z ##

🔔 CRITICAL: CVE-2026-35471 in patrickhener goshs (<2.0.0-beta.3) allows path traversal via tdeleteFile(), enabling attackers to access or delete files outside the intended directory. Upgrade to 2.0.0-beta.3 ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-07T08:30:26.000Z ##

🚨 CRITICAL: goshs (<2.0.0-beta.3) vulnerable to path traversal (CVE-2026-35471). Remote attackers can access/delete files outside restricted dirs. Patch with 2.0.0-beta.3 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #infosec #golang #CVE202635471

##

thehackerwire@mastodon.social at 2026-04-07T03:16:44.000Z ##

🔴 CVE-2026-35471 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, tdeleteFile() missing return after path traversal check. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T00:00:37.000Z ##

🔔 CRITICAL: CVE-2026-35471 in patrickhener goshs (<2.0.0-beta.3) allows path traversal via tdeleteFile(), enabling attackers to access or delete files outside the intended directory. Upgrade to 2.0.0-beta.3 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202635471 #GoLang #PathTraversal

##

CVE-2026-35044
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:11.643000

2 posts

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandboxed jinja2.Environment with the jinja2.ext.do extension to render user-provided dockerfile_template files. When a victim imports a malicious bento archiv

thehackerwire@mastodon.social at 2026-04-07T06:00:07.000Z ##

🟠 CVE-2026-35044 - High (8.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandbo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T06:00:07.000Z ##

🟠 CVE-2026-35044 - High (8.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the Dockerfile generation function generate_containerfile() in src/bentoml/_internal/container/generate.py uses an unsandbo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0740
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-04-07T13:20:11.643000

4 posts

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note:

offseq at 2026-04-07T05:30:30.557Z ##

🚨 CRITICAL: CVE-2026-0740 in Ninja Forms - File Uploads (≤3.3.26) lets unauthenticated attackers upload arbitrary files, enabling RCE. Patch to 3.3.27+ now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-07T05:17:00.000Z ##

🔴 CVE-2026-0740 - Critical (9.8)

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This make...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T05:30:30.000Z ##

🚨 CRITICAL: CVE-2026-0740 in Ninja Forms - File Uploads (≤3.3.26) lets unauthenticated attackers upload arbitrary files, enabling RCE. Patch to 3.3.27+ now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-04-07T05:17:00.000Z ##

🔴 CVE-2026-0740 - Critical (9.8)

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This make...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35022
(9.8 CRITICAL)

EPSS: 0.25%

updated 2026-04-07T13:20:11.643000

4 posts

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without input validation. Attackers who can influence authentication settings can inject shell metacharacters through parameters like apiKeyHelper, awsAuthRefresh, awsCredentialExport, and gcpAuthRefresh to e

thehackerwire@mastodon.social at 2026-04-07T05:20:08.000Z ##

🔴 CVE-2026-35022 - Critical (9.8)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without input validation. Attackers who can influence a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-07T04:30:27.350Z ##

⚠️ CRITICAL: Anthropic Claude Code CLI & Agent SDK vulnerable to OS command injection (CVE-2026-35022, CVSS 9.3). Attackers can exploit auth helpers for arbitrary command execution. Vendor patch is server-side — confirm update. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-07T05:20:08.000Z ##

🔴 CVE-2026-35022 - Critical (9.8)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in authentication helper execution where helper configuration values are executed using shell=true without input validation. Attackers who can influence a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T04:30:27.000Z ##

⚠️ CRITICAL: Anthropic Claude Code CLI & Agent SDK vulnerable to OS command injection (CVE-2026-35022, CVSS 9.3). Attackers can exploit auth helpers for arbitrary command execution. Vendor patch is server-side — confirm update. radar.offseq.com/threat/cve-20 #OffSeq #CVE #CloudSecurity

##

CVE-2026-35392
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-07T13:20:11.643000

4 posts

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3.

thehackerwire@mastodon.social at 2026-04-07T03:26:29.000Z ##

🔴 CVE-2026-35392 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-07T03:00:28.349Z ##

🚨 CVE-2026-35392: goshs < 2.0.0-beta.3 has a CRITICAL path traversal flaw (CVSS 9.8). Remote attackers can write files anywhere on the server. Upgrade to 2.0.0-beta.3+ ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-07T03:26:29.000Z ##

🔴 CVE-2026-35392 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, PUT upload in httpserver/updown.go has no path sanitization. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T03:00:28.000Z ##

🚨 CVE-2026-35392: goshs < 2.0.0-beta.3 has a CRITICAL path traversal flaw (CVSS 9.8). Remote attackers can write files anywhere on the server. Upgrade to 2.0.0-beta.3+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #GoLang #Vulnerability

##

CVE-2026-35442
(8.1 HIGH)

EPSS: 0.04%

updated 2026-04-07T13:20:11.643000

2 posts

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placeholder. When combined with groupBy, any authenticated user with read access to the affected collection can extract concealed field values, including static

thehackerwire@mastodon.social at 2026-04-07T03:16:53.000Z ##

🟠 CVE-2026-35442 - High (8.1)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placehol...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:16:53.000Z ##

🟠 CVE-2026-35442 - High (8.1)

Directus is a real-time API and App dashboard for managing SQL database content. Prior to 11.17.0, aggregate functions (min, max) applied to fields with the conceal special type incorrectly return raw database values instead of the masked placehol...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5709
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-07T13:20:11.643000

2 posts

Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input when using the FileBrowser functionality. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding mitigat

thehackerwire@mastodon.social at 2026-04-07T03:00:32.000Z ##

🟠 CVE-2026-5709 - High (8.8)

Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:00:32.000Z ##

🟠 CVE-2026-5709 - High (8.8)

Unsanitized input in the FileBrowser API in AWS Research and Engineering Studio (RES) version 2024.10 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands on the cluster-manager EC2 instance via crafted input w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5687
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-07T13:20:11.643000

2 posts

A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-07T02:59:52.000Z ##

🟠 CVE-2026-5687 - High (8.8)

A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be init...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T02:59:52.000Z ##

🟠 CVE-2026-5687 - High (8.8)

A weakness has been identified in Tenda CX12L 16.03.53.12. This issue affects the function fromNatStaticSetting of the file /goform/NatStaticSetting. This manipulation of the argument page causes stack-based buffer overflow. The attack may be init...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35174
(9.1 CRITICAL)

EPSS: 0.35%

updated 2026-04-07T13:20:11.643000

2 posts

Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path traversal vulnerability exists in the administration console that allows an administrator or a user with Change Settings permission to change the uploads path to any folder. This vulnerability allows the user to download any file on the server, including config.json.php with database credentials and overwrite critical sys

thehackerwire@mastodon.social at 2026-04-06T18:23:52.000Z ##

🔴 CVE-2026-35174 - Critical (9.1)

Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path traversal vulnerability exists in the administration console that allows an administrator or a user with Change Settings permission to change the uploads path to any fold...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:23:52.000Z ##

🔴 CVE-2026-35174 - Critical (9.1)

Chyrp Lite is an ultra-lightweight blogging engine. Prior to 2026.01, a path traversal vulnerability exists in the administration console that allows an administrator or a user with Change Settings permission to change the uploads path to any fold...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34986
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:11.643000

1 posts

Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. Prior to 4.1.4 and 3.0.5, decrypting a JSON Web Encryption (JWE) object will panic if the alg field indicates a key wrapping algorithm (one ending in KW, with the exception of A128GC

thehackerwire@mastodon.social at 2026-04-06T17:19:06.000Z ##

🟠 CVE-2026-34986 - High (7.5)

Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. Prior to 4.1.4 and 3.0.5, dec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34208
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-04-07T13:20:11.643000

1 posts

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor.call(target, attackerObject). Because this.constructor resolves to the internal SandboxGlobal function and Function.prototype.call is allowed, attacker

thehackerwire@mastodon.social at 2026-04-06T16:23:04.000Z ##

🔴 CVE-2026-34208 - Critical (10)

SandboxJS is a JavaScript sandboxing library. Prior to 0.8.36, SandboxJS blocks direct assignment to global objects (for example Math.random = ...), but this protection can be bypassed through an exposed callable constructor path: this.constructor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33752
(8.6 HIGH)

EPSS: 0.01%

updated 2026-04-07T13:20:11.643000

1 posts

curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect requests to internal services such as cloud metadata endpoints. In addition, curl_cffi’s TLS impersonation feature can make these requests appear as legitimat

1 repos

https://github.com/redyank/CVE-2026-33752

thehackerwire@mastodon.social at 2026-04-06T16:20:40.000Z ##

🟠 CVE-2026-33752 - High (8.6)

curl_cffi is the a Python binding for curl. Prior to 0.15.0, curl_cffi does not restrict requests to internal IP ranges, and follows redirects automatically via the underlying libcurl. Because of this, an attacker-controlled URL can redirect reque...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31842
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-07T12:31:21

2 posts

Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against "chunked", even though RFC 7230 specifies that transfer-coding names are case-insensitive. By sending a request with Transfer-Encoding: Chunked, an unau

thehackerwire@mastodon.social at 2026-04-07T12:18:14.000Z ##

🟠 CVE-2026-31842 - High (7.5)

Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T12:18:14.000Z ##

🟠 CVE-2026-31842 - High (7.5)

Tinyproxy through 1.11.3 is vulnerable to HTTP request parsing desynchronization due to a case-sensitive comparison of the Transfer-Encoding header in src/reqs.c. The is_chunked_transfer() function uses strcmp() to compare the header value against...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34904
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-07T09:31:28

2 posts

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0.

thehackerwire@mastodon.social at 2026-04-07T10:10:04.000Z ##

🟠 CVE-2026-34904 - High (7.5)

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T10:10:04.000Z ##

🟠 CVE-2026-34904 - High (7.5)

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Simple Social Media Share Buttons allows Cross Site Request Forgery.This issue affects Simple Social Media Share Buttons: from n/a through 6.2.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34896
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-07T09:31:28

2 posts

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, Coming Soon & Maintenance Mode allows Cross Site Request Forgery.This issue affects Under Construction, Coming Soon & Maintenance Mode: from n/a through 2.1.1.

thehackerwire@mastodon.social at 2026-04-07T10:09:55.000Z ##

🟠 CVE-2026-34896 - High (7.5)

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, Coming Soon & Maintenance Mode allows Cross Site Request Forgery.This issue affects Under Construction, Coming Soon & Maintenance Mode: from n/a through 2.1.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T10:09:55.000Z ##

🟠 CVE-2026-34896 - High (7.5)

Cross-Site Request Forgery (CSRF) vulnerability in Analytify Under Construction, Coming Soon & Maintenance Mode allows Cross Site Request Forgery.This issue affects Under Construction, Coming Soon & Maintenance Mode: from n/a through 2.1.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5465
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-07T09:31:28

2 posts

The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate changes to the `externalId` field when a Provider (Employee) user updates their own profile. The `externalId` maps directly to a WordPress user ID and is pa

1 repos

https://github.com/kaleth4/CVE-2026-5465

thehackerwire@mastodon.social at 2026-04-07T08:00:12.000Z ##

🟠 CVE-2026-5465 - High (8.8)

The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T08:00:12.000Z ##

🟠 CVE-2026-5465 - High (8.8)

The Booking for Appointments and Events Calendar – Amelia plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.3. This is due to the `UpdateProviderCommandHandler` failing to validate c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1114
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-07T09:31:22

4 posts

In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brute-force attack to recover the secret key. Once the secret key is obtained, the attacker can forge administrative tokens by modifying the JWT payload and

thehackerwire@mastodon.social at 2026-04-07T08:00:27.000Z ##

🔴 CVE-2026-1114 - Critical (9.8)

In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-07T07:00:27.708Z ##

🔴 CRITICAL: CVE-2026-1114 in parisneo/lollms v2.1.0 — weak JWT secret lets attackers brute-force, forge admin tokens & escalate privileges. Patch to v2.2.0 now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-07T08:00:27.000Z ##

🔴 CVE-2026-1114 - Critical (9.8)

In parisneo/lollms version 2.1.0, the application's session management is vulnerable to improper access control due to the use of a weak secret key for signing JSON Web Tokens (JWT). This vulnerability allows an attacker to perform an offline brut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T07:00:27.000Z ##

🔴 CRITICAL: CVE-2026-1114 in parisneo/lollms v2.1.0 — weak JWT secret lets attackers brute-force, forge admin tokens & escalate privileges. Patch to v2.2.0 now! radar.offseq.com/threat/cve-20 #OffSeq #CVE20261114 #AppSec #infosec

##

CVE-2025-65115
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-07T06:30:28

2 posts

Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows

thehackerwire@mastodon.social at 2026-04-07T06:17:15.000Z ##

🟠 CVE-2025-65115 - High (8.8)

Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Managemen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T06:17:15.000Z ##

🟠 CVE-2025-65115 - High (8.8)

Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Managemen...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5686
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-07T00:30:28

2 posts

A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-07T03:06:08.000Z ##

🟠 CVE-2026-5686 - High (8.8)

A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:06:08.000Z ##

🟠 CVE-2026-5686 - High (8.8)

A security flaw has been discovered in Tenda CX12L 16.03.53.12. This vulnerability affects the function fromRouteStatic of the file /goform/RouteStatic. The manipulation of the argument page results in stack-based buffer overflow. The attack can b...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5708
(8.8 HIGH)

EPSS: 0.12%

updated 2026-04-07T00:30:28

2 posts

Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop host instance profile permissions, and interact with AWS resources and services via a crafted API request. To remediate this issue, users are advised to

thehackerwire@mastodon.social at 2026-04-07T03:00:16.000Z ##

🟠 CVE-2026-5708 - High (8.8)

Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:00:16.000Z ##

🟠 CVE-2026-5708 - High (8.8)

Unsanitized control of user-modifiable attributes in the session creation component in AWS Research and Engineering Studio (RES) prior to version 2026.03 could allow an authenticated remote user to escalate privileges, assume the virtual desktop h...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5707
(8.8 HIGH)

EPSS: 0.21%

updated 2026-04-07T00:30:28

2 posts

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the virtual desktop host via a crafted session name. To remediate this issue, users are advised to upgrade to RES version 2026.03 or apply the corresponding

thehackerwire@mastodon.social at 2026-04-07T03:00:03.000Z ##

🟠 CVE-2026-5707 - High (8.8)

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:00:03.000Z ##

🟠 CVE-2026-5707 - High (8.8)

Unsanitized input in an OS command in the virtual desktop session name handling in AWS Research and Engineering Studio (RES) version 2025.03 through 2025.12.01 might allow a remote authenticated actor to execute arbitrary commands as root on the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5685
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-07T00:30:27

2 posts

A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit is publicly available and might be used.

thehackerwire@mastodon.social at 2026-04-07T03:00:55.000Z ##

🟠 CVE-2026-5685 - High (8.8)

A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:00:55.000Z ##

🟠 CVE-2026-5685 - High (8.8)

A vulnerability was identified in Tenda CX12L 16.03.53.12. This affects the function fromAddressNat of the file /goform/addressNat. The manipulation of the argument page leads to stack-based buffer overflow. The attack can be initiated remotely. T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5684
(8.0 HIGH)

EPSS: 0.03%

updated 2026-04-07T00:30:27

2 posts

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overflow. The attack requires access to the local network. The exploit has been publicly disclosed and may be utilized.

thehackerwire@mastodon.social at 2026-04-07T03:00:43.000Z ##

🟠 CVE-2026-5684 - High (8)

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T03:00:43.000Z ##

🟠 CVE-2026-5684 - High (8)

A vulnerability was determined in Tenda CX12L 16.03.53.12. Affected by this issue is the function fromwebExcptypemanFilter of the file /goform/webExcptypemanFilter. Executing a manipulation of the argument page can lead to stack-based buffer overf...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35394
(8.3 HIGH)

EPSS: 0.04%

updated 2026-04-06T23:43:56

2 posts

### Summary The `mobile_open_url` tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrary Android intents, including USSD codes, phone calls, SMS messages, and content provider access. ### Details The vulnerable code passes URLs directly to `adb shell am start -a android.intent.action.VIEW -d <url>` without

thehackerwire@mastodon.social at 2026-04-07T04:00:04.000Z ##

🟠 CVE-2026-35394 - High (8.3)

Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T04:00:04.000Z ##

🟠 CVE-2026-35394 - High (8.3)

Mobile Next is an MCP server for mobile development and automation. Prior to 0.0.50, the mobile_open_url tool in mobile-mcp passes user-supplied URLs directly to Android's intent system without any scheme validation, allowing execution of arbitrar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35393
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-06T23:43:51

6 posts

### Summary * POST multipart upload directory not sanitized | `httpserver/updown.go:71-174` This finding affect the default configuration, no flags or authentication required. ### Details **File:** `httpserver/updown.go:71-174` **Trigger:** `POST /<path>/upload` (server.go:49-51 checks `HasSuffix(r.URL.Path, "/upload")`) The filename is sanitized (slashes stripped, line 105-106), but the targe

offseq at 2026-04-07T11:30:27.144Z ##

🚨 CRITICAL: CVE-2026-35393 in goshs (<2.0.0-beta.3) allows unauthenticated path traversal via POST uploads. Remote attackers can write files anywhere on disk. Upgrade to 2.0.0-beta.3 now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-04-07T03:26:38.000Z ##

🔴 CVE-2026-35393 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multipart upload directory not sanitized. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-04-07T01:30:27.688Z ##

🚨 CVE-2026-35393: Critical path traversal in goshs (<2.0.0-beta.3). Remote attackers can write files anywhere via unsanitized POST uploads. Upgrade to 2.0.0-beta.3 now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-04-07T11:30:27.000Z ##

🚨 CRITICAL: CVE-2026-35393 in goshs (<2.0.0-beta.3) allows unauthenticated path traversal via POST uploads. Remote attackers can write files anywhere on disk. Upgrade to 2.0.0-beta.3 now! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vulnerability

##

thehackerwire@mastodon.social at 2026-04-07T03:26:38.000Z ##

🔴 CVE-2026-35393 - Critical (9.8)

goshs is a SimpleHTTPServer written in Go. Prior to 2.0.0-beta.3, the POST multipart upload directory not sanitized. This vulnerability is fixed in 2.0.0-beta.3.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-07T01:30:27.000Z ##

🚨 CVE-2026-35393: Critical path traversal in goshs (<2.0.0-beta.3). Remote attackers can write files anywhere via unsanitized POST uploads. Upgrade to 2.0.0-beta.3 now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #GoLang #Infosec

##

CVE-2026-33540
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-06T23:42:46

2 posts

hi guys, commit: 40594bd98e6d6ed993b5c6021c93fdf96d2e5851 (as-of 2026-01-31) contact: GitHub Security Advisory (https://github.com/distribution/distribution/security/advisories/new) ## summary in pull-through cache mode, distribution discovers token auth endpoints by parsing `WWW-Authenticate` challenges returned by the configured upstream registry. the `realm` URL from a bearer challenge is us

thehackerwire@mastodon.social at 2026-04-06T15:41:29.000Z ##

🟠 CVE-2026-33540 - High (7.5)

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream regis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T15:35:15.000Z ##

🟠 CVE-2026-33540 - High (7.5)

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, in pull-through cache mode, distribution discovers token auth endpoints by parsing WWW-Authenticate challenges returned by the configured upstream regis...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35209
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-06T23:42:30

2 posts

### Impact Applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) as the first argument to `defu()` are vulnerable to prototype pollution. A crafted payload containing a `__proto__` key can override intended default values in the merged result: ```js import { defu } from 'defu' const userInput = JSON.parse('{"__

thehackerwire@mastodon.social at 2026-04-06T18:23:28.000Z ##

🟠 CVE-2026-35209 - High (7.5)

defu is software that allows uers to assign default properties recursively. Prior to version 6.1.5, applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) as the fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:23:28.000Z ##

🟠 CVE-2026-35209 - High (7.5)

defu is software that allows uers to assign default properties recursively. Prior to version 6.1.5, applications that pass unsanitized user input (e.g. parsed JSON request bodies, database records, or config files from untrusted sources) as the fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35043
(7.8 HIGH)

EPSS: 0.07%

updated 2026-04-06T23:42:05

2 posts

Commit ce53491 (March 24) fixed command injection via `system_packages` in Dockerfile templates and `images.py` by adding `shlex.quote`. However, the cloud deployment path in `src/bentoml/_internal/cloud/deployment.py` was not included in the fix. Line 1648 interpolates `system_packages` directly into a shell command using an f-string without any quoting. The generated script is uploaded to Bento

thehackerwire@mastodon.social at 2026-04-07T05:53:23.000Z ##

🟠 CVE-2026-35043 - High (7.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:53:23.000Z ##

🟠 CVE-2026-35043 - High (7.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35042
(7.5 HIGH)

EPSS: 0.01%

updated 2026-04-06T23:41:50

2 posts

## Summary `fast-jwt` does not validate the `crit` (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a `crit` array listing extensions that `fast-jwt` does not understand, the library accepts the token instead of rejecting it. This violates the **MUST** requirement in the RFC. --- ## RFC Requirement RFC 7515 §4.1.11: > If any of the listed extension Header Par

thehackerwire@mastodon.social at 2026-04-06T17:21:15.000Z ##

🟠 CVE-2026-35042 - High (7.5)

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T17:18:45.000Z ##

🟠 CVE-2026-35042 - High (7.5)

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, fast-jwt does not validate the crit (Critical) Header Parameter defined in RFC 7515 §4.1.11. When a JWS token contains a crit array listing extensions that fast-jwt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35039
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-04-06T23:41:46

2 posts

## Impact Setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause tokens to be mis-identified during the verification process leading to: - Valid tokens returning claims from different valid tokens - Users being mis-identified as other users based on the wrong token This could result in: - User imp

thehackerwire@mastodon.social at 2026-04-06T17:21:05.000Z ##

🔴 CVE-2026-35039 - Critical (9.1)

fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.1.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause token...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T17:18:35.000Z ##

🔴 CVE-2026-35039 - Critical (9.1)

fast-jwt provides fast JSON Web Token (JWT) implementation. From 0.0.1 to before 6.1.0, setting up a custom cacheKeyBuilder method which does not properly create unique keys for different tokens can lead to cache collisions. This could cause token...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35171
(9.8 CRITICAL)

EPSS: 0.30%

updated 2026-04-06T23:41:21

4 posts

### Impact This is a **critical Remote Code Execution (RCE)** vulnerability caused by unsafe use of `logging.config.dictConfig()` with user-controlled input. Kedro allows the logging configuration file path to be set via the `KEDRO_LOGGING_CONFIG` environment variable and loads it without validation. The logging configuration schema supports the special `()` key, which enables arbitrary callable

thehackerwire@mastodon.social at 2026-04-07T05:53:04.000Z ##

🔴 CVE-2026-35171 - Critical (9.8)

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:23:48.000Z ##

🔴 CVE-2026-35171 - Critical (9.8)

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:53:04.000Z ##

🔴 CVE-2026-35171 - Critical (9.8)

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:23:48.000Z ##

🔴 CVE-2026-35171 - Critical (9.8)

Kedro is a toolbox for production-ready data science. Prior to 1.3.0, Kedro allows the logging configuration file path to be set via the KEDRO_LOGGING_CONFIG environment variable and loads it without validation. The logging configuration schema su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35036
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-06T23:41:05

1 posts

### Summary Ech0 implements **link preview** (editor fetches a page title) through **`GET /api/website/title`**. That is **legitimate product behavior**, but the implementation is **unsafe**: the route is **unauthenticated**, accepts a **fully attacker-controlled URL**, performs a **server-side GET**, reads the **entire response body** into memory (`io.ReadAll`). There is **no** host allowlist, *

thehackerwire@mastodon.social at 2026-04-06T17:18:47.000Z ##

🟠 CVE-2026-35036 - High (7.5)

Ech0 is an open-source, self-hosted publishing platform for personal idea sharing. Prior to 4.2.8, Ech0 implements link preview (editor fetches a page title) through GET /api/website/title. That is legitimate product behavior, but the implementati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34841
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-04-06T23:41:04

1 posts

### **Impact** This is a **supply chain attack** involving compromised versions of the `axios` npm package, which introduced a hidden dependency deploying a cross-platform Remote Access Trojan (RAT). Users of **@usebruno/cli** who ran `npm install` between **00:21 UTC and ~03:30 UTC on March 31, 2026** may have been impacted. Potential impact includes: * Execution of a malicious `postinstall`

thehackerwire@mastodon.social at 2026-04-06T17:22:40.000Z ##

🔴 CVE-2026-34841 - Critical (9.8)

Bruno is an open source IDE for exploring and testing APIs. Prior to 3.2.1, Bruno was affected by a supply chain attack involving compromised versions of the axios npm package, which introduced a hidden dependency deploying a cross-platform Remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33579(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-04-06T23:39:45

2 posts

## Summary The `/pair approve` command path called device approval without forwarding caller scopes into the core approval check. ## Impact A caller that held pairing privileges but not admin privileges could approve a pending device request asking for broader scopes, including admin access. ## Affected Component `extensions/device-pair/index.ts, src/infra/device-pairing.ts` ## Fixed Version

1 repos

https://github.com/atalovesyou/openclaw-security-checker

cwebber@social.coop at 2026-04-04T15:49:02.000Z ##

OpenClaw also got a terrifying privilege escalation vulnerability nvd.nist.gov/vuln/detail/CVE-2

Meanwhile the OpenClaw founder is claiming shush, it's no big deal, probably most of these aren't really exploitable! (There's good business interest reasons to argue that, since OpenClaw's founders got acquired by OpenAI) news.ycombinator.com/item?id=4

Okay. I know I have more than a few security researchers following me. There's a public list of literally hundreds of thousands of publicly accessible OpenClaw instances right here: openclaw.allegro.earth/

Anyone try taking a sampling of them and testing how vulnerable against recent escalation CVEs they are? Could be a rather juicy writeup!

##

hnbest@mastodon.social at 2026-04-04T07:00:02.000Z ##

OpenClaw privilege escalation vulnerability
nvd.nist.gov/vuln/detail/CVE-2
Discussion: news.ycombinator.com/item?id=4

##

CVE-2026-34976
(10.0 CRITICAL)

EPSS: 0.03%

updated 2026-04-06T23:26:04

3 posts

The `restoreTenant` admin mutation is missing from the authorization middleware config (`admin.go:499-522`), making it completely unauthenticated. Unlike the similar `restore` mutation which requires Guardian-of-Galaxy authentication, `restoreTenant` executes with zero middleware. This mutation accepts attacker-controlled backup source URLs (including `file://` for local filesystem access), S3/Mi

beyondmachines1 at 2026-04-07T08:01:09.704Z ##

Critical Authentication Bypass in Dgraph Database Allows Remote Takeover

Dgraph disclosed a critical authentication bypass vulnerability (CVE-2026-34976) in its administrative API that allows unauthenticated attackers to overwrite databases and read sensitive server files.

**If you are using Dgraph, this is urgent. Immediately make sure that public access to Dgraph's administration port 8080 is blocked, and add restoreTenant to adminMutationMWConfig: "restoreTenant": gogMutMWs.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-04-07T08:01:09.000Z ##

Critical Authentication Bypass in Dgraph Database Allows Remote Takeover

Dgraph disclosed a critical authentication bypass vulnerability (CVE-2026-34976) in its administrative API that allows unauthenticated attackers to overwrite databases and read sensitive server files.

**If you are using Dgraph, this is urgent. Immediately make sure that public access to Dgraph's administration port 8080 is blocked, and add restoreTenant to adminMutationMWConfig: "restoreTenant": gogMutMWs.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-04-06T17:18:57.000Z ##

🔴 CVE-2026-34976 - Critical (10)

Dgraph is an open source distributed GraphQL database. Prior to 25.3.1, the restoreTenant admin mutation is missing from the authorization middleware config (admin.go), making it completely unauthenticated. Unlike the similar restore mutation whic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34950
(9.1 CRITICAL)

EPSS: 0.02%

updated 2026-04-06T23:25:59

2 posts

### Summary The fix for GHSA-c2ff-88x2-x9pg (CVE-2023-48223) is incomplete. The publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT algorithm confusion attack that the CVE patched. ### Details The fix for CVE-2023-48223 (https://github.com/nearform/fast-jwt/commit/15a6e92, v3.3.2) change

thehackerwire@mastodon.social at 2026-04-06T16:22:18.000Z ##

🔴 CVE-2026-34950 - Critical (9.1)

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T16:20:01.000Z ##

🔴 CVE-2026-34950 - Critical (9.1)

fast-jwt provides fast JSON Web Token (JWT) implementation. In 6.1.0 and earlier, the publicKeyPemMatcher regex in fast-jwt/src/crypto.js uses a ^ anchor that is defeated by any leading whitespace in the key string, re-enabling the exact same JWT ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35172
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-06T23:14:52

2 posts

## summary: distribution can restore read access in `repo a` after an explicit delete when `storage.cache.blobdescriptor: redis` and `storage.delete.enabled: true` are both enabled. the delete path clears the shared digest descriptor but leaves stale repo-scoped membership behind, so a later `Stat` or `Get` from `repo b` repopulates the shared descriptor and makes the deleted blob readable from `r

thehackerwire@mastodon.social at 2026-04-07T05:20:18.000Z ##

🟠 CVE-2026-35172 - High (7.5)

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, distribution can restore read access in repo a after an explicit delete when storage.cache.blobdescriptor: redis and storage.delete.enabled: true are bo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:20:18.000Z ##

🟠 CVE-2026-35172 - High (7.5)

Distribution is a toolkit to pack, ship, store, and deliver container content. Prior to 3.1.0, distribution can restore read access in repo a after an explicit delete when storage.cache.blobdescriptor: redis and storage.delete.enabled: true are bo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34938
(10.0 CRITICAL)

EPSS: 0.10%

updated 2026-04-06T22:54:13

1 posts

### Summary `execute_code()` in `praisonai-agents` runs attacker-controlled Python inside a three-layer sandbox that can be fully bypassed by passing a `str` subclass with an overridden `startswith()` method to the `_safe_getattr` wrapper, achieving arbitrary OS command execution on the host. ### Details `python_tools.py:20` (source) -> `python_tools.py:22` (guard bypass) -> `python_tools.py:16

offseq@infosec.exchange at 2026-04-04T04:30:26.000Z ##

🚨 CRITICAL: CVE-2026-34938 in PraisonAI <1.5.90 lets attackers bypass sandbox protections and achieve arbitrary OS command execution. Immediate upgrade to v1.5.90+ required. Full system compromise possible. radar.offseq.com/threat/cve-20 #OffSeq #CVE202634938 #infosec #PraisonAI

##

CVE-2026-34934
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-04-06T22:53:55

1 posts

## Summary The `get_all_user_threads` function constructs raw SQL queries using f-strings with unescaped thread IDs fetched from the database. An attacker stores a malicious thread ID via `update_thread`. When the application loads the thread list, the injected payload executes and grants full database access. --- ## Details **File Path:** `src/praisonai/praisonai/ui/sql_alchemy.py` **Flow:

offseq@infosec.exchange at 2026-04-04T06:00:26.000Z ##

🚨 CVE-2026-34934: PraisonAI <4.5.90 affected by CRITICAL SQL injection (CVSS 9.8). Unauthenticated attackers can gain full DB access via unsanitized thread IDs. Upgrade to 4.5.90+ ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #SQLInjection #PraisonAI

##

CVE-2025-54328
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-04-06T21:31:41

3 posts

An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-based Buffer Overflow occurs while parsing SMS RP-DATA messages.

Matchbook3469@mastodon.social at 2026-04-07T07:57:15.000Z ##

🔴 New security advisory:

CVE-2025-54328 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

thehackerwire@mastodon.social at 2026-04-07T05:39:01.000Z ##

🔴 CVE-2025-54328 - Critical (10)

An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:39:01.000Z ##

🔴 CVE-2025-54328 - Critical (10)

An issue was discovered in SMS in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 9110, W920, W930, W1000, Modem 5123, Modem 5300, and Modem 5400. A Stack-ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57834
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-06T21:31:41

2 posts

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400, and Modem 5410). The absence of proper input validation leads to a Denial of Service.

thehackerwire@mastodon.social at 2026-04-07T05:39:10.000Z ##

🟠 CVE-2025-57834 - High (7.5)

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400, and Modem 5410...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:39:10.000Z ##

🟠 CVE-2025-57834 - High (7.5)

An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem (Exynos 980, 850, 990, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 1580, 2500, 1680, 9110, W920, W930, W1000, Modem 5123, Modem 5300, Modem 5400, and Modem 5410...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35020
(8.4 HIGH)

EPSS: 0.06%

updated 2026-04-06T21:31:41

2 posts

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL environment variable. Attackers can inject shell metacharacters into the TERMINAL variable which are interpreted by /bin/sh when the command lookup helper cons

thehackerwire@mastodon.social at 2026-04-07T05:20:27.000Z ##

🟠 CVE-2026-35020 - High (8.4)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL enviro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:20:27.000Z ##

🟠 CVE-2026-35020 - High (8.4)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the command lookup helper and deep-link terminal launcher that allows local attackers to execute arbitrary commands by manipulating the TERMINAL enviro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35021
(7.8 HIGH)

EPSS: 0.03%

updated 2026-04-06T21:31:41

2 posts

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell metacharacters such as $() or backtick expressions into file paths that are interpolated into shell commands executed via execSync. Although the file path

thehackerwire@mastodon.social at 2026-04-07T05:00:09.000Z ##

🟠 CVE-2026-35021 - High (7.8)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:00:09.000Z ##

🟠 CVE-2026-35021 - High (7.8)

Anthropic Claude Code CLI and Claude Agent SDK contain an OS command injection vulnerability in the prompt editor invocation utility that allows attackers to execute arbitrary commands by crafting malicious file paths. Attackers can inject shell m...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21373
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:15

1 posts

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

thehackerwire@mastodon.social at 2026-04-06T17:07:04.000Z ##

🟠 CVE-2026-21373 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21367
(7.7 HIGH)

EPSS: 0.04%

updated 2026-04-06T18:33:15

1 posts

Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans.

thehackerwire@mastodon.social at 2026-04-06T16:59:50.000Z ##

🟠 CVE-2026-21367 - High (7.6)

Transient DOS when processing nonstandard FILS Discovery Frames with out-of-range action sizes during initial scans.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21382
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:15

2 posts

Memory Corruption when handling power management requests with improperly sized input/output buffers.

thehackerwire@mastodon.social at 2026-04-06T16:26:12.000Z ##

🟠 CVE-2026-21382 - High (7.8)

Memory Corruption when handling power management requests with improperly sized input/output buffers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T16:23:56.000Z ##

🟠 CVE-2026-21382 - High (7.8)

Memory Corruption when handling power management requests with improperly sized input/output buffers.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21378
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:15

1 posts

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

thehackerwire@mastodon.social at 2026-04-06T16:24:16.000Z ##

🟠 CVE-2026-21378 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing in a camera sensor driver.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21375
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:15

1 posts

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

thehackerwire@mastodon.social at 2026-04-06T16:24:06.000Z ##

🟠 CVE-2026-21375 - High (7.8)

Memory Corruption when accessing an output buffer without validating its size during IOCTL processing.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21381
(7.7 HIGH)

EPSS: 0.04%

updated 2026-04-06T18:33:15

1 posts

Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.

thehackerwire@mastodon.social at 2026-04-06T16:23:15.000Z ##

🟠 CVE-2026-21381 - High (7.6)

Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21374
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:07

2 posts

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

thehackerwire@mastodon.social at 2026-04-06T16:26:22.000Z ##

🟠 CVE-2026-21374 - High (7.8)

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T16:24:06.000Z ##

🟠 CVE-2026-21374 - High (7.8)

Memory Corruption when processing auxiliary sensor input/output control commands with insufficient buffer size validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47392
(8.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:06

1 posts

Memory corruption when decoding corrupted satellite data files with invalid signature offsets.

thehackerwire@mastodon.social at 2026-04-06T17:07:14.000Z ##

🟠 CVE-2025-47392 - High (8.8)

Memory corruption when decoding corrupted satellite data files with invalid signature offsets.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-21371
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:06

1 posts

Memory Corruption when retrieving output buffer with insufficient size validation.

thehackerwire@mastodon.social at 2026-04-06T17:00:00.000Z ##

🟠 CVE-2026-21371 - High (7.8)

Memory Corruption when retrieving output buffer with insufficient size validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-47391
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:05

1 posts

Memory corruption while processing a frame request from user.

CVE-2025-47389
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-06T18:33:05

1 posts

Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.

thehackerwire@mastodon.social at 2026-04-06T17:07:23.000Z ##

🟠 CVE-2025-47389 - High (7.8)

Memory corruption when buffer copy operation fails due to integer overflow during attestation report generation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35616
(9.8 CRITICAL)

EPSS: 5.95%

updated 2026-04-06T18:12:57.863000

29 posts

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

5 repos

https://github.com/z3r0h3ro/CVE-2026-35616-poc

https://github.com/0xBlackash/CVE-2026-35616

https://github.com/fevar54/forticlient_ems_cve_2026_35616_poc.py

https://github.com/BishopFox/CVE-2026-35616-check

https://github.com/fevar54/CVE-2026-35616-detector.py

threatcodex at 2026-04-07T13:30:17.343Z ##

CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS

arcticwolf.com/resources/blog/

##

youranonnewsirc@nerdculture.de at 2026-04-07T11:43:04.000Z ##

Geopolitical tensions rise as Trump issues a Strait of Hormuz ultimatum amidst Middle East oil disruptions (Apr 7). In cybersecurity, North Korea's UNC4736 is linked to a $285M crypto heist (Apr 6), and a critical Fortinet zero-day (CVE-2026-35616) is under active exploitation (Apr 6-7). Technology advances with Fortrea launching AI-enhanced clinical trial solutions (Apr 7).

#AnonNews_irc #Cybersecurity #News

##

jbhall56 at 2026-04-07T11:09:02.920Z ##

The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild. darkreading.com/vulnerabilitie

##

cyberveille@mastobot.ping.moi at 2026-04-07T11:00:20.000Z ##

📢 CVE-2026-35616 : faille critique FortiClient EMS exploitée activement en zero-day
📝 ## 🗓️ Contexte

Source : BleepingComputer — publié le 5 avril 2026.
📖 cyberveille : cyberveille.ch/posts/2026-04-0
🌐 source : bleepingcomputer.com/news/secu
#CVE_2026_21643 #CVE_2026_35616 #Cyberveille

##

benzogaga33@mamot.fr at 2026-04-07T09:40:05.000Z ##

CVE-2026-35616 : déjà exploitée, cette faille Fortinet a été patchée en urgence ! it-connect.fr/cve-2026-35616-d #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

patrickcmiller at 2026-04-07T06:42:00.488Z ##

Fortinet customers confront actively exploited zero-day, with a full patch still pending cyberscoop.com/fortinet-fortic

##

teezeh@ieji.de at 2026-04-07T05:53:55.000Z ##

"Fortinet on April 4 released a hotfix for a critical 9.8 bug in FortiClient EMS 7.4.5 and 7.4.6, saying that it had observed exploitation in the wild.

The API access bypass flaw – tracked as CVE-2026-35616 – was first reported to Fortinet by DefusedCyber, which posted on X about the bug early Saturday morning."

scworld.com/news/fortinet-issu

##

tierrasapiens@mastodon.social at 2026-04-07T04:33:08.000Z ##

🖲️ #Cybersecurity #Ciberseguridad #Ciberseguranca #Security #Seguridad #Seguranca #News #Noticia #Noticias #Tecnologia #Technology
⚫ Fortinet Issues Emergency Patch for FortiClient Zero-Day
🔗 darkreading.com/vulnerabilitie

The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild.

##

youranonnewsirc@nerdculture.de at 2026-04-07T03:43:06.000Z ##

Geopolitical tensions are escalating in the Middle East, impacting global oil markets. A critical zero-day vulnerability in FortiClient EMS (CVE-2026-35616) is under active exploitation, with a hotfix released. DPRK-linked hackers are leveraging GitHub for command-and-control in South Korea-targeted attacks. AI continues to influence tech job reductions while also expanding the cyberattack surface. Japanese companies are forming a new organization to bolster cybersecurity cooperation.

#Cybersecurity #Geopolitics #TechNews

##

secdb at 2026-04-06T18:00:12.945Z ##

🚨 [CISA-2026:0406] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-35616 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet FortiClient EMS Improper Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: Please adhere to Fortinet&#39;s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

##

threatcodex@infosec.exchange at 2026-04-07T13:30:17.000Z ##

CVE-2026-35616: Fortinet Releases Hotfix for Critical Exploited Vulnerability in FortiClient EMS
#CVE_2026_35616
arcticwolf.com/resources/blog/

##

youranonnewsirc@nerdculture.de at 2026-04-07T11:43:04.000Z ##

Geopolitical tensions rise as Trump issues a Strait of Hormuz ultimatum amidst Middle East oil disruptions (Apr 7). In cybersecurity, North Korea's UNC4736 is linked to a $285M crypto heist (Apr 6), and a critical Fortinet zero-day (CVE-2026-35616) is under active exploitation (Apr 6-7). Technology advances with Fortrea launching AI-enhanced clinical trial solutions (Apr 7).

#AnonNews_irc #Cybersecurity #News

##

jbhall56@infosec.exchange at 2026-04-07T11:09:02.000Z ##

The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild. darkreading.com/vulnerabilitie

##

benzogaga33@mamot.fr at 2026-04-07T09:40:05.000Z ##

CVE-2026-35616 : déjà exploitée, cette faille Fortinet a été patchée en urgence ! it-connect.fr/cve-2026-35616-d #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet

##

patrickcmiller@infosec.exchange at 2026-04-07T06:42:00.000Z ##

Fortinet customers confront actively exploited zero-day, with a full patch still pending cyberscoop.com/fortinet-fortic

##

teezeh@ieji.de at 2026-04-07T05:53:55.000Z ##

"Fortinet on April 4 released a hotfix for a critical 9.8 bug in FortiClient EMS 7.4.5 and 7.4.6, saying that it had observed exploitation in the wild.

The API access bypass flaw – tracked as CVE-2026-35616 – was first reported to Fortinet by DefusedCyber, which posted on X about the bug early Saturday morning."

scworld.com/news/fortinet-issu

##

youranonnewsirc@nerdculture.de at 2026-04-07T03:43:06.000Z ##

Geopolitical tensions are escalating in the Middle East, impacting global oil markets. A critical zero-day vulnerability in FortiClient EMS (CVE-2026-35616) is under active exploitation, with a hotfix released. DPRK-linked hackers are leveraging GitHub for command-and-control in South Korea-targeted attacks. AI continues to influence tech job reductions while also expanding the cyberattack surface. Japanese companies are forming a new organization to bolster cybersecurity cooperation.

#Cybersecurity #Geopolitics #TechNews

##

secdb@infosec.exchange at 2026-04-06T18:00:12.000Z ##

🚨 [CISA-2026:0406] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-35616 (secdb.nttzen.cloud/cve/detail/)
- Name: Fortinet FortiClient EMS Improper Access Control Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Fortinet
- Product: FortiClient EMS
- Notes: Please adhere to Fortinet&#39;s guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260406 #cisa20260406 #cve_2026_35616 #cve202635616

##

thenewoil@mastodon.thenewoil.org at 2026-04-06T16:30:02.000Z ##

New #FortiClient #EMS flaw exploited in attacks, emergency patch released

bleepingcomputer.com/news/secu

#cybersecurity #Fortinet

##

AAKL@infosec.exchange at 2026-04-06T16:06:44.000Z ##

The latest Fortinet vulnerability has been added to the KEV catalogue.

CVE-2026-35616: Fortinet FortiClient EMS Improper Access Control Vulnerabilityhttps://www.cve.org/CVERecord?id=CVE-2026-35616 #CISA #Fortinet #infosec #vulnerability

@cR0w

##

cisakevtracker@mastodon.social at 2026-04-06T16:00:50.000Z ##

CVE ID: CVE-2026-35616
Vendor: Fortinet
Product: FortiClient EMS
Date Added: 2026-04-06
Notes: Please adhere to Fortinet's guidelines to assess exposure and mitigate risks. Check for signs of potential compromise on all internet accessible Fortinet products affected by this vulnerability. Apply any final mitigations provided by the vendor as soon as they become available. For more information please see: fortiguard.fortinet.com/psirt/ ; nvd.nist.gov/vuln/detail/CVE-2
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

youranonnewsirc@nerdculture.de at 2026-04-06T03:42:59.000Z ##

US President Trump issued an ultimatum to Iran: reopen the Strait of Hormuz by Tuesday or face strikes, intensifying Middle East tensions and driving up oil prices. NVIDIA unveiled new GPU compression technology, while a Chinese chipmaker claims a 300% performance lead over Nvidia's flagship GPU. In cybersecurity, Fortinet patched an actively exploited critical flaw (CVE-2026-35616) in FortiClient EMS. April has seen a surge in ransomware, including the Marquis fintech attack exposing 672,000 records.

#Cybersecurity #Geopolitics #TechNews

##

youranonnewsirc@nerdculture.de at 2026-04-05T19:42:59.000Z ##

US-Iran geopolitical tensions escalate with downed aircraft and President Trump's threats. (Apr 5, 2026) On technology, Microsoft announced a ¥1.6 trillion investment in Japan for AI infrastructure and cybersecurity. (Apr 4, 2026) In cybersecurity, a critical Fortinet EMS zero-day (CVE-2026-35616) is actively exploited, and the EU Commission confirmed a 300GB data breach from a Trivy supply chain attack. (Apr 4, 2026)

#Cybersecurity #Geopolitics #TechNews

##

beyondmachines1@infosec.exchange at 2026-04-05T08:01:10.000Z ##

Fortinet Issues Emergency Hotfix for Actively Exploited FortiClient EMS Zero-Day

Fortinet has released emergency hotfix for an actively exploited critical zero-day vulnerability (CVE-2026-35616) in FortiClient EMS that allows unauthenticated attackers to bypass API security and run arbitrary commands.

**If you use FortiClient EMS versions 7.4.5 or 7.4.6, apply Fortinet's emergency hotfix ASAP. It's being actively exploited andcan give attackers full control of your endpoint management server. While you're at it, check your EMS API logs for any signs of unauthorized access or unusual command execution that might indicate you've already been compromised.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

youranonnewsirc@nerdculture.de at 2026-04-05T03:43:01.000Z ##

Recent global developments on April 4, 2026:

Geopolitical: Trump challenges NATO's future over "Operation Epic Fury" participation; US-Iran conflict ongoing, Planet Labs withholds satellite images.
Technology: AI breakthroughs include Google DeepMind's Alpha Green for code optimization & OpenAI's GPT-6 on smartphones. Green compute initiatives accelerate.
Cybersecurity: Fortinet zero-day (CVE-2026-35616) exploited; EC suffers Trivy supply chain breach. New polymorphic malware & AI-generated bot threats emerge.

#AnonNews_irc #Cybersecurity #News

##

hackerworkspace@infosec.exchange at 2026-04-04T22:28:25.000Z ##

Fortinet CVE-2026-35616 Actively Exploited - Decipher

decipher.sc/2026/04/04/fortine

Read on HackerWorkspace: hackerworkspace.com/article/fo

#cybersecurity #vulnerability #exploit

##

youranonnewsirc@nerdculture.de at 2026-04-04T19:43:05.000Z ##

Geopolitical tensions escalate as the Iran War continues, leading to the functional closure of the Strait of Hormuz, severely impacting global energy markets. In cybersecurity, the European Commission confirmed a 300GB data breach on April 4, 2026, stemming from a Trivy supply chain attack. Additionally, critical RCE flaws in Progress ShareFile were reported on April 3, 2026, and an actively exploited FortiClient EMS zero-day (CVE-2026-35616) necessitated urgent hotfixes on April 4, 2026.

#AnonNews_irc #Cybersecurity #News

##

0x3e4@cyberplace.social at 2026-04-04T08:22:25.000Z ##

FortiYikes at it again..

🔐 CVE-2026-35616

📊 CVSS: 9.1 · Critical
📅 04/04/2026, 05:31 AM
🛡️ CWE: CWE-284
📦 Affected: Fortinet FortiClientEMS (>= 7.4.5, <= 7.4.6)
📚 fortiguard.fortinet.com/psirt/ nvd.nist.gov/vuln/detail/CVE-2

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

##

rxerium@infosec.exchange at 2026-04-04T07:31:20.000Z ##

🚨 Forticlient EMS Zero Day disclosed minutes ago actively being exploited in the wild as being report by @DefusedCyber & @fortinet

I've created a vulnerability detection script to check for vulnerable instances:
github.com/rxerium/rxerium-tem

Fortinet recommends that you install hotfixes for EMS 7.4.5 / 7.4.6 as per their advisory:
fortiguard.com/psirt/FG-IR-26-

##

CVE-2026-34752
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-06T17:32:42

1 posts

### Summary Sending an email with `__proto__:` as a header name crashes the Haraka worker process. ### Details The header parser at `node_modules/haraka-email-message/lib/header.js:215-218` stores headers in a plain `{}` object: ```javascript _add_header(key, value, method) { this.headers[key] ??= [] // line 216 this.headers[key][method](value) // line 217 } ``` When `key`

thehackerwire@mastodon.social at 2026-04-04T05:00:46.000Z ##

🟠 CVE-2026-34752 - High (7.5)

Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with __proto__: as a header name crashes the Haraka worker process. This issue has been patched in version 3.1.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28805
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-06T17:17:51

1 posts

## Description Multiple AJAX select handlers in OpenSTAManager <= 2.10.1 are vulnerable to Time-Based Blind SQL Injection through the `options[stato]` GET parameter. The user-supplied value is read from `$superselect['stato']` and concatenated directly into SQL WHERE clauses as a bare expression, without any sanitization, parameterization, or allowlist validation. An authenticated attacker can i

thehackerwire@mastodon.social at 2026-04-05T03:00:55.000Z ##

🟠 CVE-2026-28805 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5176
(7.3 HIGH)

EPSS: 1.97%

updated 2026-04-06T15:35:31.710000

1 posts

A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. Affected is the function setSyslogCfg of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument provided results in command injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks.

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-30078
(7.5 HIGH)

EPSS: 0.06%

updated 2026-04-06T15:31:34

2 posts

OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome.

thehackerwire@mastodon.social at 2026-04-06T15:42:40.000Z ##

🟠 CVE-2026-30078 - High (7.5)

OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T15:42:01.000Z ##

🟠 CVE-2026-30078 - High (7.5)

OpenAirInterface V2.2.0 AMF crashes when it receives an NGAP message with invalid procedure code or invalid PDU-type. For example when the message specification requires InitiatingMessage but sent with successfulOutcome.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34885
(8.5 HIGH)

EPSS: 0.03%

updated 2026-04-06T15:31:34

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection.This issue affects Media LIbrary Assistant: from n/a through 3.34.

thehackerwire@mastodon.social at 2026-04-06T15:34:55.000Z ##

🟠 CVE-2026-34885 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant allows SQL Injection.This issue affects Media LIbrary Assistant: from n/a through 3.34.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25773
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-06T15:08:34

1 posts

** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, which is stored in the database and later executed unsanitized when the category reorder API processes the stored value. This Second-Order SQL Injection (Tim

thehackerwire@mastodon.social at 2026-04-04T04:00:19.000Z ##

🟠 CVE-2026-25773 - High (8.1)

** UNSUPPORTED WHEN ASSIGNED ** Focalboard version 8.0 fails to sanitize category IDs before incorporating them into dynamic SQL statements when reordering categories. An attacker can inject a malicious SQL payload into the category id field, whic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5628
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-06T06:30:35

2 posts

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted

offseq@infosec.exchange at 2026-04-06T09:00:29.000Z ##

📢 CVE-2026-5628: HIGH severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remotely exploitable — no patch yet. Restrict mgmt access & disable remote mgmt until fixed. Info: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoT #Belkin

##

thehackerwire@mastodon.social at 2026-04-06T06:22:06.000Z ##

🟠 CVE-2026-5628 - High (8.8)

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5614
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-06T06:30:29

2 posts

A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not res

offseq@infosec.exchange at 2026-04-06T04:30:28.000Z ##

🔒 HIGH-severity stack buffer overflow in Belkin F9K1015 (v1.00.10) — CVE-2026-5614. Public exploit, no patch, vendor silent. Disable remote access, restrict device exposure. Stay vigilant! radar.offseq.com/threat/cve-20 #OffSeq #Infosec #Vuln #IoTSecurity

##

thehackerwire@mastodon.social at 2026-04-06T04:17:33.000Z ##

🟠 CVE-2026-5614 - High (8.8)

A security flaw has been discovered in Belkin F9K1015 1.00.10. Impacted is the function formSetPassword of the file /goform/formSetPassword. The manipulation of the argument webpage results in stack-based buffer overflow. The attack may be launche...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5612
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-06T03:30:30

2 posts

A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability affects the function formWlEncrypt of the file /goform/formWlEncrypt. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack can be launched remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not

offseq@infosec.exchange at 2026-04-06T10:30:28.000Z ##

⚠️ HIGH severity: Stack buffer overflow in Belkin F9K1015 v1.00.10 (/goform/formWlEncrypt, CVE-2026-5612). Remote code exec/DoS possible. No vendor patch. Restrict remote access & monitor advisories. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #RouterSecurity #CVE20265612

##

thehackerwire@mastodon.social at 2026-04-06T04:00:39.000Z ##

🟠 CVE-2026-5612 - High (8.8)

A vulnerability was determined in Belkin F9K1015 1.00.10. This vulnerability affects the function formWlEncrypt of the file /goform/formWlEncrypt. Executing a manipulation of the argument webpage can lead to stack-based buffer overflow. The attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5609
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-06T03:30:25

1 posts

A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-06T02:18:03.000Z ##

🟠 CVE-2026-5609 - High (8.8)

A flaw has been found in Tenda i12 1.0.0.11(3862). Affected by this vulnerability is the function formwrlSSIDset of the file /goform/wifiSSIDset of the component Parameter Handler. This manipulation of the argument index/wl_radio causes stack-base...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5613
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-06T03:30:20

2 posts

A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

offseq@infosec.exchange at 2026-04-06T06:00:27.000Z ##

🔔 CVE-2026-5613: HIGH severity stack-based buffer overflow in Belkin F9K1015 v1.00.10. Remote code execution or DoS possible. No patch; exploit public. Restrict mgmt interface, disable remote mgmt. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #IoT #Vuln

##

thehackerwire@mastodon.social at 2026-04-06T04:00:50.000Z ##

🟠 CVE-2026-5613 - High (8.8)

A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotel...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5610
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-06T03:30:20

2 posts

A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond

offseq@infosec.exchange at 2026-04-06T03:00:26.000Z ##

⚠️ HIGH severity: Belkin F9K1015 (v1.00.10) stack buffer overflow (CVE-2026-5610) in /goform/formWISP5G. Remotely exploitable, no patch yet. Restrict device exposure & monitor for anomalies. More at radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Security

##

thehackerwire@mastodon.social at 2026-04-06T02:18:13.000Z ##

🟠 CVE-2026-5610 - High (8.8)

A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5605
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-06T00:30:31

2 posts

A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remotely. The exploit has been made available to the public and could be used for attacks.

thehackerwire@mastodon.social at 2026-04-06T00:37:25.000Z ##

🟠 CVE-2026-5605 - High (8.8)

A weakness has been identified in Tenda CH22 1.0.0.1. This affects the function formWrlExtraSet of the file /goform/WrlExtraSet. Executing a manipulation of the argument GO can lead to stack-based buffer overflow. The attack can be executed remote...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-06T00:00:36.000Z ##

🚨 HIGH severity: CVE-2026-5605 in Tenda CH22 v1.0.0.1 — stack-based buffer overflow in /goform/WrlExtraSet. No patch yet. Restrict remote access & monitor for threats. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity

##

CVE-2026-5604
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-06T00:30:31

1 posts

A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element is the function formCertLocalPrecreate of the file /goform/CertLocalPrecreate of the component Parameter Handler. Performing a manipulation of the argument standard results in stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for atta

thehackerwire@mastodon.social at 2026-04-05T23:16:37.000Z ##

🟠 CVE-2026-5604 - High (8.8)

A security flaw has been discovered in Tenda CH22 1.0.0.1. The impacted element is the function formCertLocalPrecreate of the file /goform/CertLocalPrecreate of the component Parameter Handler. Performing a manipulation of the argument standard re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4272
(8.1 HIGH)

EPSS: 0.11%

updated 2026-04-06T00:30:31

1 posts

Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085BAA, from A1/B1 Base(IMX25) before BK000763BAA_BK000765BAA_CU000101BAA. This vulnerability could allow a remote attacker within Bluetooth range of the s

thehackerwire@mastodon.social at 2026-04-05T22:16:48.000Z ##

🟠 CVE-2026-4272 - High (8.1)

Missing Authentication for Critical Function vulnerability in Honeywell Handheld Scanners allows Authentication Abuse.This issue affects Handheld Scanners: from C1 Base(Ingenic x1000) before GK000432BAA, from D1 Base(Ingenic x1600) before HE000085...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5567
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-05T15:32:03

1 posts

A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer overflow. The attack can be executed remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-04-05T14:00:22.000Z ##

🟠 CVE-2026-5567 - High (8.8)

A flaw has been found in Tenda M3 1.0.0.10. This vulnerability affects the function setAdvPolicyData of the file /goform/setAdvPolicyData of the component Destination Handler. Executing a manipulation of the argument policyType can lead to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5566
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-05T15:32:03

1 posts

A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

thehackerwire@mastodon.social at 2026-04-05T14:00:12.000Z ##

🟠 CVE-2026-5566 - High (8.8)

A vulnerability was detected in UTT HiPER 1250GW up to 3.2.7-210907-180535. This affects the function strcpy of the file /goform/formNatStaticMap. Performing a manipulation of the argument NatBind results in buffer overflow. Remote exploitation of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5550
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-05T09:30:29

2 posts

A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endpoints might be affected.

offseq@infosec.exchange at 2026-04-05T09:00:28.000Z ##

🔎 HIGH severity: Tenda AC10 (v16.03.10.10_multi_TDE01) has a stack buffer overflow (CVE-2026-5550) in /bin/httpd. Remote code execution possible. No patch yet — restrict remote mgmt & monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #infosec #CVE2026_5550

##

thehackerwire@mastodon.social at 2026-04-05T08:17:43.000Z ##

🟠 CVE-2026-5550 - High (8.8)

A vulnerability was identified in Tenda AC10 16.03.10.10_multi_TDE01. This affects the function fromSysToolChangePwd of the file /bin/httpd. The manipulation leads to stack-based buffer overflow. The attack may be initiated remotely. Multiple endp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5544
(8.8 HIGH)

EPSS: 0.04%

updated 2026-04-05T06:32:08

2 posts

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

thehackerwire@mastodon.social at 2026-04-05T06:24:22.000Z ##

🟠 CVE-2026-5544 - High (8.8)

A security flaw has been discovered in UTT HiPER 1250GW up to 3.2.7-210907-180535. The impacted element is an unknown function of the file /goform/formRemoteControl. The manipulation of the argument Profile results in stack-based buffer overflow. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-04-05T06:00:26.000Z ##

🔎 CVE-2026-5544: HIGH severity stack overflow in UTT HiPER 1250GW (≤ v3.2.7-210907-180535). Remote, no auth needed. Public exploit code available — restrict network access & monitor vendor alerts. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CyberSecurity #UTT

##

CVE-2026-2936
(7.2 HIGH)

EPSS: 0.02%

updated 2026-04-04T12:31:04

1 posts

The Visitor Traffic Real Time Statistics plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'page_title' parameter in all versions up to, and including, 8.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever an admin user accesses the Traffic by T

offseq@infosec.exchange at 2026-04-05T01:30:26.000Z ##

⚠️ HIGH severity XSS (CVE-2026-2936) in Visitor Traffic Real Time Statistics WP plugin ≤8.4. Unauth attackers can inject persistent scripts via 'page_title', executed by admins. No patch yet — restrict access or disable plugin. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS

##

CVE-2026-5425
(7.2 HIGH)

EPSS: 0.06%

updated 2026-04-04T09:30:37

1 posts

The Widgets for Social Photo Feed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'feed_data' parameter keys in all versions up to, and including, 1.7.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

offseq@infosec.exchange at 2026-04-05T07:30:27.000Z ##

⚠️ HIGH severity: Stored XSS (CVE-2026-5425) in trustindex Widgets for Social Photo Feed (≤1.7.9) allows unauthenticated attackers to inject malicious scripts via 'feed_data'. No patch yet — disable plugin. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS #Vuln

##

CVE-2026-4896
(8.1 HIGH)

EPSS: 0.01%

updated 2026-04-04T09:30:31

1 posts

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions including `wcfm_modify_order_status`, `delete_wcfm_article`, `delete_wcfm_product`, and the article management controller due to missing validation on user-suppl

thehackerwire@mastodon.social at 2026-04-05T01:20:19.000Z ##

🟠 CVE-2026-4896 - High (8.1)

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions includ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4634
(7.5 HIGH)

EPSS: 0.07%

updated 2026-04-04T06:00:48

1 posts

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource consumption and prolonged processing times, ultimately resulting in a Denial of Service (DoS) for the Keycloak server.

thehackerwire@mastodon.social at 2026-04-05T03:01:05.000Z ##

🟠 CVE-2026-4634 - High (7.5)

A flaw was found in Keycloak. An unauthenticated attacker can exploit this vulnerability by sending a specially crafted POST request with an excessively long scope parameter to the OpenID Connect (OIDC) token endpoint. This leads to high resource ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4636
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-04T06:00:16

1 posts

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, even if the URL path specifies an attacker-owned resource. Consequently, the attacker gains unauthorized permissions to victim-owned resources, enabling th

thehackerwire@mastodon.social at 2026-04-05T03:01:15.000Z ##

🟠 CVE-2026-4636 - High (8.1)

A flaw was found in Keycloak. An authenticated user with the uma_protection role can bypass User-Managed Access (UMA) policy validation. This allows the attacker to include resource identifiers owned by other users in a policy creation request, ev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35470
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-03T21:57:08

4 posts

## Description Six `confronta_righe.php` files across different modules in OpenSTAManager <= 2.10.1 contain an SQL Injection vulnerability. The `righe` parameter received via `$_GET['righe']` is directly concatenated into an SQL query without any sanitization, parameterization or validation. An authenticated attacker can inject arbitrary SQL statements to extract sensitive data from the database

thehackerwire@mastodon.social at 2026-04-07T05:39:19.000Z ##

🟠 CVE-2026-35470 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:23:38.000Z ##

🟠 CVE-2026-35470 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:39:19.000Z ##

🟠 CVE-2026-35470 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:23:38.000Z ##

🟠 CVE-2026-35470 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25197
(9.1 CRITICAL)

EPSS: 0.03%

updated 2026-04-03T21:31:49

1 posts

A specific endpoint allows authenticated users to pivot to other user profiles by modifying the id number in the API call.

1 repos

https://github.com/MichaelAdamGroberman/CVE-2026-25197

offseq@infosec.exchange at 2026-04-04T10:30:27.000Z ##

🚨 CVE-2026-25197 (CRITICAL): Gardyn Cloud API lets authenticated users access other profiles by tweaking ID in API calls (CWE-639). No patch yet — restrict access & monitor for abuse. Details: radar.offseq.com/threat/cve-20 #OffSeq #APIsecurity #CVE202625197

##

CVE-2026-34742
(8.1 HIGH)

EPSS: 0.05%

updated 2026-04-03T19:48:25.627000

1 posts

The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPHandler or SSEHandler, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and se

thehackerwire@mastodon.social at 2026-04-04T05:00:36.000Z ##

🟠 CVE-2026-34742 - High (8.1)

The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-43202
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-03T18:31:17

1 posts

This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.

thehackerwire@mastodon.social at 2026-04-04T05:09:19.000Z ##

🟠 CVE-2025-43202 - High (8.8)

This issue was addressed with improved memory handling. This issue is fixed in iOS 18.6 and iPadOS 18.6, macOS Sequoia 15.6. Processing a file may lead to memory corruption.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34453
(7.5 HIGH)

EPSS: 3.47%

updated 2026-04-03T16:53:22.330000

1 posts

SiYuan is a personal knowledge management system. Prior to version 3.6.2, the publish service exposes bookmarked blocks from password-protected documents to unauthenticated visitors. In publish/read-only mode, /api/bookmark/getBookmark filters bookmark results by calling FilterBlocksByPublishAccess(nil, ...). Because the filter treats a nil context as authorized, it skips the publish password chec

Nuclei template

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-31933
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-03T16:10:52.680000

1 posts

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.

thehackerwire@mastodon.social at 2026-04-05T01:59:56.000Z ##

🟠 CVE-2026-31933 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, specially crafted traffic can cause Suricata to slow down, affecting performance in IDS mode. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31931
(7.5 HIGH)

EPSS: 0.05%

updated 2026-04-03T16:10:52.680000

1 posts

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.

thehackerwire@mastodon.social at 2026-04-04T05:09:37.000Z ##

🟠 CVE-2026-31931 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. From version 8.0.0 to before version 8.0.4, use of the "tls.alpn" rule keyword can cause Suricata to crash with a NULL dereference. This issue has been patched in version 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28815
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-03T16:10:23.730000

1 posts

A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto version 4.3.1.

thehackerwire@mastodon.social at 2026-04-04T04:00:39.000Z ##

🟠 CVE-2026-28815 - High (7.5)

A remote attacker can supply a short X-Wing HPKE encapsulated key and trigger an out-of-bounds read in the C decapsulation path, potentially causing a crash or memory disclosure depending on runtime protections. This issue is fixed in swift-crypto...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35467
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-03T15:30:31

1 posts

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

thehackerwire@mastodon.social at 2026-04-04T05:00:27.000Z ##

🟠 CVE-2026-35467 - High (7.5)

The stored API keys in temporary browser client is not marked as protected allowing for JavScript console or other errors to allow for extraction of the encryption credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3502
(7.8 HIGH)

EPSS: 1.48%

updated 2026-04-03T11:40:57.390000

1 posts

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

2 repos

https://github.com/fevar54/CVE-2026-3502-Scanner---TrueConf-Vulnerability-Detection-Tool

https://github.com/fevar54/CVE-2026-3502---TrueConf-Client-Update-Hijacking-PoC

cyberveille@mastobot.ping.moi at 2026-04-07T10:30:25.000Z ##

📢 Exploitation active de CVE-2026-3502 dans TrueConf par des acteurs chinois ciblant l'Asie du Sud-Est
📝 ## 🗓️ Contexte

Source : The Record Media, publié le 3 avril 2026.
📖 cyberveille : cyberveille.ch/posts/2026-04-0
🌐 source : therecord.media/trueconf-cyber
#CVE_2026_3502 #Chinese_state_sponsored_actors #Cyberveille

##

CVE-2026-4350
(8.1 HIGH)

EPSS: 0.10%

updated 2026-04-03T09:30:21

1 posts

The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without any sanitization, authorization check, or nonce verification. The unsanitized filename is concatenated with the storage directory path and passed to `unli

thehackerwire@mastodon.social at 2026-04-04T04:00:29.000Z ##

🟠 CVE-2026-4350 - High (8.1)

The Perfmatters plugin for WordPress is vulnerable to arbitrary file deletion via path traversal in all versions up to, and including, 2.5.9.1. This is due to the `PMCS::action_handler()` method processing the `$_GET['delete']` parameter without a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35168
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-03T03:47:38

1 posts

## Description The Aggiornamenti (Updates) module in OpenSTAManager <= 2.10.1 contains a database conflict resolution feature (`op=risolvi-conflitti-database`) that accepts a JSON array of SQL statements via POST and executes them directly against the database without any validation, allowlist, or sanitization. An authenticated attacker with access to the Aggiornamenti module can execute arbitra

thehackerwire@mastodon.social at 2026-04-04T05:09:28.000Z ##

🟠 CVE-2026-35168 - High (8.8)

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-databa...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-1668
(9.8 CRITICAL)

EPSS: 0.37%

updated 2026-04-02T15:32:40

2 posts

The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or informatio

1 repos

https://github.com/tangrs/cve-2026-1668-poc

CVE-2026-2701
(9.1 CRITICAL)

EPSS: 0.19%

updated 2026-04-02T15:31:41

2 posts

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

thehackerwire@mastodon.social at 2026-04-05T02:00:17.000Z ##

🔴 CVE-2026-2701 - Critical (9.1)

Authenticated user can upload a malicious file to the server and execute it, which leads to remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-04-04T08:01:27.000Z ##

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller

Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.

**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-2699
(9.8 CRITICAL)

EPSS: 0.41%

updated 2026-04-02T15:31:40

2 posts

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

Nuclei template

1 repos

https://github.com/watchtowrlabs/watchTowr-vs-Progress-ShareFile-CVE-2026-2699

thehackerwire@mastodon.social at 2026-04-05T02:00:07.000Z ##

🔴 CVE-2026-2699 - Critical (9.8)

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-04-04T08:01:27.000Z ##

Progress Software Patches Critical RCE Chain in ShareFile Storage Zones Controller

Progress Software patched two critical vulnerabilities (CVE-2026-2699 and CVE-2026-2701) in ShareFile Storage Zones Controller that allow unauthenticated attackers to bypass authentication and execute remote code.

**If you manage your own ShareFile storage zones, update to version 5.12.4 or move to version 6 to prevent full system takeover. File transfer tools are high-value targets for ransomware groups, so treat this patch as a top priority. If you can't patch, isolate the instances until they are patched. General isolation doesn't work since these systems are designed to be accessible from the public internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-5281
(8.8 HIGH)

EPSS: 3.28%

updated 2026-04-01T21:30:28

4 posts

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

2 repos

https://github.com/TheMalwareGuardian/CVE-2026-5281

https://github.com/umair-aziz025/CVE-2026-5281-Research-Toolkit

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

youranonnewsirc@nerdculture.de at 2026-04-04T11:43:10.000Z ##

Geopolitical: US-Israel/Iran conflict intensifies; F-15E reportedly downed. UN debates Strait of Hormuz access.
Technology: 6G networks raise significant AI-driven cybersecurity risks. Apple plans to open Siri to rival AI in iOS 27. NASA's Artemis II mission launched astronauts to the Moon.
Cybersecurity: Google Chrome zero-day (CVE-2026-5281) actively exploited. Odido Telecom suffered a breach exposing 6 million identities. Lapsus$ claimed a supply chain attack on LiteLLM. Texas hospital hit by ransomware, affecting 250,000 patients.
#AnonNews_irc #Cybersecurity #News

##

steelefortress@infosec.exchange at 2026-04-04T11:00:13.000Z ##

CISA just added CVE-2026-5281, a vulnerability in Google Dawn, to its Known Exploited Vulnerabilities catalog. Dawn is the WebGPU implementation used across Chromium-based browsers, which means this flaw has a wide attack surface touching Chrome, Edge, and other...

Read more: steelefortress.com/jycnya

Cybersecurity #CyberDefense #DataPrivacy

##

youranonnewsirc@nerdculture.de at 2026-04-04T03:43:04.000Z ##

Geopolitical tensions rise as Iran's Strait of Hormuz blockade severely disrupts shipping, causing global oil price surges. In cybersecurity, Google issued an emergency patch for a Chrome zero-day (CVE-2026-5281) actively exploited, alongside critical F5 BIG-IP and Citrix NetScaler vulnerabilities under exploitation. The tech sector saw OpenAI secure $122B in funding, with Oracle cutting jobs for AI infrastructure investments. Social media companies face new addiction lawsuits.

#Cybersecurity #Geopolitics #TechNews

##

CVE-2026-4747
(8.8 HIGH)

EPSS: 0.18%

updated 2026-04-01T15:23:23.797000

1 posts

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerabl

grahamperrin@bsd.cafe at 2026-04-05T17:56:39.000Z ##

CVE-2026-4747

Re what's quoted in the opening post at <forums.freebsd.org/threads/102>, please note that Nicholas Carlini has not yet made a public statement about findings.

(I should not treat notebookcheck.net as an authoritative source on this matter.)

#FreeBSD #security

##

CVE-2026-34156
(9.9 CRITICAL)

EPSS: 5.76%

updated 2026-04-01T14:24:02.583000

1 posts

NocoBase is an AI-powered no-code/low-code platform for building business applications and enterprise solutions. Prior to version 2.0.28, NocoBase's Workflow Script Node executes user-supplied JavaScript inside a Node.js vm sandbox with a custom require allowlist (controlled by WORKFLOW_SCRIPT_MODULES env var). However, the console object passed into the sandbox context exposes host-realm Writable

Nuclei template

2 repos

https://github.com/0xBlackash/CVE-2026-34156

https://github.com/franckboumendil/CVE-2026-34156

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4020
(7.5 HIGH)

EPSS: 6.02%

updated 2026-03-31T03:31:35

1 posts

The Gravity SMTP plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.1.4. This is due to a REST API endpoint registered at /wp-json/gravitysmtp/v1/tests/mock-data with a permission_callback that unconditionally returns true, allowing any unauthenticated visitor to access it. When the ?page=gravitysmtp-settings query parameter is appended, th

Nuclei template

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4257
(9.8 CRITICAL)

EPSS: 19.61%

updated 2026-03-31T00:31:19

1 posts

The Contact Form by Supsystic plugin for WordPress is vulnerable to Server-Side Template Injection (SSTI) leading to Remote Code Execution (RCE) in all versions up to, and including, 1.7.36. This is due to the plugin using the Twig `Twig_Loader_String` template engine without sandboxing, combined with the `cfsPreFill` prefill functionality that allows unauthenticated users to inject arbitrary Twig

Nuclei template

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5105
(6.3 MEDIUM)

EPSS: 2.16%

updated 2026-03-30T18:32:18

1 posts

A vulnerability was detected in Totolink A3300R 17.0.0cu.557_b20221024. The affected element is the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. Performing a manipulation of the argument pptpPassThru results in command injection. It is possible to initiate the attack remotely. The exploit is now public and may be used.

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5103
(6.3 MEDIUM)

EPSS: 2.16%

updated 2026-03-30T18:31:16

1 posts

A weakness has been identified in Totolink A3300R 17.0.0cu.557_b20221024. This issue affects the function setUPnPCfg of the file /cgi-bin/cstecgi.cgi. This manipulation of the argument enable causes command injection. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks.

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5104
(6.3 MEDIUM)

EPSS: 2.16%

updated 2026-03-30T18:31:16

1 posts

A security vulnerability has been detected in Totolink A3300R 17.0.0cu.557_b20221024. Impacted is the function setStaticRoute of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument ip leads to command injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-5102
(6.3 MEDIUM)

EPSS: 2.16%

updated 2026-03-30T00:31:08

1 posts

A security flaw has been discovered in Totolink A3300R 17.0.0cu.557_b20221024. This vulnerability affects the function setSmartQosCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument qos_up_bw results in command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

secdb@infosec.exchange at 2026-04-06T00:00:56.000Z ##

📈 CVE Published in last 7 days (2026-03-30 - 2026-04-06)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1282

Severity:
- Critical: 134
- High: 375
- Medium: 561
- Low: 63
- None: 149

Status:
- : 54
- Analyzed: 257
- Awaiting Analysis: 410
- Modified: 9
- Received: 265
- Rejected: 7
- Undergoing Analysis: 280

Top CNAs:
- GitHub, Inc.: 374
- VulDB: 165
- VulnCheck: 147
- MITRE: 109
- kernel.org: 91
- N/A: 54
- Wordfence: 43
- Chrome: 21
- IBM Corporation: 17
- Cisco Systems, Inc.: 16

Top Affected Products:
- UNKNOWN: 933
- Endian Firewall: 30
- Openclaw: 24
- Google Chrome: 21
- Seppmail Secure Email Gateway: 14
- Apple Macos: 13
- Wwbn Avideo: 13
- Ahsanriaz26gmailcom Sales And Inventory System: 11
- Xenforo: 10
- Parseplatform Parse-server: 9

Top EPSS Score:
- CVE-2026-4257 - 15.83 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34156 - 5.19 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-4020 - 4.49 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5281 - 3.03 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5176 - 2.96 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34453 - 2.67 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5102 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5103 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5104 - 1.63 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-5105 - 1.63 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-33744
(7.8 HIGH)

EPSS: 0.01%

updated 2026-03-27T21:37:34

2 posts

## Summary The `docker.system_packages` field in `bentofile.yaml` accepts arbitrary strings that are interpolated directly into Dockerfile `RUN` commands without sanitization. Since `system_packages` is semantically a list of OS package names (data), users do not expect values to be interpreted as shell commands. A malicious `bentofile.yaml` achieves arbitrary command execution during `bentoml co

thehackerwire@mastodon.social at 2026-04-07T05:53:23.000Z ##

🟠 CVE-2026-35043 - High (7.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:53:23.000Z ##

🟠 CVE-2026-35043 - High (7.8)

BentoML is a Python library for building online serving systems optimized for AI apps and model inference. Prior to 1.4.38, the cloud deployment path in src/bentoml/_internal/cloud/deployment.py was not included in the fix for CVE-2026-33744. Line...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-59032
(7.5 HIGH)

EPSS: 0.07%

updated 2026-03-27T09:31:18

1 posts

ManageSieve AUTHENTICATE command crashes when using literal as SASL initial response. This can be used to crash ManageSieve service repeatedly, making it unavailable for other users. Control access to ManageSieve port, or disable the service if it's not needed. Alternatively upgrade to a fixed version. No publicly available exploits are known.

linux@activitypub.awakari.com at 2026-04-06T21:19:54.000Z ## Debian Bookworm Dovecot Authentication Regression Fix DSA-6197-2 The Bookworm backport of the security fix for CVE-2025-59032 introduced a regression in authenticating against managesieved. For the...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-33509
(7.5 HIGH)

EPSS: 0.08%

updated 2026-03-26T20:47:02.337000

2 posts

pyLoad is a free and open-source download manager written in Python. From version 0.4.0 to before version 0.5.0b3.dev97, the set_config_value() API endpoint allows users with the non-admin SETTINGS permission to modify any configuration option without restriction. The reconnect.script config option controls a file path that is passed directly to subprocess.run() in the thread manager's reconnect l

thehackerwire@mastodon.social at 2026-04-07T15:27:07.000Z ##

🟠 CVE-2026-35464 - High (7.5)

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T15:27:07.000Z ##

🟠 CVE-2026-35464 - High (7.5)

pyLoad is a free and open-source download manager written in Python. The fix for CVE-2026-33509 added an ADMIN_ONLY_OPTIONS set to block non-admin users from modifying security-critical config options. The storage_folder option is not in this set ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 66.27%

updated 2025-12-10T02:00:02.557000

4 posts

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Nuclei template

100 repos

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/sickwell/CVE-2025-55182

https://github.com/Archerkong/CVE-2025-55182

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/zr0n/react2shell

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/gensecaihq/react2shell-scanner

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/snipevx/React2Shell-POC

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/surajhacx/react2shellpoc

https://github.com/mrknow001/RSC_Detector

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/alsaut1/react2shell-lab

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/msanft/CVE-2025-55182

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/sumanrox/rschunter

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/hualy13/CVE-2025-55182

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/vulncheck-oss/cve-2025-55182

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/freeqaz/react2shell

https://github.com/kavienanj/CVE-2025-55182

https://github.com/shyambhanushali/React2Shell

https://github.com/theman001/CVE-2025-55182

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/zzhorc/CVE-2025-55182

https://github.com/Faithtiannn/CVE-2025-55182

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/hoosin/CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/xalgord/React2Shell

https://github.com/jctommasi/react2shellVulnApp

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/BlackTechX011/React2Shell

https://github.com/theori-io/reactguard

https://github.com/MemerGamer/CVE-2025-55182

https://github.com/timsonner/React2Shell-CVE-2025-55182

https://github.com/alptexans/RSC-Detect-CVE-2025-55182

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/nehkark/CVE-2025-55182

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/shamo0/react2shell-PoC

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/hexsh1dow/CVE-2025-55182

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/Updatelap/CVE-2025-55182

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/ynsmroztas/NextRce

https://github.com/assetnote/react2shell-scanner

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/emredavut/CVE-2025-55182

https://github.com/kondukto-io/vulnerable-next-js-poc

cyberveille@mastobot.ping.moi at 2026-04-07T08:00:24.000Z ##

📢 UAT-10608 : Campagne automatisée de vol de credentials ciblant les apps Next.js via CVE-2025-55182
📝 ## 🔍 Contexte

Publié le 2 avril 2026 p...
📖 cyberveille : cyberveille.ch/posts/2026-04-0
🌐 source : blog.talosintelligence.com/uat
#CVE_2025_55182 #IOC #Cyberveille

##

patrickcmiller at 2026-04-06T18:42:00.806Z ##

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials thehackernews.com/2026/04/hack

##

patrickcmiller@infosec.exchange at 2026-04-06T18:42:00.000Z ##

Hackers Exploit CVE-2025-55182 to Breach 766 Next.js Hosts, Steal Credentials thehackernews.com/2026/04/hack

##

oversecurity@mastodon.social at 2026-04-05T14:40:05.000Z ##

Hackers exploit React2Shell in automated credential theft campaign

Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable...

🔗️ [Bleepingcomputer] link.is.it/7WBrWn

##

CVE-2024-40766
(9.3 CRITICAL)

EPSS: 3.44%

updated 2025-10-22T00:33:06

1 posts

An improper access control vulnerability has been identified in the SonicWall SonicOS management access, potentially leading to unauthorized resource access and in specific conditions, causing the firewall to crash. This issue affects SonicWall Firewall Gen 5 and Gen 6 devices, as well as Gen 7 devices running SonicOS 7.0.1-5035 and older versions.

cyberveille@mastobot.ping.moi at 2026-04-07T13:30:24.000Z ##

📢 Akira Ransomware : compromission complète en moins d'une heure via CVE-2024-40766
📝 ## 🔍 Contexte

Cette analyse technique est publiée par le **Halcyon Ransomware Research Center** le 2 avril 2026.
📖 cyberveille : cyberveille.ch/posts/2026-04-0
🌐 source : halcyon.ai/ransomware-research
#Akira #Akira_v2 #Cyberveille

##

x86Overflow@wetdry.world at 2026-04-06T17:41:26.000Z ##

hey girl, are you CVE-2021-34473? because you are a 10/10

##

CVE-2016-2183
(7.5 HIGH)

EPSS: 40.99%

updated 2025-04-12T10:46:40.837000

2 posts

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.

1 repos

https://github.com/ZakyHermawan/Simple-Sweet32

certvde at 2026-04-07T06:38:28.616Z ##

VDE-2026-013
Helmholz: Use of a Broken or Risky Cryptographic Algorithm

Vulnerabilities in PROFINET-Switch devices with firmware <= V1.12.010 that allow an attacker to gain control over the device.
CVE-2016-2183

certvde.com/en/advisories/vde-

helmholz.csaf-tp.certvde.com/.

##

certvde@infosec.exchange at 2026-04-07T06:38:28.000Z ##

#OT #Advisory VDE-2026-013
Helmholz: Use of a Broken or Risky Cryptographic Algorithm

Vulnerabilities in PROFINET-Switch devices with firmware <= V1.12.010 that allow an attacker to gain control over the device.
#CVE CVE-2016-2183

certvde.com/en/advisories/vde-
#oCSAF
#CSAF helmholz.csaf-tp.certvde.com/.

##

CVE-2026-28797
(0 None)

EPSS: 0.07%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-07T06:00:27.000Z ##

🟠 CVE-2026-28797 - High (8.8)

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions 0.24.0 and prior, a Server-Side Template Injection (SSTI) vulnerability exists in RAGFlow's Agent workflow Text Processing (StringTransform) and Message components....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T06:00:27.000Z ##

🟠 CVE-2026-28797 - High (8.8)

RAGFlow is an open-source RAG (Retrieval-Augmented Generation) engine. In versions 0.24.0 and prior, a Server-Side Template Injection (SSTI) vulnerability exists in RAGFlow's Agent workflow Text Processing (StringTransform) and Message components....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34990
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-07T06:00:18.000Z ##

🟠 CVE-2026-34990 - High (7.8)

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T06:00:18.000Z ##

🟠 CVE-2026-34990 - High (7.8)

OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.16 and prior, a local unprivileged user can coerce cupsd into authenticating to an attacker-controlled localhost IPP service with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35182
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-07T05:00:00.000Z ##

🟠 CVE-2026-35182 - High (8.8)

Brave CMS is an open-source CMS. Prior to 2.0.6, this vulnerability is a missing authorization check found in the update role endpoint at routes/web.php. The POST route for /rights/update-role/{id} lacks the checkUserPermissions:assign-user-roles ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T05:00:00.000Z ##

🟠 CVE-2026-35182 - High (8.8)

Brave CMS is an open-source CMS. Prior to 2.0.6, this vulnerability is a missing authorization check found in the update role endpoint at routes/web.php. The POST route for /rights/update-role/{id} lacks the checkUserPermissions:assign-user-roles ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35203
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-07T04:00:25.000Z ##

🟠 CVE-2026-35203 - High (7.5)

ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in ext-codec/VP9Rtp.cpp reads multiple fields from the RTP payload based on flag bits in the first byte, without verifying that sufficient data exists in the buffer. A c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T04:00:25.000Z ##

🟠 CVE-2026-35203 - High (7.5)

ZLMediaKit is a streaming media service framework. the VP9 RTP payload parser in ext-codec/VP9Rtp.cpp reads multiple fields from the RTP payload based on flag bits in the first byte, without verifying that sufficient data exists in the buffer. A c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35395
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-07T04:00:15.000Z ##

🟠 CVE-2026-35395 - High (8.8)

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_R...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-07T04:00:15.000Z ##

🟠 CVE-2026-35395 - High (8.8)

WeGIA is a Web manager for charitable institutions. Prior to 3.6.9, WeGIA (Web gerenciador para instituições assistenciais) contains a SQL injection vulnerability in dao/memorando/DespachoDAO.php. The id_memorando parameter is extracted from $_R...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-53906
(0 None)

EPSS: 0.02%

1 posts

N/A

EUVD_Bot@mastodon.social at 2026-04-06T19:04:09.000Z ##

🚨 EUVD-2026-19426

📊 Score: 4.1/10 (CVSS v3.1)
📦 Product: vim
🏢 Vendor: vim
📅 Updated: 2026-04-06

📝 Vim is an open source, command line text editor. Prior to 9.2.0280, a path traversal bypass in Vim's zip.vim plugin allows overwriting of arbitrary files when opening specially crafted zip archives, circumventing the previous fix for CVE-2025-53906. This vulnerabili...

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2026-35050
(0 None)

EPSS: 0.06%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T18:24:12.000Z ##

🔴 CVE-2026-35050 - Critical (9.1)

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.1.1, users can save extention settings in "py" format and in the app root directory. This allows to overwrite python files, for instance the "downl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:24:12.000Z ##

🔴 CVE-2026-35050 - Critical (9.1)

text-generation-webui is an open-source web interface for running Large Language Models. Prior to 4.1.1, users can save extention settings in "py" format and in the app root directory. This allows to overwrite python files, for instance the "downl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:24:02.000Z ##

🟠 CVE-2026-35045 - High (8.1)

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T18:24:02.000Z ##

🟠 CVE-2026-35045 - High (8.1)

Tandoor Recipes is an application for managing recipes, planning meals, and building shopping lists. Prior to 2.6.4, the PUT /api/recipe/batch_update/ endpoint in Tandoor Recipes allows any authenticated user within a Space to modify any recipe in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34975
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T17:21:24.000Z ##

🟠 CVE-2026-34975 - High (8.5)

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment fil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T17:18:54.000Z ##

🟠 CVE-2026-34975 - High (8.5)

Plunk is an open-source email platform built on top of AWS SES. Prior to 0.8.0, a CRLF header injection vulnerability was discovered in SESService.ts, where user-supplied values for from.name, subject, custom header keys/values, and attachment fil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34148
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T16:22:55.000Z ##

🟠 CVE-2026-34148 - High (7.5)

Fedify is a TypeScript library for building federated server apps powered by ActivityPub. Prior to 1.9.6, 1.10.5, 2.0.8, and 2.1.1, @fedify/fedify follows HTTP redirects recursively in its remote document loader and authenticated document loader w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34402
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T16:20:29.000Z ##

🟠 CVE-2026-34402 - High (8.1)

ChurchCRM is an open-source church management system. Prior to 7.1.0, authenticated users with Edit Records or Manage Groups permissions can exploit a time-based blind SQL injection vulnerability in the PropertyAssign.php endpoint to exfiltrate or...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34982
(0 None)

EPSS: 0.02%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T16:20:20.000Z ##

🟠 CVE-2026-34982 - High (8.2)

Vim is an open source, command line text editor. Prior to version 9.2.0276, a modeline sandbox bypass in Vim allows arbitrary OS command execution when a user opens a crafted file. The `complete`, `guitabtooltip` and `printheader` options are miss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33510
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T15:41:19.000Z ##

🟠 CVE-2026-33510 - High (8.8)

Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-04-06T15:35:05.000Z ##

🟠 CVE-2026-33510 - High (8.8)

Homarr is an open-source dashboard. Prior to 1.57.0, a DOM-based Cross-Site Scripting (XSS) vulnerability has been discovered in Homarr's /auth/login page. The application improperly trusts a URL parameter (callbackUrl), which is passed to redirec...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26027
(0 None)

EPSS: 0.05%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T15:35:26.000Z ##

🟠 CVE-2026-26027 - High (7.5)

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated user can store an XSS payload through the inventory endpoint. This vulnerability is fixed in 11.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

decio@infosec.exchange at 2026-04-04T23:18:23.000Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

#CyberVeille #CVE_2026_26026 CVE-2026-26027

##

CVE-2026-26026
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-04-06T15:35:16.000Z ##

🔴 CVE-2026-26026 - Critical (9.1)

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, template injection by an administrator lead to RCE. This vulnerability is fixed in 11.0.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

decio@infosec.exchange at 2026-04-04T23:18:23.000Z ##

Tiens, intéressant : il s’agit du rapport technique sur la faille #glpi, à l'origine du patch du mois passé.
Si vous administrez un service GLPI

⬇️
"mettez à jour vers la version 11.0.6 disponible depuis le 3 mars 2026. Si la mise à jour n’est pas encore possible, activez l’authentification sur l’endpoint /Inventory (Paramètres → Inventaire → En-tête d’autorisation)."
⬇️
"GLPI : Blind XSS → ATO → SSTI → RCE — anatomie d'une chaîne 0-day
BZHunt a découvert deux vulnérabilités chaînées dans GLPI 11.0.0–11.0.5 (CVE-2026-26026, CVE-2026-26027) permettant à un attaquant non authentifié d'exécuter du code arbitraire via une Blind Stored XSS et une SSTI. Analyse technique complète et responsible disclosure."
👇
bzhunt.fr/blog/cve_glpi/

...et nice to know: Claude a encore aidé & tiré (Notice de transparence très appréciée)

"Cette recherche a été conduite avec l’assistance de Claude Opus 4.6 (Anthropic), utilisé par BZHunt dans son processus de R&D. Toutes les vulnérabilités ont été identifiées, vérifiées et exploitées par des chercheurs humains. Nous faisons le choix de la transparence sur l’usage de l’IA dans nos travaux, dans l’attente que des standards clairs émergent sur ce sujet."

#CyberVeille #CVE_2026_26026 CVE-2026-26027

##

CVE-2025-70951
(0 None)

EPSS: 0.00%

1 posts

N/A

campuscodi@mastodon.social at 2026-04-05T16:04:41.000Z ##

There's a new unauth remote code execution bug in the CentOS Control Web Panel web hosting toolkit, tracked as CVE-2025-70951, that will need patching in the coming days

fenrisk.com/rce-centos-webpane

##

CVE-2026-27456
(0 None)

EPSS: 0.01%

1 posts

N/A

linux@activitypub.awakari.com at 2026-04-05T08:02:24.000Z ## CVE-2026-27456 util-linux: TOCTOU Race Condition in util-linux mount(8) - Loop Device Setup Information published.

#CVE

Origin | Interest | Match ##

CVE-2026-34612
(0 None)

EPSS: 0.14%

1 posts

N/A

offseq@infosec.exchange at 2026-04-04T09:00:28.000Z ##

⚠️ SQL Injection (CVSS 10, CRITICAL) in Kestra < 1.3.7 — authenticated users can trigger RCE via /api/v1/main/flows/search. Patch to v1.3.7 to mitigate. CVE-2026-34612. Details: radar.offseq.com/threat/cve-20 #OffSeq #Kestra #SQLInjection #RCE

##

CVE-2026-31932
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-04-04T06:00:13.000Z ##

🟠 CVE-2026-31932 - High (7.5)

Suricata is a network IDS, IPS and NSM engine. Prior to versions 7.0.15 and 8.0.4, inefficiency in KRB5 buffering can lead to performance degradation. This issue has been patched in versions 7.0.15 and 8.0.4.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites