##
Updated at UTC 2026-04-17T23:31:11.333665
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-40258 | 9.1 | 0.00% | 2 | 0 | 2026-04-17T22:16:32.067000 | The Gramps Web API is a Python REST API for the genealogical research software G | |
| CVE-2026-40525 | 9.1 | 0.00% | 2 | 0 | 2026-04-17T21:31:53 | OpenViking prior to commit c7bb167 contains an authentication bypass vulnerabili | |
| CVE-2026-35546 | 9.8 | 0.00% | 2 | 0 | 2026-04-17T20:16:35.380000 | Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This | |
| CVE-2026-32105 | 0 | 0.00% | 2 | 0 | 2026-04-17T20:16:33.517000 | xrdp is an open source RDP server. In versions through 0.10.5, xrdp does not imp | |
| CVE-2026-28224 | 8.2 | 0.00% | 2 | 0 | 2026-04-17T20:16:32.460000 | Firebird is an open-source relational database management system. In versions pr | |
| CVE-2026-6359 | 8.8 | 0.07% | 1 | 0 | 2026-04-17T19:21:14.907000 | Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allo | |
| CVE-2026-6363 | 8.8 | 0.07% | 1 | 0 | 2026-04-17T19:19:48.317000 | Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote a | |
| CVE-2026-40170 | 7.5 | 0.04% | 2 | 0 | 2026-04-17T19:16:37.763000 | ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.2 | |
| CVE-2026-33337 | 7.5 | 0.00% | 2 | 0 | 2026-04-17T19:16:36.223000 | Firebird is an open-source relational database management system. In versions pr | |
| CVE-2026-28212 | 7.5 | 0.00% | 2 | 0 | 2026-04-17T19:16:35.180000 | Firebird is an open-source relational database management system. In versions pr | |
| CVE-2026-27890 | 8.2 | 0.00% | 2 | 0 | 2026-04-17T19:16:34.993000 | Firebird is an open-source relational database management system. In versions pr | |
| CVE-2026-6316 | 8.8 | 0.08% | 1 | 0 | 2026-04-17T19:08:02.587000 | Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remot | |
| CVE-2026-37749 | 9.8 | 0.00% | 4 | 1 | 2026-04-17T18:32:56 | A SQL injection vulnerability in CodeAstro Simple Attendance Management System v | |
| CVE-2026-6305 | 8.8 | 0.03% | 1 | 0 | 2026-04-17T18:32:55 | Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed | |
| CVE-2026-5718 | 8.1 | 0.00% | 2 | 0 | 2026-04-17T18:32:05 | The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress i | |
| CVE-2026-5710 | 7.5 | 0.00% | 2 | 0 | 2026-04-17T18:31:54 | The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress i | |
| CVE-2026-3464 | 8.8 | 0.00% | 2 | 0 | 2026-04-17T18:31:53 | The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read a | |
| CVE-2026-40516 | 8.3 | 0.00% | 2 | 0 | 2026-04-17T18:31:53 | OpenHarness before commit bd4df81 contains a server-side request forgery vulnera | |
| CVE-2026-40515 | 7.5 | 0.00% | 2 | 0 | 2026-04-17T18:31:53 | OpenHarness before commit bd4df81 contains a permission bypass vulnerability tha | |
| CVE-2026-6284 | 9.1 | 0.00% | 4 | 0 | 2026-04-17T18:31:52 | An attacker with network access to the PLC is able to brute force discover passw | |
| CVE-2026-6309 | 8.3 | 0.02% | 1 | 0 | 2026-04-17T17:26:50.993000 | Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote | |
| CVE-2026-6296 | 9.6 | 0.02% | 2 | 0 | 2026-04-17T15:42:44.730000 | Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a | |
| CVE-2026-6301 | 8.8 | 0.03% | 1 | 0 | 2026-04-17T15:41:01.207000 | Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a re | |
| CVE-2026-33435 | 8.0 | 0.33% | 2 | 0 | 2026-04-17T15:38:09.243000 | Weblate is a web based localization tool. In versions prior to 5.17, the project | |
| CVE-2026-40322 | 9.0 | 0.05% | 2 | 0 | 2026-04-17T15:38:09.243000 | SiYuan is an open-source personal knowledge management system. In versions 3.6.3 | |
| CVE-2026-31843 | 9.8 | 0.89% | 2 | 0 | 2026-04-17T15:38:09.243000 | The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerabili | |
| CVE-2026-33555 | 4.0 | 0.01% | 1 | 1 | 2026-04-17T15:38:09.243000 | An issue was discovered in HAProxy before 3.3.6. The HTTP/3 parser does not chec | |
| CVE-2026-30656 | 7.5 | 0.06% | 1 | 0 | 2026-04-17T15:38:09.243000 | A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3. | |
| CVE-2026-40176 | 7.8 | 0.01% | 1 | 3 | 2026-04-17T15:38:09.243000 | Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 th | |
| CVE-2026-40193 | 8.2 | 0.06% | 1 | 0 | 2026-04-17T15:38:09.243000 | maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain a | |
| CVE-2026-40504 | 9.8 | 0.07% | 2 | 0 | 2026-04-17T15:38:09.243000 | Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in t | |
| CVE-2026-6349 | 0 | 0.95% | 1 | 0 | 2026-04-17T15:38:09.243000 | The iSherlock developed by HGiga has an OS Command Injection vulnerability, al | |
| CVE-2026-6351 | 7.5 | 0.02% | 1 | 0 | 2026-04-17T15:38:09.243000 | MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, al | |
| CVE-2026-6507 | 7.5 | 0.00% | 2 | 0 | 2026-04-17T15:31:27 | A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds wr | |
| CVE-2026-40262 | 8.7 | 0.03% | 2 | 0 | 2026-04-17T15:29:25.583000 | Note Mark is an open-source note-taking application. In versions 0.19.1 and prio | |
| CVE-2026-6270 | 9.1 | 0.03% | 1 | 0 | 2026-04-17T15:17:00.957000 | @fastify/middie versions 9.3.1 and earlier do not register inherited middleware | |
| CVE-2026-23772 | 7.3 | 0.01% | 1 | 0 | 2026-04-17T15:17:00.957000 | Dell Storage Manager - Replay Manager for Microsoft Servers, version(s) 8.0, con | |
| CVE-2026-37338 | 9.4 | 0.03% | 1 | 0 | 2026-04-17T15:15:09.790000 | SourceCodester Simple Music Cloud Community System v1.0 is vulnerable to SQL Inj | |
| CVE-2026-39808 | 9.8 | 0.29% | 1 | 2 | 2026-04-17T15:11:35.840000 | A improper neutralization of special elements used in an os command ('os command | |
| CVE-2026-32163 | 7.8 | 0.04% | 1 | 0 | 2026-04-17T15:10:35.607000 | Concurrent execution using shared resource with improper synchronization ('race | |
| CVE-2026-32168 | 7.8 | 0.07% | 1 | 0 | 2026-04-17T15:10:35.607000 | Improper input validation in Azure Monitor Agent allows an authorized attacker t | |
| CVE-2026-32183 | 7.8 | 0.05% | 1 | 0 | 2026-04-17T15:10:35.607000 | Improper neutralization of special elements used in a command ('command injectio | |
| CVE-2026-20186 | 9.9 | 0.23% | 3 | 0 | 2026-04-17T15:09:46.880000 | A vulnerability in Cisco Identity Services Engine (ISE) could allow an authentic | |
| CVE-2026-20184 | 9.8 | 0.05% | 5 | 0 | 2026-04-17T15:09:46.880000 | A vulnerability in the integration of single sign-on (SSO) with Control Hub in C | |
| CVE-2026-20180 | 9.9 | 0.21% | 4 | 0 | 2026-04-17T15:09:46.880000 | A vulnerability in Cisco Identity Services Engine (ISE) could allow an authentic | |
| CVE-2026-4857 | 8.4 | 0.03% | 2 | 0 | 2026-04-17T15:08:01.337000 | IdentityIQ 8.5, all IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, | |
| CVE-2026-35569 | 8.7 | 0.03% | 2 | 0 | 2026-04-17T15:08:01.337000 | ApostropheCMS is an open-source Node.js content management system. Versions 4.28 | |
| CVE-2026-23775 | 7.6 | 0.01% | 2 | 0 | 2026-04-17T15:07:18.050000 | Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD O | |
| CVE-2026-23853 | 8.4 | 0.01% | 2 | 0 | 2026-04-17T09:31:26 | Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Featu | |
| CVE-2025-36568 | 7.9 | 0.01% | 2 | 0 | 2026-04-17T09:31:25 | Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7 | |
| CVE-2026-33392 | 7.2 | 0.00% | 2 | 0 | 2026-04-17T09:31:19 | In JetBrains YouTrack before 2025.3.131383 high privileged user can achieve RCE | |
| CVE-2026-6443 | 9.8 | 0.04% | 6 | 0 | 2026-04-17T09:31:18 | The Accordion and Accordion Slider plugin for WordPress is vulnerable to an inje | |
| CVE-2026-4659 | 7.5 | 0.03% | 2 | 0 | 2026-04-17T09:31:18 | The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbit | |
| CVE-2026-21719 | 7.2 | 0.18% | 2 | 0 | 2026-04-17T06:31:14 | An OS command injection vulnerability exists in CubeCart prior to 6.6.0, which m | |
| CVE-2026-3605 | 8.1 | 0.01% | 2 | 0 | 2026-04-17T06:31:14 | An authenticated user with access to a kvv2 path through a policy containing a g | |
| CVE-2026-5807 | 7.5 | 0.01% | 2 | 0 | 2026-04-17T06:31:08 | Vault is vulnerable to a denial-of-service condition where an unauthenticated at | |
| CVE-2026-4525 | 7.5 | 0.01% | 2 | 0 | 2026-04-17T06:31:08 | If a Vault auth mount is configured to pass through the "Authorization" header, | |
| CVE-2026-22734 | 8.6 | 0.01% | 2 | 0 | 2026-04-17T03:30:52 | Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a | |
| CVE-2026-41113 | 8.1 | 0.08% | 2 | 0 | 2026-04-17T00:31:10 | sagredo qmail before 2026.04.07 allows tls_quit remote code execution because of | |
| CVE-2026-33032 | 9.8 | 4.97% | 8 | 2 | template | 2026-04-16T22:16:37.433000 | Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and |
| CVE-2026-40245 | 7.5 | 0.10% | 1 | 0 | 2026-04-16T21:57:38 | ### Summary An information disclosure vulnerability in the UDR service allows an | |
| CVE-2026-40261 | 8.8 | 0.03% | 1 | 2 | 2026-04-16T21:55:08 | ### Impact The `Perforce::syncCodeBase()` method appended the `$sourceReference` | |
| CVE-2026-34197 | 8.8 | 46.64% | 16 | 7 | template | 2026-04-16T21:49:17 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti |
| CVE-2025-41118 | 9.1 | 0.03% | 2 | 0 | 2026-04-16T21:41:16 | Pyroscope is an open-source continuous profiling database. The database supports | |
| CVE-2026-6290 | 8.1 | 0.03% | 2 | 0 | 2026-04-16T21:33:30 | Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plu | |
| CVE-2026-32282 | 6.4 | 0.01% | 1 | 0 | 2026-04-16T21:32:15 | On Linux, if the target of Root.Chmod is replaced with a symlink while the chmod | |
| CVE-2026-4424 | 7.5 | 0.20% | 1 | 0 | 2026-04-16T21:32:14 | A flaw was found in libarchive. This heap out-of-bounds read vulnerability exist | |
| CVE-2026-6442 | 8.4 | 0.07% | 1 | 0 | 2026-04-16T21:31:19 | Improper validation of bash commands in Snowflake Cortex Code CLI versions prior | |
| CVE-2026-5194 | 9.1 | 0.03% | 2 | 0 | 2026-04-16T21:31:11 | Missing hash/digest size and OID checks allow digests smaller than allowed when | |
| CVE-2026-40173 | 9.4 | 0.10% | 1 | 0 | 2026-04-16T21:08:08 | ### Summary An unauthenticated debug endpoint in Dgraph Alpha exposes the full p | |
| CVE-2026-34393 | 8.8 | 0.04% | 2 | 0 | 2026-04-16T20:43:50 | ### Impact The user patching API endpoint didn't properly limit the scope of ed | |
| CVE-2026-34242 | 7.7 | 0.01% | 2 | 0 | 2026-04-16T20:43:12 | ### Impact The ZIP download feature didn't verify downloaded file and it could | |
| CVE-2026-30459 | 7.1 | 0.04% | 1 | 0 | 2026-04-16T18:32:28 | An issue in the Forgot Password feature of Daylight Studio FuelCMS v1.5.2 allows | |
| CVE-2026-5426 | None | 0.08% | 1 | 0 | 2026-04-16T18:31:28 | Hard-coded ASP.NET/IIS machineKey value in Digital Knowledge KnowledgeDeliver de | |
| CVE-2026-30993 | 9.8 | 0.29% | 2 | 0 | 2026-04-16T15:32:35 | Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE | |
| CVE-2026-3324 | 8.2 | 0.14% | 1 | 0 | 2026-04-16T15:31:44 | Zohocorp ManageEngine Log360 versions 13000 through 13013 are vulnerable to auth | |
| CVE-2026-5785 | 8.1 | 0.02% | 1 | 0 | 2026-04-16T15:31:44 | Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Mana | |
| CVE-2026-22619 | 7.9 | 0.01% | 1 | 0 | 2026-04-16T15:31:33 | Eaton Intelligent Power Protector (IPP) is affected by insecure library loading | |
| CVE-2026-6319 | 7.5 | 0.08% | 1 | 0 | 2026-04-16T12:32:42 | Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 a | |
| CVE-2026-3489 | 7.5 | 0.02% | 1 | 0 | 2026-04-16T12:31:47 | The DirectoryPress – Business Directory And Classified Ad Listing plugin for Wor | |
| CVE-2026-6308 | 7.5 | 0.08% | 1 | 0 | 2026-04-16T12:31:41 | Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a r | |
| CVE-2026-6318 | 8.8 | 0.08% | 1 | 0 | 2026-04-16T12:31:41 | Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remo | |
| CVE-2026-6306 | 8.8 | 0.07% | 1 | 0 | 2026-04-16T12:31:40 | Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed | |
| CVE-2026-6303 | 8.8 | 0.08% | 1 | 0 | 2026-04-16T12:31:40 | Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remo | |
| CVE-2025-14868 | 8.8 | 0.02% | 1 | 0 | 2026-04-16T09:31:50 | The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forg | |
| CVE-2026-1620 | 8.8 | 0.07% | 1 | 0 | 2026-04-16T07:16:29.787000 | The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local Fi | |
| CVE-2026-3596 | 9.8 | 0.04% | 2 | 0 | 2026-04-16T06:31:29 | The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Esc | |
| CVE-2026-3614 | 8.8 | 0.02% | 1 | 0 | 2026-04-16T06:31:29 | The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all | |
| CVE-2026-5050 | 7.5 | 0.01% | 1 | 0 | 2026-04-16T06:31:29 | The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulner | |
| CVE-2026-3599 | 7.5 | 0.04% | 1 | 0 | 2026-04-16T06:16:17.063000 | The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection | |
| CVE-2026-6350 | 9.8 | 0.06% | 2 | 0 | 2026-04-16T03:31:15 | MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vuln | |
| CVE-2026-1880 | None | 0.01% | 1 | 1 | 2026-04-16T03:31:14 | An Incorrect Permission Assignment for Critical Resource vulnerability in the AS | |
| CVE-2026-40960 | 8.2 | 0.00% | 1 | 0 | 2026-04-16T03:31:13 | Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environ | |
| CVE-2026-40959 | 9.4 | 0.00% | 1 | 0 | 2026-04-16T03:31:13 | Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a c | |
| CVE-2026-3428 | None | 0.00% | 1 | 0 | 2026-04-16T03:31:12 | A Download of Code Without Integrity Check vulnerability in the update modules i | |
| CVE-2026-6348 | 8.8 | 0.01% | 2 | 0 | 2026-04-16T03:31:12 | WinMatrix agent developed by Simopro Technology has a Missing Authentication vul | |
| CVE-2026-40502 | 8.8 | 0.19% | 1 | 0 | 2026-04-16T03:31:12 | OpenHarness prior to commit dd1d235 contains a command injection vulnerability t | |
| CVE-2026-33807 | 9.1 | 0.05% | 1 | 0 | 2026-04-16T01:03:26 | ### Summary `@fastify/express` v4.0.4 contains a path handling bug in the `onRe | |
| CVE-2026-6388 | 9.1 | 0.03% | 2 | 0 | 2026-04-16T00:54:15 | A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, | |
| CVE-2026-4880 | 9.8 | 0.12% | 2 | 0 | 2026-04-16T00:54:15 | The Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, | |
| CVE-2026-30996 | 7.5 | 0.29% | 2 | 0 | 2026-04-15T21:31:21 | An issue in the file handling logic of the component download.php of SAC-NFe v2. | |
| CVE-2026-30994 | 7.5 | 0.04% | 2 | 0 | 2026-04-15T21:31:21 | Incorrect access control in the config.php component of Slah v1.5.0 and below al | |
| CVE-2026-22676 | 7.8 | 0.01% | 1 | 0 | 2026-04-15T21:30:30 | Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerab | |
| CVE-2026-6315 | 8.8 | 0.07% | 1 | 0 | 2026-04-15T21:30:26 | Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.10 | |
| CVE-2026-34632 | 8.3 | 0.01% | 2 | 0 | 2026-04-15T21:30:25 | Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vu | |
| CVE-2026-6300 | 8.8 | 0.03% | 2 | 0 | 2026-04-15T21:30:25 | Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote | |
| CVE-2026-6299 | 8.8 | 0.03% | 2 | 0 | 2026-04-15T21:30:25 | Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a r | |
| CVE-2026-6297 | 8.4 | 0.01% | 2 | 0 | 2026-04-15T21:30:25 | Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an atta | |
| CVE-2026-6311 | 8.4 | 0.02% | 1 | 0 | 2026-04-15T21:30:25 | Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.77 | |
| CVE-2026-6310 | 8.4 | 0.02% | 1 | 0 | 2026-04-15T21:30:25 | Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote | |
| CVE-2026-6317 | 8.8 | 0.08% | 1 | 0 | 2026-04-15T21:30:20 | Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote | |
| CVE-2026-6360 | 8.8 | 0.03% | 1 | 0 | 2026-04-15T21:30:20 | Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a | |
| CVE-2026-6358 | 8.8 | 0.07% | 1 | 0 | 2026-04-15T21:30:20 | Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed | |
| CVE-2026-6307 | 8.8 | 0.03% | 2 | 0 | 2026-04-15T21:30:19 | Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a re | |
| CVE-2026-6304 | 8.4 | 0.02% | 1 | 0 | 2026-04-15T21:30:19 | Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a re | |
| CVE-2026-6302 | 8.8 | 0.03% | 1 | 0 | 2026-04-15T21:30:19 | Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remot | |
| CVE-2026-6314 | 8.4 | 0.02% | 1 | 0 | 2026-04-15T21:30:19 | Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a re | |
| CVE-2026-40318 | 8.5 | 0.06% | 2 | 0 | 2026-04-15T20:40:26 | ## Summary The endpoint `/api/av/removeUnusedAttributeView` is vulnerable to a | |
| CVE-2026-30995 | 8.6 | 0.03% | 2 | 0 | 2026-04-15T18:32:04 | Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerabilit | |
| CVE-2026-6372 | 7.5 | 0.03% | 2 | 0 | 2026-04-15T18:32:04 | Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisi | |
| CVE-2026-20152 | 5.3 | 0.07% | 1 | 0 | 2026-04-15T18:32:04 | A vulnerability in the authentication service feature of Cisco AsyncOS Software | |
| CVE-2026-20147 | 10.0 | 0.23% | 1 | 0 | 2026-04-15T18:32:04 | A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, rem | |
| CVE-2026-20148 | 4.9 | 0.05% | 1 | 0 | 2026-04-15T18:32:03 | A vulnerability in Cisco ISE and Cisco ISE-PIC could allow an authenticated, rem | |
| CVE-2026-25554 | 6.5 | 0.09% | 2 | 0 | 2026-04-15T00:35:42.020000 | OpenSIPS versions 3.1 before 3.6.4 containing the auth_jwt module (prior to comm | |
| CVE-2025-0520 | 0 | 2.03% | 2 | 0 | 2026-04-15T00:35:42.020000 | An unrestricted file upload vulnerability in ShowDoc caused by improper validati | |
| CVE-2026-32178 | None | 0.05% | 1 | 0 | 2026-04-14T23:27:56 | ## Executive Summary: Microsoft is releasing this security advisory to provide | |
| CVE-2026-33155 | None | 0.05% | 2 | 0 | 2026-04-14T21:59:48 | ### Summary The pickle unpickler `_RestrictedUnpickler` validates which classes | |
| CVE-2026-32201 | 6.5 | 0.81% | 1 | 0 | 2026-04-14T18:30:55 | Improper input validation in Microsoft Office SharePoint allows an unauthorized | |
| CVE-2026-33825 | 7.8 | 0.04% | 4 | 1 | 2026-04-14T18:30:52 | Insufficient granularity of access control in Microsoft Defender allows an autho | |
| CVE-2026-33824 | 9.8 | 0.07% | 1 | 1 | 2026-04-14T18:30:52 | Double free in Windows IKE Extension allows an unauthorized attacker to execute | |
| CVE-2026-33829 | 4.3 | 0.06% | 2 | 0 | 2026-04-14T18:30:51 | Exposure of sensitive information to an unauthorized actor in Windows Snipping T | |
| CVE-2026-32164 | 7.9 | 0.04% | 1 | 0 | 2026-04-14T18:30:51 | Concurrent execution using shared resource with improper synchronization ('race | |
| CVE-2026-32171 | 8.8 | 0.06% | 1 | 0 | 2026-04-14T18:30:51 | Insufficiently protected credentials in Azure Logic Apps allows an authorized at | |
| CVE-2026-27245 | 9.3 | 0.10% | 1 | 0 | 2026-04-14T18:30:49 | Adobe Connect versions 2025.3, 12.10 and earlier are affected by a reflected Cro | |
| CVE-2026-32162 | 8.4 | 0.03% | 1 | 0 | 2026-04-14T18:30:43 | Acceptance of extraneous untrusted data with trusted data in Windows COM allows | |
| CVE-2026-32158 | 7.9 | 0.04% | 1 | 0 | 2026-04-14T18:30:42 | Concurrent execution using shared resource with improper synchronization ('race | |
| CVE-2026-32157 | 8.8 | 0.12% | 1 | 0 | 2026-04-14T18:30:42 | Use after free in Remote Desktop Client allows an unauthorized attacker to execu | |
| CVE-2026-32165 | 7.9 | 0.04% | 1 | 0 | 2026-04-14T18:30:42 | Use after free in Windows User Interface Core allows an authorized attacker to e | |
| CVE-2026-39813 | 9.8 | 0.06% | 1 | 0 | 2026-04-14T18:30:41 | A path traversal: '../filedir' vulnerability in Fortinet FortiSandbox 5.0.0 thro | |
| CVE-2025-60710 | 7.8 | 17.97% | 1 | 2 | 2026-04-14T14:44:19.867000 | Improper link resolution before file access ('link following') in Host Process f | |
| CVE-2026-21643 | 9.8 | 33.91% | 1 | 2 | template | 2026-04-14T14:21:18.670000 | An improper neutralization of special elements used in an sql command ('sql inje |
| CVE-2026-34621 | 9.7 | 4.56% | 1 | 5 | 2026-04-13T18:31:44 | Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by a | |
| CVE-2026-40259 | 8.1 | 0.08% | 2 | 0 | 2026-04-10T21:32:47 | ## Summary An authenticated publish-service reader can invoke `/api/av/removeUn | |
| CVE-2026-39987 | None | 3.20% | 5 | 4 | template | 2026-04-09T19:06:18 | ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal |
| CVE-2026-34073 | 5.3 | 0.02% | 1 | 0 | 2026-04-06T15:30:27.887000 | cryptography is a package designed to expose cryptographic primitives and recipe | |
| CVE-2026-25645 | 4.4 | 0.00% | 1 | 0 | 2026-03-27T22:07:43 | ### Impact The `requests.utils.extract_zipped_paths()` utility function uses a p | |
| CVE-2026-32746 | 9.8 | 0.03% | 4 | 5 | 2026-03-23T15:31:40 | telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMO | |
| CVE-2026-22730 | 8.8 | 0.02% | 2 | 1 | 2026-03-18T20:20:40 | A critical SQL injection vulnerability in Spring AI's MariaDBFilterExpressionCon | |
| CVE-2026-22729 | 8.6 | 0.07% | 2 | 0 | 2026-03-18T20:20:27 | A JSONPath injection vulnerability in Spring AI's AbstractFilterExpressionConver | |
| CVE-2026-3888 | 7.8 | 0.01% | 2 | 6 | 2026-03-18T04:17:30.720000 | Local privilege escalation in snapd on Linux allows local attackers to get root | |
| CVE-2026-27205 | None | 0.01% | 1 | 0 | 2026-02-23T22:28:06 | When the `session` object is accessed, Flask should set the `Vary: Cookie` heade | |
| CVE-2026-24061 | 9.8 | 88.02% | 2 | 68 | template | 2026-02-10T18:30:34 | telnetd in GNU Inetutils through 2.7 allows remote authentication bypass via a " |
| CVE-2025-55182 | 10.0 | 86.90% | 1 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2025-59284 | 3.3 | 0.03% | 2 | 1 | 2025-10-14T18:30:47 | Exposure of sensitive information to an unauthorized actor in Windows NTLM allow | |
| CVE-2024-32114 | 8.8 | 2.02% | 2 | 0 | 2025-02-11T19:03:09 | In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web con | |
| CVE-2025-65104 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-33058 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-40316 | 0 | 0.06% | 1 | 0 | N/A | ||
| CVE-2026-33438 | 0 | 0.05% | 1 | 0 | N/A |
updated 2026-04-17T22:16:32.067000
2 posts
🚨 CVE-2026-40258: CRITICAL path traversal in gramps-web-api (1.6.0-3.11.0). Owner-level users can write files outside intended dirs via crafted ZIPs. Upgrade to 3.11.1+ to mitigate! https://radar.offseq.com/threat/cve-2026-40258-cwe-22-improper-limitation-of-a-pat-00f841f8 #OffSeq #CVE202640258 #PathTraversal #Infosec
##🚨 CVE-2026-40258: CRITICAL path traversal in gramps-web-api (1.6.0-3.11.0). Owner-level users can write files outside intended dirs via crafted ZIPs. Upgrade to 3.11.1+ to mitigate! https://radar.offseq.com/threat/cve-2026-40258-cwe-22-improper-limitation-of-a-pat-00f841f8 #OffSeq #CVE202640258 #PathTraversal #Infosec
##updated 2026-04-17T21:31:53
2 posts
🔴 CVE-2026-40525 - Critical (9.1)
OpenViking prior to commit c7bb167 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40525 - Critical (9.1)
OpenViking prior to commit c7bb167 contains an authentication bypass vulnerability in the VikingBot OpenAPI HTTP route surface where the authentication check fails open when the api_key configuration value is unset or empty. Remote attackers with...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T20:16:35.380000
2 posts
⚠️ CRITICAL: Anviz CX7 & CX2 Lite firmware vuln (CVE-2026-35546) allows unauthenticated uploads — attackers can execute code & gain reverse shell. All versions affected. No mitigation yet. https://radar.offseq.com/threat/cve-2026-35546-cwe-306-in-anviz-anviz-cx7-firmware-147e04a2 #OffSeq #IoTSecurity #vulnerability
##⚠️ CRITICAL: Anviz CX7 & CX2 Lite firmware vuln (CVE-2026-35546) allows unauthenticated uploads — attackers can execute code & gain reverse shell. All versions affected. No mitigation yet. https://radar.offseq.com/threat/cve-2026-35546-cwe-306-in-anviz-anviz-cx7-firmware-147e04a2 #OffSeq #IoTSecurity #vulnerability
##updated 2026-04-17T20:16:33.517000
2 posts
🚨 CVE-2026-32105 (CRITICAL): neutrinolabs xrdp <0.10.6 does not validate MAC on Classic RDP Security layer, allowing MITM attackers to modify encrypted traffic. Upgrade to 0.10.6 or enforce TLS in xrdp.ini! https://radar.offseq.com/threat/cve-2026-32105-cwe-354-improper-validation-of-inte-71bf3dd4 #OffSeq #xrdp #infosec #RDP
##🚨 CVE-2026-32105 (CRITICAL): neutrinolabs xrdp <0.10.6 does not validate MAC on Classic RDP Security layer, allowing MITM attackers to modify encrypted traffic. Upgrade to 0.10.6 or enforce TLS in xrdp.ini! https://radar.offseq.com/threat/cve-2026-32105-cwe-354-improper-validation-of-inte-71bf3dd4 #OffSeq #xrdp #infosec #RDP
##updated 2026-04-17T20:16:32.460000
2 posts
🟠 CVE-2026-28224 - High (8.2)
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28224/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28224 - High (8.2)
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when the server receives an op_crypt_key_callback packet without prior authentication, the port_server_crypt_callback handler is not in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28224/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T19:21:14.907000
1 posts
🟠 CVE-2026-6359 - High (8.8)
Use after free in Video in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T19:19:48.317000
1 posts
🟠 CVE-2026-6363 - High (8.8)
Type Confusion in V8 in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6363/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T19:16:37.763000
2 posts
🟠 CVE-2026-40170 - High (7.5)
ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.22.1, ngtcp2_qlog_parameters_set_transport_params() serializes peer transport parameters into a fixed 1024-byte stack buffer without bounds checking. When qlog is enabl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40170/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40170 - High (7.5)
ngtcp2 is a C implementation of the IETF QUIC protocol. In versions prior to 1.22.1, ngtcp2_qlog_parameters_set_transport_params() serializes peer transport parameters into a fixed 1024-byte stack buffer without bounds checking. When qlog is enabl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40170/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T19:16:36.223000
2 posts
🟠 CVE-2026-33337 - High (7.5)
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33337/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33337 - High (7.5)
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when deserializing a slice packet, the xdr_datum() function does not validate that a cstring length conforms to the slice descriptor bo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33337/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T19:16:35.180000
2 posts
🟠 CVE-2026-28212 - High (7.5)
Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info(...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28212/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-28212 - High (7.5)
Firebird is an open-source relational database management system. In versions prior to 6.0.0, 5.0.4, 4.0.7 and 3.0.14, when processing an op_slice network packet, the server passes an unprepared structure containing a null pointer to the SDL_info(...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28212/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T19:16:34.993000
2 posts
🟠 CVE-2026-27890 - High (8.2)
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27890 - High (8.2)
Firebird is an open-source relational database management system. In versions prior to 5.0.4, 4.0.7 and 3.0.14, when processing CNCT_specific_data segments during authentication, the server assumes segments arrive in strictly ascending order. If s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T19:08:02.587000
1 posts
🟠 CVE-2026-6316 - High (8.8)
Use after free in Forms in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6316/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T18:32:56
4 posts
1 repos
🚨 CRITICAL SQL injection (CVE-2026-37749) in CodeAstro Simple Attendance Management System v1.0: Remote unauthenticated attackers can bypass authentication via index.php. Restrict access & deploy WAFs until a patch arrives. https://radar.offseq.com/threat/cve-2026-37749-na-c4c6e5dc #OffSeq #SQLi #Infosec
##🔴 CVE-2026-37749 - Critical (9.8)
A SQL injection vulnerability in CodeAstro Simple Attendance Management System v1.0 allows remote unauthenticated attackers to bypass authentication via the username parameter in index.php.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37749/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL SQL injection (CVE-2026-37749) in CodeAstro Simple Attendance Management System v1.0: Remote unauthenticated attackers can bypass authentication via index.php. Restrict access & deploy WAFs until a patch arrives. https://radar.offseq.com/threat/cve-2026-37749-na-c4c6e5dc #OffSeq #SQLi #Infosec
##🔴 CVE-2026-37749 - Critical (9.8)
A SQL injection vulnerability in CodeAstro Simple Attendance Management System v1.0 allows remote unauthenticated attackers to bypass authentication via the username parameter in index.php.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37749/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T18:32:55
1 posts
🟠 CVE-2026-6305 - High (8.8)
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6305/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T18:32:05
2 posts
🟠 CVE-2026-5718 - High (8.1)
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.3.9.6. This is due to insufficient file type validation that occurs when custom blacklist typ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5718/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5718 - High (8.1)
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file upload in versions up to, and including, 1.3.9.6. This is due to insufficient file type validation that occurs when custom blacklist typ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5718/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T18:31:54
2 posts
🟠 CVE-2026-5710 - High (7.5)
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary File Read in versions up to and including 1.3.9.6. This is due to the plugin using client-supplied mfile[] POST val...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5710/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5710 - High (7.5)
The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Path Traversal leading to Arbitrary File Read in versions up to and including 1.3.9.6. This is due to the plugin using client-supplied mfile[] POST val...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5710/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T18:31:53
2 posts
🟠 CVE-2026-3464 - High (8.8)
The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in the 'ajax_attach_file' function in all versions up to, and including, 8.3.4. This makes it possible for authent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3464 - High (8.8)
The WP Customer Area plugin for WordPress is vulnerable to arbitrary file read and deletion due to insufficient file path validation in the 'ajax_attach_file' function in all versions up to, and including, 8.3.4. This makes it possible for authent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T18:31:53
2 posts
🟠 CVE-2026-40516 - High (8.3)
OpenHarness before commit bd4df81 contains a server-side request forgery vulnerability in the web_fetch and web_search tools that allows attackers to access private and localhost HTTP services by manipulating tool parameters without proper valida...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40516/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40516 - High (8.3)
OpenHarness before commit bd4df81 contains a server-side request forgery vulnerability in the web_fetch and web_search tools that allows attackers to access private and localhost HTTP services by manipulating tool parameters without proper valida...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40516/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T18:31:53
2 posts
🟠 CVE-2026-40515 - High (7.5)
OpenHarness before commit bd4df81 contains a permission bypass vulnerability that allows attackers to read sensitive files by exploiting incomplete path normalization in the permission checker. Attackers can invoke the built-in grep and glob tool...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40515 - High (7.5)
OpenHarness before commit bd4df81 contains a permission bypass vulnerability that allows attackers to read sensitive files by exploiting incomplete path normalization in the permission checker. Attackers can invoke the built-in grep and glob tool...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T18:31:52
4 posts
⚠️ CRITICAL: CVE-2026-6284 hits Horner Automation Cscape v10.0 PLCs. Weak passwords & no input limits allow attackers to brute force access remotely. No patch yet — restrict access, monitor logins, & harden networks. https://radar.offseq.com/threat/cve-2026-6284-cwe-521-in-horner-automation-cscape-17ab7886 #OffSeq #ICS #OTSecurity #Infosec
##🔴 CVE-2026-6284 - Critical (9.1)
An attacker with network access to the PLC is able to brute force discover passwords to gain unauthorized access to systems and services. The limited password complexity and no password input limiters makes brute force password enumeration possible.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6284/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: CVE-2026-6284 hits Horner Automation Cscape v10.0 PLCs. Weak passwords & no input limits allow attackers to brute force access remotely. No patch yet — restrict access, monitor logins, & harden networks. https://radar.offseq.com/threat/cve-2026-6284-cwe-521-in-horner-automation-cscape-17ab7886 #OffSeq #ICS #OTSecurity #Infosec
##🔴 CVE-2026-6284 - Critical (9.1)
An attacker with network access to the PLC is able to brute force discover passwords to gain unauthorized access to systems and services. The limited password complexity and no password input limiters makes brute force password enumeration possible.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6284/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T17:26:50.993000
1 posts
🟠 CVE-2026-6309 - High (8.3)
Use after free in Viz in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6309/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:42:44.730000
2 posts
🔴 CVE-2026-6296 - Critical (9.6)
Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6296/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-6296 - Critical (9.6)
Heap buffer overflow in ANGLE in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6296/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:41:01.207000
1 posts
🟠 CVE-2026-6301 - High (8.8)
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:38:09.243000
2 posts
🟠 CVE-2026-33435 - High (8)
Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33435/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33435 - High (8)
Weblate is a web based localization tool. In versions prior to 5.17, the project backup didn't filter Git and Mercurial configuration files which could lead to remote code execution under certain circumstances. This issue has been fixed in version...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33435/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:38:09.243000
2 posts
🔴 CVE-2026-40322 - Critical (9)
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the DOM via innerHTML. This allows attacker-control...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40322/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40322 - Critical (9)
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, Mermaid diagrams are rendered with securityLevel set to "loose", and the resulting SVG is injected into the DOM via innerHTML. This allows attacker-control...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40322/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:38:09.243000
2 posts
⚠️ CVE-2026-31843: CRITICAL improper access control in goodoneuz/pay-uz <=2.2.24 allows unauthenticated PHP file overwrite & RCE via /payment/api/editable/update. No patch yet — restrict endpoint access! https://radar.offseq.com/threat/cve-2026-31843-cwe-284-improper-access-control-lea-f84d8bc9 #OffSeq #CVE202631843 #Laravel #RCE
##🔴 CVE-2026-31843 - Critical (9.8)
The goodoneuz/pay-uz Laravel package (<= 2.2.24) contains a critical vulnerability in the /payment/api/editable/update endpoint that allows unauthenticated attackers to overwrite existing PHP payment hook files. The endpoint is exposed via Rout...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-31843/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:38:09.243000
1 posts
1 repos
HAProxy HTTP/3 -> HTTP/1 Desync: Cross-Protocol Smuggling via a Standalone QUIC FIN (CVE-2026-33555) https://r3verii.github.io/cve/2026/04/14/haproxy-h3-standalone-fin-smuggling.html
##updated 2026-04-17T15:38:09.243000
1 posts
🟠 CVE-2026-30656 - High (7.5)
A NULL pointer dereference vulnerability exists in fio (Flexible I/O Tester) v3.41 when parsing job files containing the fdp_pli option. The callback function str_fdp_pli_cb() does not validate the input pointer and calls strdup() on a NULL value ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30656/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:38:09.243000
1 posts
3 repos
https://github.com/terminat0r7031/composer-CVE-2026-40261-CVE-2026-40176-PoC
https://github.com/daptheHuman/cve-2026-40176-cve-2026-40261
🟠 CVE-2026-40176 - High (7.8)
Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::generateP4Command() method, which constructs shell commands by interpolating user-supplied Perfo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40176/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:38:09.243000
1 posts
🟠 CVE-2026-40193 - High (8.2)
maddy is a composable, all-in-one mail server. Versions prior to 0.9.3 contain an LDAP injection vulnerability in the auth.ldap module where user-supplied usernames are interpolated into LDAP search filters and DN strings via strings.ReplaceAll() ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40193/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:38:09.243000
2 posts
🚨 CVE-2026-40504: Critical heap-based buffer overflow in Creolabs Gravity (<0.9.6). Attackers could achieve RCE via malicious scripts. No patch yet — avoid untrusted input & monitor for updates. https://radar.offseq.com/threat/cve-2026-40504-cwe-122-heap-based-buffer-overflow--7b35deb9 #OffSeq #CVE202640504 #infosec
##🔴 CVE-2026-40504 - Critical (9.8)
Creolabs Gravity before 0.9.6 contains a heap buffer overflow vulnerability in the gravity_vm_exec function that allows attackers to write out-of-bounds memory by crafting scripts with many string literals at global scope. Attackers can exploit in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40504/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:38:09.243000
1 posts
⚠️ CVE-2026-6349: CRITICAL OS command injection in HGiga iSherlock-base-4.5 (CVSS 10). Unauthenticated attackers can execute commands — full system compromise possible. No patch confirmed. Restrict access & monitor! https://radar.offseq.com/threat/cve-2026-6349-cwe-78-improper-neutralization-of-sp-76bba57a #OffSeq #Vuln #Infosec
##updated 2026-04-17T15:38:09.243000
1 posts
🟠 CVE-2026-6351 - High (7.5)
MailGates/MailAudit developed by Openfind has a CRLF Injection vulnerability, allowing unauthenticated remote attackers to exploit this vulnerability to read system files.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6351/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:31:27
2 posts
🟠 CVE-2026-6507 - High (7.5)
A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability by sending a specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet to a dnsmasq server configured with the `--dhcp-split-relay` option. This ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6507 - High (7.5)
A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability by sending a specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet to a dnsmasq server configured with the `--dhcp-split-relay` option. This ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6507/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:29:25.583000
2 posts
🟠 CVE-2026-40262 - High (8.7)
Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which does not identify text-based formats such as HTML...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40262/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40262 - High (8.7)
Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which does not identify text-based formats such as HTML...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40262/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:17:00.957000
1 posts
🔴 CVE-2026-6270 - Critical (9.1)
@fastify/middie versions 9.3.1 and earlier do not register inherited middleware directly on child plugin engine instances. When a Fastify application registers authentication middleware in a parent scope and then registers child plugins with @FAST...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6270/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:17:00.957000
1 posts
Dell has three high-severity advisories today:
- CVE-2026-23772: Security Update for Dell Storage Manager - Replay Manager for Microsoft Servers Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000453020/dsa-2026-058-security-update-for-dell-storage-manager-replay-manager-for-microsoft-servers-vulnerabilities
- Several CVEs: Security Update for Dell Connectrix B-Series SANnav Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000453015/dsa-2026-171-security-update-for-dell-connectrix-b-series-sannav-vulnerabilities
- Several CVEs: Security Update for Dell Secure Connect Gateway Policy Manager Multiple Third-Party Component Vulnerabilities https://www.dell.com/support/kbdoc/en-us/000441138/dsa-2026-120-security-update-for-dell-secure-connect-gateway-policy-manager-multiple-third-party-component-vulnerabilities #Dell #infosec #vulnerability
##updated 2026-04-17T15:15:09.790000
1 posts
⛔ New security advisory:
CVE-2026-37338 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-37338-simple-music-cloud-sql-injection-unauthenticated
updated 2026-04-17T15:11:35.840000
1 posts
2 repos
Fortinet Reports Critical Unauthenticated Vulnerabilities in FortiSandbox Platform
Fortinet reports two critical vulnerabilities in FortiSandbox (CVE-2026-39808 and CVE-2026-39813) that allow unauthenticated remote attackers to execute commands or bypass authentication via crafted HTTP requests.
**If you run FortiSandbox, make sure it is isolated from the internet and accessible from trusted networks only, then update immediately to version 4.4.9+ or 5.0.6+ depending on your branch. Until you update, restrict API access to trusted IP addresses only. It's a Fortinet product, it will be actively attacked.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/fortinet-reports-critical-unauthenticated-vulnerabilities-in-fortisandbox-platform-o-m-k-n-l/gD2P6Ple2L
updated 2026-04-17T15:10:35.607000
1 posts
🟠 CVE-2026-32163 - High (7.8)
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32163/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:10:35.607000
1 posts
🟠 CVE-2026-32168 - High (7.8)
Improper input validation in Azure Monitor Agent allows an authorized attacker to elevate privileges locally.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32168/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:10:35.607000
1 posts
🟠 CVE-2026-32183 - High (7.8)
Improper neutralization of special elements used in a command ('command injection') in Windows Snipping Tool allows an unauthorized attacker to execute code locally.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32183/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:09:46.880000
3 posts
🔴 CVE-2026-20186 - Critical (9.9)
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-20186 - Critical (9.9)
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20186/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New.
Cisco has a number of listings today, three of them critical.
- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL
- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ
- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv
More: https://sec.cloudapps.cisco.com/security/center/publicationListing.x @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-17T15:09:46.880000
5 posts
🔴 CVE-2026-20184 - Critical (9.8)
A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service.
This vulnerability existed because of imprope...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20184/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New Episode: SANS Stormcast Friday, April 17th, 2026: DVRs Again; Cisco Again; Windows Defender Again; Sonatype
Shownotes:
Compromised DVRs and Finding Them in the Wild
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild/32886
Cisco ISE RCE Vulnerability and WebEx Auth Bypass CVE-2026-20184 CVE-2026-20180
AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans
Or Listen right here.
##🔴 CVE-2026-20184 - Critical (9.8)
A vulnerability in the integration of single sign-on (SSO) with Control Hub in Cisco Webex Services could have allowed an unauthenticated, remote attacker to impersonate any user within the service.
This vulnerability existed because of imprope...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20184/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Cisco Webex – CVE-2026-20184 : cette faille critique nécessite une action de l’admin https://www.it-connect.fr/cisco-webex-cve-2026-20184-cette-faille-critique-necessite-une-action-de-ladmin/ #ActuCybersécurité #Vulnérabilités #Cybersécurité #Cisco
##New.
Cisco has a number of listings today, three of them critical.
- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL
- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ
- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv
More: https://sec.cloudapps.cisco.com/security/center/publicationListing.x @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-17T15:09:46.880000
4 posts
🔴 CVE-2026-20180 - Critical (9.9)
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New Episode: SANS Stormcast Friday, April 17th, 2026: DVRs Again; Cisco Again; Windows Defender Again; Sonatype
Shownotes:
Compromised DVRs and Finding Them in the Wild
https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Compromised%20DVRs%20and%20Finding%20Them%20in%20the%20Wild/32886
Cisco ISE RCE Vulnerability and WebEx Auth Bypass CVE-2026-20184 CVE-2026-20180
AntennaPod | Anytime Player | Apple Podcasts | Castamatic | CurioCaster | Fountain | gPodder | Overcast | Pocket Casts | Podcast Addict | Podcast Guru | Podnews | Podverse | Truefans
Or Listen right here.
##🔴 CVE-2026-20180 - Critical (9.9)
A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20180/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##New.
Cisco has a number of listings today, three of them critical.
- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL
- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ
- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv
More: https://sec.cloudapps.cisco.com/security/center/publicationListing.x @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-17T15:08:01.337000
2 posts
🟠 CVE-2026-4857 - High (8.4)
IdentityIQ 8.5, all
IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ
8.4 patch levels prior to 8.4p4 allow authenticated users assigned the Debug
Pages Read Only capability or any custom capability with the ViewAccess...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4857 - High (8.4)
IdentityIQ 8.5, all
IdentityIQ 8.5 patch levels prior to 8.5p2, IdentityIQ 8.4, and all IdentityIQ
8.4 patch levels prior to 8.4p4 allow authenticated users assigned the Debug
Pages Read Only capability or any custom capability with the ViewAccess...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4857/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:08:01.337000
2 posts
🟠 CVE-2026-35569 - High (8.7)
ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in SEO-related fields (SEO Title and Meta Description), where user-controlled input is rendered withou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35569 - High (8.7)
ApostropheCMS is an open-source Node.js content management system. Versions 4.28.0 and prior contain a stored cross-site scripting vulnerability in SEO-related fields (SEO Title and Meta Description), where user-controlled input is rendered withou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T15:07:18.050000
2 posts
🟠 CVE-2026-23775 - High (7.6)
Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD OS) of Feature Release versions 8.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.10 contain an insertion of sensitive information into log file vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23775/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23775 - High (7.6)
Dell PowerProtect Data Domain appliances with Data Domain Operating System (DD OS) of Feature Release versions 8.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.10 contain an insertion of sensitive information into log file vulnerabil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23775/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T09:31:26
2 posts
🟠 CVE-2026-23853 - High (8.4)
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain a use of weak c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23853/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23853 - High (8.4)
Dell PowerProtect Data Domain with Data Domain Operating System (DD OS) of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain a use of weak c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23853/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T09:31:25
2 posts
🟠 CVE-2025-36568 - High (7.8)
Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain an insufficiently protected credential...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-36568/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-36568 - High (7.8)
Dell PowerProtect Data Domain BoostFS for client of Feature Release versions 7.7.1.0 through 8.5, LTS2025 release version 8.3.1.0 through 8.3.1.20, LTS2024 release versions 7.13.1.0 through 7.13.1.50, contain an insufficiently protected credential...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-36568/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T09:31:19
2 posts
🚨 CVE-2026-33392: HIGH severity RCE in JetBrains YouTrack < 2025.3.131383. High privileged users can bypass sandbox for remote code execution. No patch yet — restrict admin rights & monitor advisories. https://radar.offseq.com/threat/cve-2026-33392-cwe-1336-in-jetbrains-youtrack-3a31f8ef #OffSeq #YouTrack #Infosec #Vuln
##🚨 CVE-2026-33392: HIGH severity RCE in JetBrains YouTrack < 2025.3.131383. High privileged users can bypass sandbox for remote code execution. No patch yet — restrict admin rights & monitor advisories. https://radar.offseq.com/threat/cve-2026-33392-cwe-1336-in-jetbrains-youtrack-3a31f8ef #OffSeq #YouTrack #Infosec #Vuln
##updated 2026-04-17T09:31:18
6 posts
⚠️ CRITICAL: CVE-2026-6443 in WordPress Accordion & Accordion Slider v1.4.6 — embedded backdoor enables persistent access & spam injection. Remove/disable the plugin ASAP. No patch yet. https://radar.offseq.com/threat/cve-2026-6443-cwe-506-embedded-malicious-code-in-e-b2b69859 #OffSeq #WordPress #CVE20266443 #Infosec
##🚨 CVE-2026-6443 (CRITICAL): WordPress Accordion & Accordion Slider v1.4.6 embeds a backdoor (CWE-506), enabling persistent unauthorized access & spam. No patch — remove or disable plugin now! https://radar.offseq.com/threat/cve-2026-6443-cwe-506-embedded-malicious-code-in-e-b2b69859 #OffSeq #WordPress #Infosec #Vuln
##🔴 CVE-2026-6443 - Critical (9.8)
The Accordion and Accordion Slider plugin for WordPress is vulnerable to an injected backdoor in version 1.4.6. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6443/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: CVE-2026-6443 in WordPress Accordion & Accordion Slider v1.4.6 — embedded backdoor enables persistent access & spam injection. Remove/disable the plugin ASAP. No patch yet. https://radar.offseq.com/threat/cve-2026-6443-cwe-506-embedded-malicious-code-in-e-b2b69859 #OffSeq #WordPress #CVE20266443 #Infosec
##🚨 CVE-2026-6443 (CRITICAL): WordPress Accordion & Accordion Slider v1.4.6 embeds a backdoor (CWE-506), enabling persistent unauthorized access & spam. No patch — remove or disable plugin now! https://radar.offseq.com/threat/cve-2026-6443-cwe-506-embedded-malicious-code-in-e-b2b69859 #OffSeq #WordPress #Infosec #Vuln
##🔴 CVE-2026-6443 - Critical (9.8)
The Accordion and Accordion Slider plugin for WordPress is vulnerable to an injected backdoor in version 1.4.6. This is due to the plugin being sold to a malicious threat actor that embedded a backdoor in all of the plugin's they acquired. This ma...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6443/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T09:31:18
2 posts
🟠 CVE-2026-4659 - High (7.5)
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRel...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4659/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4659 - High (7.5)
The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRel...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4659/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T06:31:14
2 posts
CVE-2026-21719: HIGH severity OS command injection in CubeCart <6.6.0. Authenticated admins can run arbitrary OS commands. No patch yet — restrict admin access & monitor logs. https://radar.offseq.com/threat/cve-2026-21719-improper-neutralization-of-special--543f1327 #OffSeq #CubeCart #Vuln #Infosec
##CVE-2026-21719: HIGH severity OS command injection in CubeCart <6.6.0. Authenticated admins can run arbitrary OS commands. No patch yet — restrict admin access & monitor logs. https://radar.offseq.com/threat/cve-2026-21719-improper-neutralization-of-special--543f1327 #OffSeq #CubeCart #Vuln #Infosec
##updated 2026-04-17T06:31:14
2 posts
🟠 CVE-2026-3605 - High (8.1)
An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3605/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3605 - High (8.1)
An authenticated user with access to a kvv2 path through a policy containing a glob may be able to delete secrets they were not authorized to read or write, resulting in denial-of-service. This vulnerability did not allow a malicious user to delet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3605/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T06:31:08
2 posts
🟠 CVE-2026-5807 - High (7.5)
Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot. This prevents legitimate operators...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5807/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-5807 - High (7.5)
Vault is vulnerable to a denial-of-service condition where an unauthenticated attacker can repeatedly initiate or cancel root token generation or rekey operations, occupying the single in-progress operation slot. This prevents legitimate operators...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5807/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T06:31:08
2 posts
🟠 CVE-2026-4525 - High (7.5)
If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4525 - High (7.5)
If a Vault auth mount is configured to pass through the "Authorization" header, and the "Authorization" header is used to authenticate to Vault, Vault forwarded the Vault token to the auth plugin backend. Fixed in 2.0.0, 1.21.5, 1.20.10, and 1.19.16.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T03:30:52
2 posts
🟠 CVE-2026-22734 - High (8.6)
Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected systems. This vulnerability exists when SAML 2.0 bearer assertions are enabled for a client, as the UAA accepts SA...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22734/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22734 - High (8.6)
Cloud Foundry UUA is vulnerable to a bypass that allows an attacker to obtain a token for any user and gain access to UAA-protected systems. This vulnerability exists when SAML 2.0 bearer assertions are enabled for a client, as the UAA accepts SA...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22734/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-17T00:31:10
2 posts
🟠 CVE-2026-41113 - High (8.1)
sagredo qmail before 2026.04.07 allows tls_quit remote code execution because of popen in notlshosts_auto in qmail-remote.c.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41113/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41113 - High (8.1)
sagredo qmail before 2026.04.07 allows tls_quit remote code execution because of popen in notlshosts_auto in qmail-remote.c.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41113/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T22:16:37.433000
8 posts
2 repos
Critical nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
A critical vulnerability identified as CVE-2026-33032 is drawing urgent attention from the cybersecurity community due to its role in enabling a...
🔗️ [Thecyberexpress] https://link.is.it/wkIJDC
##nginx-ui CVE-2026-33032: the /mcp endpoint had auth, /mcp_message didn't. One missing check = full server takeover. As tools rush to add MCP support, expect more of these gaps. - https://thehackernews.com/2026/04/critical-nginx-ui-vulnerability-cve.html
##Critical nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
A critical vulnerability identified as CVE-2026-33032 is drawing urgent attention from the cybersecurity community due to its role in enabling a...
🔗️ [Thecyberexpress] https://link.is.it/wkIJDC
##nginx-ui CVE-2026-33032: the /mcp endpoint had auth, /mcp_message didn't. One missing check = full server takeover. As tools rush to add MCP support, expect more of these gaps. - https://thehackernews.com/2026/04/critical-nginx-ui-vulnerability-cve.html
##📢 CVE-2026-33032 : Authentification manquante dans Nginx UI exploitée in the wild
📝 ## 🔍 Contexte
Rapid7 a publié le 16 avril 2026 une alerte de sécurité concernant **CVE-2026-33032**, une vulnérabilité crit...
📖 cyberveille : https://cyberveille.ch/posts/2026-04-16-cve-2026-33032-authentification-manquante-dans-nginx-ui-exploitee-in-the-wild/
🌐 source : https://www.rapid7.com/blog/post/etr-cve-2026-33032-nginx-ui-missing-mcp-authentication/
#CVE_2026_33032 #IOC #Cyberveille
⚠️ CRITICAL: Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover
CVE-2026-33032 is a critical authentication bypass in nginx-ui that allows unauthenticated attackers to modify Nginx configurations and take over the service completely. An estimated 2,689 vulnerable instances remain exposed globally and active exploitation is confirmed in the wild. Any unpatched n…
##Critical nginx-ui Vulnerability CVE-2026-33032 Under Active Exploitation
nginx-ui patched a critical authentication bypass (CVE-2026-33032) in its MCP integration that allows unauthenticated attackers to take over Nginx services and intercept traffic. The flaw is actively exploited in the wild and affects over 2,600 internet-exposed instances.
**Make sure your nginx-ui instances are isolated from the internet and accessible from trusted networks only. Then update nginx-ui to version 2.3.4 or later to patch CVE-2026-33032, and change the IP whitelist default from allow-all to deny-all so only trusted addresses can reach the management interface.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-nginx-ui-vulnerability-cve-2026-33032-under-active-exploitation-8-1-q-l-8/gD2P6Ple2L
Actively Exploited nginx-ui Flaw (CVE-2026-33032) Enables Full Nginx Server Takeover https://thehackernews.com/2026/04/critical-nginx-ui-vulnerability-cve.html
##updated 2026-04-16T21:57:38
1 posts
🟠 CVE-2026-40245 - High (7.5)
Free5GC is an open-source Linux Foundation project for 5th generation (5G) mobile core networks. Versions 4.2.1 and below contain an information disclosure vulnerability in the UDR (Unified Data Repository) service. The handler for GET /nudr-dr/v2...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40245/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T21:55:08
1 posts
2 repos
https://github.com/terminat0r7031/composer-CVE-2026-40261-CVE-2026-40176-PoC
https://github.com/daptheHuman/cve-2026-40176-cve-2026-40261
🟠 CVE-2026-40261 - High (8.8)
Composer is a dependency manager for PHP. Versions 1.0 through 2.2.26 and 2.3 through 2.9.5 contain a command injection vulnerability in the Perforce::syncCodeBase() method, which appends the $sourceReference parameter to a shell command without p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40261/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T21:49:17
16 posts
7 repos
https://github.com/hg0434hongzh0/CVE-2026-34197
https://github.com/keraattin/CVE-2026-34197
https://github.com/dinosn/CVE-2026-34197
https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197
https://github.com/0xBlackash/CVE-2026-34197
https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE
CISA Warns of Active Exploitation in Apache ActiveMQ Jolokia API Vulnerability
CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.
**If you're running Apache ActiveMQ, upgrade to version 5.19.4 or 6.2.3 ASAP. Atackers are actively exploiting this right now. While you're at it, make sure your ActiveMQ console is not exposed to the internet, change any default admin:admin credentials, and disable the Jolokia endpoint entirely if you don't need it.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-in-apache-activemq-jolokia-api-vulnerability-i-v-s-d-e/gD2P6Ple2L
CRITICAL: Apache ActiveMQ RCE vuln (CVE-2026-34197) disclosed. No patch yet — review your security posture & monitor vendor channels for updates. Remote attackers could fully compromise systems. https://radar.offseq.com/threat/recent-apache-activemq-vulnerability-exploited-in--98176e07 #OffSeq #ActiveMQ #Vuln #InfoSec
##An Anthropic researcher used Claude to find Apache ActiveMQ flaw CVE-2026-34197. Maintainers shipped the fix in seven days. CISA added the CVE to its federal exploited-vulnerability list. The same week, Cal.com closed source citing AI scanners as the reason. I have run defender-side tooling rollouts for 20 years. Every wave gets framed as attacker-only for six months first. One team shipped the patch. The other shipped the excuse.
##New KEV added 🚨
CVE-2026-34197 (Apache ActiveMQ)
• Active exploitation confirmed
• High-risk entry point
KEV = patch now, not later
💬 How fast is your patch cycle?
Follow @technadu
⚠️ CRITICAL: CVE-2026-34197 is a remote code execution vuln in Apache ActiveMQ. No patch or confirmed exploitation yet. Monitor vendor advisories & apply security best practices. Details: https://radar.offseq.com/threat/recent-apache-activemq-vulnerability-exploited-in--98176e07 #OffSeq #ApacheActiveMQ #Vuln #Infosec
##THE POSTHOLE
Friday, 17 April 2026 · Overnight Edition · Vol. 1 No. 128
MJD 61147.37
SECURITY
▸ NIST Limits CVE Enrichment After 263% Surge in Vulnerability Submissions
-- The Hacker News
The National Institute of Standards and Technology (NIST) has announced changes to the way it handles cybersecurity...
▸ Operation PowerOFF Seizes 53 DDoS Domains, Exposes 3 Million Criminal Accounts
-- The Hacker News
▸ Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
-- The Hacker News
#infosec #cybersecurity #posthole
TECHNOLOGY
▸ 500 Lines or Less: A Python Interpreter Written in Python
-- Lobsters
Comments
▸ Demystifying assemblers
-- Lobsters
▸ A history of teapots and UNIX
-- Lobsters
IN BRIEF
• Microsoft: Some Windows servers enter reboot loops after April patches -- BleepingComputer
• Man gets 30 months for selling thousands of hacked DraftKings accounts -- BleepingComputer
• Recently leaked Windows zero-days now exploited in attacks -- BleepingComputer
• AWS Launches Agent Registry in Preview to Govern AI Agent Sprawl Across Enterprises -- InfoQ
• Operation PowerOFF identifies 75k DDoS users, takes down 53 domains -- BleepingComputer
SECTIONS
Tech Talk: Capita won disastrous UK pensions gig after acing performance... #tech
Account Avoidance: My dog pops in to check up on me every two hours. #opensource
Politics Fightbox: Open Thread #politics
Gaming Greatness: Trails in the Sky 2nd Chapter launches September 17 #gaming
Music Hotline: Olivia Rodrigo – “Drop Dead” #music
Guns Galore: TFB Review: Blk Lbl - Quality You Can Feel #firearms
Science Showcase: Former deputy surgeon general Erica Schwartz nominated as new... #science
Delicious Dining: braised leeks and lentils with arugula and yogurt #food
Fascination Station: Chevelon Creek Bridge in Winslow, Arizona #culture
Podcast Pack: Rusty Fears 7 - Clunk by Nairis Santini #podcast
Full broadsheet: https://posthole.net/
##Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html
Read on HackerWorkspace: https://hackerworkspace.com/article/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation
##CISA Warns of Active Exploitation in Apache ActiveMQ Jolokia API Vulnerability
CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.
**If you're running Apache ActiveMQ, upgrade to version 5.19.4 or 6.2.3 ASAP. Atackers are actively exploiting this right now. While you're at it, make sure your ActiveMQ console is not exposed to the internet, change any default admin:admin credentials, and disable the Jolokia endpoint entirely if you don't need it.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-in-apache-activemq-jolokia-api-vulnerability-i-v-s-d-e/gD2P6Ple2L
CRITICAL: Apache ActiveMQ RCE vuln (CVE-2026-34197) disclosed. No patch yet — review your security posture & monitor vendor channels for updates. Remote attackers could fully compromise systems. https://radar.offseq.com/threat/recent-apache-activemq-vulnerability-exploited-in--98176e07 #OffSeq #ActiveMQ #Vuln #InfoSec
##An Anthropic researcher used Claude to find Apache ActiveMQ flaw CVE-2026-34197. Maintainers shipped the fix in seven days. CISA added the CVE to its federal exploited-vulnerability list. The same week, Cal.com closed source citing AI scanners as the reason. I have run defender-side tooling rollouts for 20 years. Every wave gets framed as attacker-only for six months first. One team shipped the patch. The other shipped the excuse.
##New KEV added 🚨
CVE-2026-34197 (Apache ActiveMQ)
• Active exploitation confirmed
• High-risk entry point
KEV = patch now, not later
💬 How fast is your patch cycle?
Follow @technadu
⚠️ CRITICAL: CVE-2026-34197 is a remote code execution vuln in Apache ActiveMQ. No patch or confirmed exploitation yet. Monitor vendor advisories & apply security best practices. Details: https://radar.offseq.com/threat/recent-apache-activemq-vulnerability-exploited-in--98176e07 #OffSeq #ApacheActiveMQ #Vuln #Infosec
##Apache ActiveMQ CVE-2026-34197 Added to CISA KEV Amid Active Exploitation
https://thehackernews.com/2026/04/apache-activemq-cve-2026-34197-added-to.html
Read on HackerWorkspace: https://hackerworkspace.com/article/apache-activemq-cve-2026-34197-added-to-cisa-kev-amid-active-exploitation
##🚨 [CISA-2026:0416] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0416)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-34197 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- Name: Apache ActiveMQ Improper Input Validation Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Apache
- Product: ActiveMQ
- Notes: https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt ; https://nvd.nist.gov/vuln/detail/CVE-2026-34197
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260416 #cisa20260416 #cve_2026_34197 #cve202634197
##CVE ID: CVE-2026-34197
Vendor: Apache
Product: ActiveMQ
Date Added: 2026-04-16
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-34197
New.
CISA has updated the KEV catalogue:
- CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-34197 #CISA #Apache
Cisco:
Cisco has updated a vulnerability that was listed yesterday:
- CVE-2026-20152: Cisco Secure Web Appliance Authentication Bypass Vulnerability (medium severity) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-auth-bypass-6YZkTQhd @TalosSecurity #Cisco
ASUS:
ASUS has posted two advisories for CVE-2026-3428 and CVE-2026-1880 https://www.asus.com/security-advisory/ #ASUS #infosec #vulnerability
##updated 2026-04-16T21:41:16
2 posts
🔴 CVE-2025-41118 - Critical (9.1)
Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS).
If the database is configured to use Tencent COS as the storage backend, an attacker could ex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41118/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-41118 - Critical (9.1)
Pyroscope is an open-source continuous profiling database. The database supports various storage backends, including Tencent Cloud Object Storage (COS).
If the database is configured to use Tencent COS as the storage backend, an attacker could ex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-41118/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T21:33:30
2 posts
🟠 CVE-2026-6290 - High (8)
Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token. This allows an authenticated GUI user with access in one org, to use the query() plugin, in a no...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6290/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6290 - High (8)
Velociraptor versions prior to 0.76.3 contain a vulnerability in the query() plugin which allows access to all orgs with the user's current ACL token. This allows an authenticated GUI user with access in one org, to use the query() plugin, in a no...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6290/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T21:32:15
1 posts
updated 2026-04-16T21:32:14
1 posts
updated 2026-04-16T21:31:19
1 posts
🟠 CVE-2026-6442 - High (8.3)
Improper validation of bash commands in Snowflake Cortex Code CLI versions prior to 1.0.25 allowed subsequent commands to execute outside the sandbox. An attacker could exploit this by embedding specially crafted commands in untrusted content, suc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6442/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T21:31:11
2 posts
⚠️ CRITICAL: wolfSSL Vulnerability Hits IoT, Routers and Military Systems, Update to 5.9.1 Now
Critical vulnerability CVE-2026-5194 in wolfSSL allows attackers to forge digital certificates by bypassing signature verification across ECDSA, DSA, ML-DSA, ED25519, and ED448 algorithms. Affects approximately 5 billion devices including IoT, routers, and military systems. Legacy devices unlikely…
##wolfSSL Patches Critical Certificate Forgery Vulnerability Affecting Billions of Devices
wolfSSL version 5.9.1 patched a critical flaw (CVE-2026-5194) that allows attackers to use forged certificates to impersonate trusted servers.
**If you use devices or software built on wolfSSL (common in IoT, routers, industrial controllers, and embedded systems), make sure they are isolated from the internet and accessible from trusted networks only, then check with your device vendor for firmware updates that include wolfSSL version 5.9.1 to patch CVE-2026-5194. Be aware that older or unsupported devices may never get this fix, so network isolation and monitoring are your only protection for those.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/wolfssl-patches-critical-certificate-forgery-vulnerability-affecting-billions-of-devices-d-z-4-g-0/gD2P6Ple2L
updated 2026-04-16T21:08:08
1 posts
🔴 CVE-2026-40173 - Critical (9.4)
Dgraph is an open source distributed GraphQL database. Versions 25.3.1 and prior contain an unauthenticated credential disclosure vulnerability where the /debug/pprof/cmdline endpoint is registered on the default mux and reachable without authenti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40173/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T20:43:50
2 posts
🟠 CVE-2026-34393 - High (8.8)
Weblate is a web based localization tool. In versions prior to 5.17, the user patching API endpoint didn't properly limit the scope of edits. This issue has been fixed in version 5.17.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34393/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34393 - High (8.8)
Weblate is a web based localization tool. In versions prior to 5.17, the user patching API endpoint didn't properly limit the scope of edits. This issue has been fixed in version 5.17.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34393/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T20:43:12
2 posts
🟠 CVE-2026-34242 - High (7.7)
Weblate is a web based localization tool. In versions prior to 5.17, the ZIP download feature didn't verify downloaded files, potentially following symlinks outside the repository. This issue has been fixed in version 5.17.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34242 - High (7.7)
Weblate is a web based localization tool. In versions prior to 5.17, the ZIP download feature didn't verify downloaded files, potentially following symlinks outside the repository. This issue has been fixed in version 5.17.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34242/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T18:32:28
1 posts
FuelCMS doesn't validate the Host header on password reset requests.
Spoof it, trigger a reset for a valid user, and the app sends them a legitimate-looking email with your server in the link. They click. You get the token.
PTT-2025-029 / CVE-2026-30459, CVSS 7.1 High. No fix coming (vendor's been quiet for ~4 years).
Full PoC: https://pentest-tools.com/research
updated 2026-04-16T18:31:28
1 posts
🚨 CRITICAL: CVE-2026-5426 in Digital Knowledge KnowledgeDeliver (pre-Feb 2026) allows RCE via hard-coded ASP.NET machineKey & ViewState. No patch yet. Restrict access & monitor for ViewState abuse. https://radar.offseq.com/threat/cve-2026-5426-cwe-321-use-of-hard-coded-cryptograp-c04eb03f #OffSeq #Vuln #AppSec #InfoSec
##updated 2026-04-16T15:32:35
2 posts
🔴 CVE-2026-30993 - Critical (9.8)
Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the session() function at config.php. This vulnerability is exploitable via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-30993 - Critical (9.8)
Slah CMS v1.5.0 and below was discovered to contain a remote code execution (RCE) vulnerability in the session() function at config.php. This vulnerability is exploitable via a crafted input.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T15:31:44
1 posts
🟠 CVE-2026-3324 - High (8.2)
Zohocorp ManageEngine Log360 versions 13000 through 13013 are vulnerable to authentication bypass on certain actions due to improper filter configuration.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3324/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T15:31:44
1 posts
🟠 CVE-2026-5785 - High (8.1)
Zohocorp ManageEngine PAM360 versions before 8531 and ManageEngine Password Manager Pro versions from 8600 to 13230 are vulnerable to Authenticated SQL injection in the query report module.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5785/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T15:31:33
1 posts
🟠 CVE-2026-22619 - High (7.8)
Eaton Intelligent Power Protector (IPP) is affected by insecure library loading in its executable, which could lead to arbitrary code execution by an attacker with access to the software package. This security issue has been fixed in the latest v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22619/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T12:32:42
1 posts
🟠 CVE-2026-6319 - High (7.5)
Use after free in Payments in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6319/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T12:31:47
1 posts
🟠 CVE-2026-3489 - High (7.5)
The DirectoryPress – Business Directory And Classified Ad Listing plugin for WordPress is vulnerable to SQL Injection via the 'packages' parameter in versions up to, and including, 3.6.26 due to insufficient escaping on the user supplied paramet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3489/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T12:31:41
1 posts
🟠 CVE-2026-6308 - High (7.5)
Out of bounds read in Media in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6308/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T12:31:41
1 posts
🟠 CVE-2026-6318 - High (8.8)
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6318/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T12:31:40
1 posts
🟠 CVE-2026-6306 - High (8.8)
Heap buffer overflow in PDFium in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6306/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T12:31:40
1 posts
🟠 CVE-2026-6303 - High (8.8)
Use after free in Codecs in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6303/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T09:31:50
1 posts
🟠 CVE-2025-14868 - High (8.8)
The Career Section plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Path Traversal and Arbitrary File Deletion in all versions up to, and including, 1.6. This is due to missing nonce validation and insufficient file path...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-14868/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T07:16:29.787000
1 posts
🟠 CVE-2026-1620 - High (8.8)
The Livemesh Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 9.0. This is due to insufficient sanitization of the template name parameter in the `lae_get_template_part()` functi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-1620/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T06:31:29
2 posts
🔴 CVE-2026-3596 - Critical (9.8)
The Riaxe Product Customizer plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.2. The plugin registers an unauthenticated AJAX action ('wp_ajax_nopriv_install-imprint') that maps to the ink_pd_add...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3596/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-3596 (CRITICAL): imprintnext Riaxe Product Customizer ≤2.1.2 lets unauthenticated users update WordPress options, enabling privilege escalation (admin creation). Disable or update plugin ASAP! https://radar.offseq.com/threat/cve-2026-3596-cwe-862-missing-authorization-in-imp-80944579 #OffSeq #WordPress #Infosec #Vulnerability
##updated 2026-04-16T06:31:29
1 posts
🟠 CVE-2026-3614 - High (8.8)
The AcyMailing plugin for WordPress is vulnerable to privilege escalation in all versions From 9.11.0 up to, and including, 10.8.1 due to a missing capability check on the `wp_ajax_acymailing_router` AJAX handler. This makes it possible for authen...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3614/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T06:31:29
1 posts
🟠 CVE-2026-5050 - High (7.5)
The Payment Gateway for Redsys & WooCommerce Lite plugin for WordPress is vulnerable to Improper Verification of Cryptographic Signature in versions up to, and including, 7.0.0 due to successful_request() handlers calculating a local signature but...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5050/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T06:16:17.063000
1 posts
🟠 CVE-2026-3599 - High (7.5)
The Riaxe Product Customizer plugin for WordPress is vulnerable to SQL Injection via the 'options' parameter keys within 'product_data' of the /wp-json/InkXEProductDesignerLite/add-item-to-cart REST API endpoint in all versions up to, and includin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3599/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T03:31:15
2 posts
🔴 CVE-2026-6350 - Critical (9.8)
MailGates/MailAudit developed by Openfind has a Stack-based Buffer Overflow vulnerability, allowing unauthenticated remote attackers to control the program's execution flow and execute arbitrary code.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-6350 in Openfind MailGates 6.0 & 5.0 — stack-based buffer overflow enables unauthenticated RCE. No mitigation yet. Restrict exposure & watch for updates. https://radar.offseq.com/threat/cve-2026-6350-cwe-121-stack-based-buffer-overflow--d51a62db #OffSeq #MailGates #CVE20266350 #infosec
##updated 2026-04-16T03:31:14
1 posts
1 repos
New.
CISA has updated the KEV catalogue:
- CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-34197 #CISA #Apache
Cisco:
Cisco has updated a vulnerability that was listed yesterday:
- CVE-2026-20152: Cisco Secure Web Appliance Authentication Bypass Vulnerability (medium severity) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-auth-bypass-6YZkTQhd @TalosSecurity #Cisco
ASUS:
ASUS has posted two advisories for CVE-2026-3428 and CVE-2026-1880 https://www.asus.com/security-advisory/ #ASUS #infosec #vulnerability
##updated 2026-04-16T03:31:13
1 posts
🟠 CVE-2026-40960 - High (8.1)
Luanti 5 before 5.15.2 sometimes allows unintended access to an insecure environment. If at least one mod is listed as secure.trusted_mods or secure.http_mods, then a crafted mod can intercept the request for the insecure environment or HTTP API, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40960/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T03:31:13
1 posts
🔴 CVE-2026-40959 - Critical (9.3)
Luanti 5 before 5.15.2, when LuaJIT is used, allows a Lua sandbox escape via a crafted mod.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40959/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T03:31:12
1 posts
New.
CISA has updated the KEV catalogue:
- CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-34197 #CISA #Apache
Cisco:
Cisco has updated a vulnerability that was listed yesterday:
- CVE-2026-20152: Cisco Secure Web Appliance Authentication Bypass Vulnerability (medium severity) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-auth-bypass-6YZkTQhd @TalosSecurity #Cisco
ASUS:
ASUS has posted two advisories for CVE-2026-3428 and CVE-2026-1880 https://www.asus.com/security-advisory/ #ASUS #infosec #vulnerability
##updated 2026-04-16T03:31:12
2 posts
🔴 CRITICAL: CVE-2026-6348 in Simopro WinMatrix 3.5.13 lets local authenticated users execute code as SYSTEM. No patch yet — restrict access & monitor usage. Details: https://radar.offseq.com/threat/cve-2026-6348-cwe-306-missing-authentication-for-c-2cb15b3d #OffSeq #CVE20266348 #Infosec #Vulnerability
##🟠 CVE-2026-6348 - High (8.8)
WinMatrix agent developed by Simopro Technology has a Missing Authentication vulnerability, allowing authenticated local attackers to execute arbitrary code with SYSTEM privileges on the local machine as well as on all hosts within the environment...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T03:31:12
1 posts
🟠 CVE-2026-40502 - High (8.8)
OpenHarness prior to commit dd1d235 contains a command injection vulnerability that allows remote gateway users with chat access to invoke sensitive administrative commands by exploiting insufficient distinction between local-only and remote-safe ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40502/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-16T01:03:26
1 posts
🔥 CRITICAL vuln: @fastify/express ≤4.0.4 (CVE-2026-33807) lets attackers bypass Express middleware (auth, rate limiting, more) via path handling bug. Upgrade to 4.0.5+ ASAP! https://radar.offseq.com/threat/cve-2026-33807-cwe-436-interpretation-conflict-in--e2fb5055 #OffSeq #CVE202633807 #NodeJS #AppSec
##updated 2026-04-16T00:54:15
2 posts
🔴 CVE-2026-6388 - Critical (9.1)
A flaw was found in ArgoCD Image Updater. This vulnerability allows an attacker, with permissions to create or modify an ImageUpdater resource in a multi-tenant environment, to bypass namespace boundaries. By exploiting insufficient validation, th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6388/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-6388 in Red Hat OpenShift GitOps (CVSS 9.1) lets attackers with ImageUpdater access bypass namespace boundaries in multi-tenant setups. Restrict permissions & monitor changes. No patch yet — see https://radar.offseq.com/threat/cve-2026-6388-insufficient-granularity-of-access-c-fbeba818 #OffSeq #RedHat #GitOps #Vuln
##updated 2026-04-16T00:54:15
2 posts
🔴 CVE-2026-4880 - Critical (9.8)
The Barcode Scanner (+Mobile App) – Inventory manager, Order fulfillment system, POS (Point of Sale) plugin for WordPress is vulnerable to privilege escalation via insecure token-based authentication in all versions up to, and including, 1.11.0....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4880/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-4880 (CRITICAL, CVSS 9.8): ukrsolution Barcode Scanner (+Mobile App) plugin for WordPress lets unauthenticated attackers gain admin access via insecure Base64 token handling. Remove or disable plugin until patched. https://radar.offseq.com/threat/cve-2026-4880-cwe-269-improper-privilege-managemen-a28ccef6 #OffSeq #WordPress #CVE2026_4880
##updated 2026-04-15T21:31:21
2 posts
🟠 CVE-2026-30996 - High (7.5)
An issue in the file handling logic of the component download.php of SAC-NFe v2.0.02 allows attackers to execute a directory traversal and read arbitrary files from the system via a crafted GET request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30996/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30996 - High (7.5)
An issue in the file handling logic of the component download.php of SAC-NFe v2.0.02 allows attackers to execute a directory traversal and read arbitrary files from the system via a crafted GET request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30996/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:31:21
2 posts
🟠 CVE-2026-30994 - High (7.5)
Incorrect access control in the config.php component of Slah v1.5.0 and below allows unauthenticated attackers to access sensitive information, including active session credentials.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30994/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30994 - High (7.5)
Incorrect access control in the config.php component of Slah v1.5.0 and below allows unauthenticated attackers to access sensitive information, including active session credentials.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30994/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:30
1 posts
🟠 CVE-2026-22676 - High (7.8)
Barracuda RMM versions prior to 2025.2.2 contain a privilege escalation vulnerability that allows local attackers to gain SYSTEM-level privileges by exploiting overly permissive filesystem ACLs on the C:\Windows\Automation directory. Attackers ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22676/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:26
1 posts
🟠 CVE-2026-6315 - High (8.8)
Use after free in Permissions in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6315/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:25
2 posts
🟠 CVE-2026-34632 - High (8.2)
Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in arbitrary code execution in the context of the current user. A low-privileged local attacker could have exploited this vulnerab...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34632 - High (8.2)
Adobe Photoshop Installer was affected by an Uncontrolled Search Path Element vulnerability that could have resulted in arbitrary code execution in the context of the current user. A low-privileged local attacker could have exploited this vulnerab...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:25
2 posts
🟠 CVE-2026-6300 - High (8.8)
Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6300/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6300 - High (8.8)
Use after free in CSS in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6300/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:25
2 posts
🟠 CVE-2026-6299 - High (8.8)
Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6299/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6299 - High (8.8)
Use after free in Prerender in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6299/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:25
2 posts
🟠 CVE-2026-6297 - High (8.3)
Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6297/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6297 - High (8.3)
Use after free in Proxy in Google Chrome prior to 147.0.7727.101 allowed an attacker in a privileged network position to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6297/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:25
1 posts
🟠 CVE-2026-6311 - High (8.3)
Uninitialized Use in Accessibility in Google Chrome on Windows prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity:...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6311/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:25
1 posts
🟠 CVE-2026-6310 - High (8.3)
Use after free in Dawn in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6310/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:20
1 posts
🟠 CVE-2026-6317 - High (8.8)
Use after free in Cast in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6317/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:20
1 posts
🟠 CVE-2026-6360 - High (8.8)
Use after free in FileSystem in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6360/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:20
1 posts
🟠 CVE-2026-6358 - High (8.8)
Use after free in XR in Google Chrome on Android prior to 147.0.7727.101 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6358/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:19
2 posts
🟠 CVE-2026-6307 - High (8.8)
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6307/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6307 - High (8.8)
Type Confusion in Turbofan in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6307/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:19
1 posts
🟠 CVE-2026-6304 - High (8.3)
Use after free in Graphite in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6304/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:19
1 posts
🟠 CVE-2026-6302 - High (8.8)
Use after free in Video in Google Chrome prior to 147.0.7727.101 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6302/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T21:30:19
1 posts
🟠 CVE-2026-6314 - High (8.3)
Out of bounds write in GPU in Google Chrome prior to 147.0.7727.101 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6314/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T20:40:26
2 posts
🟠 CVE-2026-40318 - High (8.5)
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enfo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40318/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40318 - High (8.5)
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and prior, the /api/av/removeUnusedAttributeView endpoint constructs a filesystem path using the user-controlled id parameter without validation or path boundary enfo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40318/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T18:32:04
2 posts
🟠 CVE-2026-30995 - High (8.6)
Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerability via the id parameter in the vereador_ver.php endpoint.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30995 - High (8.6)
Slah CMS v1.5.0 and below was discovered to contain a SQL injection vulnerability via the id parameter in the vereador_ver.php endpoint.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30995/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T18:32:04
2 posts
🟠 CVE-2026-6372 - High (7.5)
Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept Cryptocurrencies with Plisio: from n/a through 2.0.5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6372/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6372 - High (7.5)
Missing Authorization vulnerability in Plisio Accept Cryptocurrencies with Plisio allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Accept Cryptocurrencies with Plisio: from n/a through 2.0.5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6372/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-15T18:32:04
1 posts
New.
CISA has updated the KEV catalogue:
- CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-34197 #CISA #Apache
Cisco:
Cisco has updated a vulnerability that was listed yesterday:
- CVE-2026-20152: Cisco Secure Web Appliance Authentication Bypass Vulnerability (medium severity) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-auth-bypass-6YZkTQhd @TalosSecurity #Cisco
ASUS:
ASUS has posted two advisories for CVE-2026-3428 and CVE-2026-1880 https://www.asus.com/security-advisory/ #ASUS #infosec #vulnerability
##updated 2026-04-15T18:32:04
1 posts
New.
Cisco has a number of listings today, three of them critical.
- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL
- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ
- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv
More: https://sec.cloudapps.cisco.com/security/center/publicationListing.x @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-15T18:32:03
1 posts
New.
Cisco has a number of listings today, three of them critical.
- CVE-2026-20184: Cisco Webex Services Certificate Validation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-cui-cert-8jSZYhWL
- CVE-2026-20147-CVE-2026-20148: Cisco Identity Services Engine Remote Code Execution and Path Traversal Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-traversal-8bYndVrZ
- CVE-2026-20180; CVE-2026-20186: Cisco Identity Services Engine Remote Code Execution Vulnerabilities https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-rce-4fverepv
More: https://sec.cloudapps.cisco.com/security/center/publicationListing.x @TalosSecurity #Cisco #infosec #vulnerability
##updated 2026-04-15T00:35:42.020000
2 posts
OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554) https://aisle.com/blog/opensips-sql-injection-aisle-deep-dive-sql-injection-authentication-bypass
##OpenSIPS SQL Injection to Authentication Bypass (CVE-2026-25554) https://aisle.com/blog/opensips-sql-injection-aisle-deep-dive-sql-injection-authentication-bypass
##updated 2026-04-15T00:35:42.020000
2 posts
Attackers target unpatched ShowDoc servers via CVE-2025-0520 https://securityaffairs.com/190790/hacking/attackers-target-unpatched-showdoc-servers-via-cve-2025-0520.html
##ShowDoc Document Management Platform Targeted by Active RCE Exploitation
ShowDoc is facing active exploitation of a critical unauthenticated remote code execution vulnerability (CVE-2025-0520) caused by improper file upload validation. Attackers are using this flaw to deploy web shells and gain full control over unpatched servers.
**If you're running ShowDoc, update it to version 2.8.7 or higher immediately. This flaw has been patched since 2020 but attackers are actively exploiting unpatched instances. Then check your image upload folders for any suspicious PHP files that shouldn't be there, and make sure ShowDoc is not exposed to the internet.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/showdoc-document-management-platform-targeted-by-active-rce-exploitation-9-h-s-m-4/gD2P6Ple2L
updated 2026-04-14T23:27:56
1 posts
🟠 CVE-2026-32178 - High (7.5)
Improper neutralization of special elements in .NET allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32178/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-14T21:59:48
2 posts
we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius. https://www.periphery.security/blog/cve-2026-33155---40-bytes-to-chaos
##we found a memory exhaustion CVE in a library downloaded 29 million times a month. AWS, DataHub, and Lightning AI are in the blast radius. https://www.periphery.security/blog/cve-2026-33155---40-bytes-to-chaos
##updated 2026-04-14T18:30:55
1 posts
Microsoft Flickentag 2026-04: Fast Rekord!
Mit 165 oder 167 (je nach Zählung) geflickten Sicherheitslücken in Microsofts (MS) eigenen Produkten ist dieser der zweitgrößte Flickentag aller Zeiten. Wenn man die von Chromium geerbten Sicherheitslücken im Browser Edge hinzurechnet, kommt man auf 243 Sicherheitslücken. Puh. Von den 165 eigenen Sicherheitslücken stuft MS 8 als kritisch ein und 154 als wichtig. Fehlen noch drei? Ja, die sind nur als mittleres Risiko (moderat) eingestuft. Auch ein Flicken gegen die vorab veröffentlichte Sicherheitslücke im MS Defender ist enthalten.
Eine Sicherheitslücke, CVE-2026-32201 in MS Groupware SharePoint, wird bereits aktiv für
https://www.pc-fluesterer.info/wordpress/2026/04/15/microsoft-flickentag-2026-04-fast-rekord/
#Hintergrund #Warnung #exploits #Microsoft #office #unplugMicrosoft #UnplugTrump #windows #word
##updated 2026-04-14T18:30:52
4 posts
1 repos
https://github.com/Letlaka/redsun-bluehammer-undefend-detection-pack
CVE-2026-33825 deep-dive: The researcher commented out the full credential dump. Here's what that means. https://nefariousplan.com/posts/bluhammer/
##"Two zero-days still waiting for a patch" CVE-2026-33825 is patched www.bleepingcomputer.com/news/securit... "On Thursday, Huntress Labs security researchers reported seeing all three zero-day exploits deployed in the wild, with the BlueHammer vulnerability being exploited since April 10." #cybersec
Recently leaked Windows zero-d...
CVE-2026-33825 deep-dive: The researcher commented out the full credential dump. Here's what that means. https://nefariousplan.com/posts/bluhammer/
##Fully exploitable Windows Defender vulnerability with full source code public for >8 days no CVE assigned so far (BlueHammer).
Writeup: https://hackingpassion.com/bluehammer-windows-defender-zero-day/
Full source code: https://github.com/Nightmare-Eclipse/BlueHammer
/cc @bsi Was ist eigentlich der "Prozess" für vollständig öffentliche Lücken zu denen es seit über einer Woche noch nicht einmal eine CVE Nummer gibt?
Edit: Patch and CVE number CVE-2026-33825 available by now. Took 6 days though.
##updated 2026-04-14T18:30:52
1 posts
1 repos
Microsoft dropped two wormable bugs in this month's Patch Tuesday. CVE-2026-33824 is a double free in the Windows IKE extension that lets an unauthorised attacker execute code over the network.
No auth needed, no user interaction. ZDI gave it two "bugs of the month" labels in the same release because both the IKE and TCP/IP flaws are wormable.
1/2
##updated 2026-04-14T18:30:51
2 posts
CVE-2026-33829: How a Deep Link in Windows Can Expose Net-NTLM Credentials https://core-jmp.org/2026/04/cve-2026-33829-how-a-deep-link-in-windows-can-expose-net-ntlm-credentials/
##CVE-2026-33829: How a Deep Link in Windows Can Expose Net-NTLM Credentials https://core-jmp.org/2026/04/cve-2026-33829-how-a-deep-link-in-windows-can-expose-net-ntlm-credentials/
##updated 2026-04-14T18:30:51
1 posts
🟠 CVE-2026-32164 - High (7.8)
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows User Interface Core allows an authorized attacker to elevate privileges locally.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32164/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-14T18:30:51
1 posts
🟠 CVE-2026-32171 - High (8.8)
Insufficiently protected credentials in Azure Logic Apps allows an authorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32171/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-14T18:30:49
1 posts
⚠️ CVE-2026-27245: CRITICAL XSS in Adobe Connect (v2025.3, 12.10 & earlier). Allows malicious JS via crafted URLs — risk of session hijack. No patch yet. Monitor Adobe advisories, apply input filtering if possible. https://radar.offseq.com/threat/cve-2026-27245-cross-site-scripting-reflected-xss--e445a643 #OffSeq #AdobeConnect #XSS
##updated 2026-04-14T18:30:43
1 posts
🟠 CVE-2026-32162 - High (8.4)
Acceptance of extraneous untrusted data with trusted data in Windows COM allows an unauthorized attacker to elevate privileges locally.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-14T18:30:42
1 posts
🟠 CVE-2026-32158 - High (7.8)
Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Push Notifications allows an authorized attacker to elevate privileges locally.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32158/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-14T18:30:42
1 posts
🟠 CVE-2026-32157 - High (8.8)
Use after free in Remote Desktop Client allows an unauthorized attacker to execute code over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-14T18:30:42
1 posts
🟠 CVE-2026-32165 - High (7.8)
Use after free in Windows User Interface Core allows an authorized attacker to elevate privileges locally.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32165/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-14T18:30:41
1 posts
Fortinet Reports Critical Unauthenticated Vulnerabilities in FortiSandbox Platform
Fortinet reports two critical vulnerabilities in FortiSandbox (CVE-2026-39808 and CVE-2026-39813) that allow unauthenticated remote attackers to execute commands or bypass authentication via crafted HTTP requests.
**If you run FortiSandbox, make sure it is isolated from the internet and accessible from trusted networks only, then update immediately to version 4.4.9+ or 5.0.6+ depending on your branch. Until you update, restrict API access to trusted IP addresses only. It's a Fortinet product, it will be actively attacked.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/fortinet-reports-critical-unauthenticated-vulnerabilities-in-fortisandbox-platform-o-m-k-n-l/gD2P6Ple2L
updated 2026-04-14T14:44:19.867000
1 posts
2 repos
updated 2026-04-14T14:21:18.670000
1 posts
2 repos
New. There's more, but this is getting too long.
Zscaler: Payouts King Takes Aim at the Ransomware Throne https://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throne
Picus: CVE-2026-21643: Critical SQL Injection in Fortinet FortiClient EMS Exploited in the Wild https://www.picussecurity.com/resource/blog/cve-2026-21643-critical-sql-injection-in-fortinet-forticlient-ems-exploited-in-the-wild
Microsoft: Dissecting Sapphire Sleet’s macOS intrusion from lure to compromise https://www.microsoft.com/en-us/security/blog/2026/04/16/dissecting-sapphire-sleets-macos-intrusion-from-lure-to-compromise/
Sohos: QEMU abused to evade detection and enable ransomware delivery https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery @SophosXOps
Sekoia: From APT28 to RePythonNET: automating .NET malware analysis https://blog.sekoia.io/apt28-to-repythonnet-automating-net-malware-analysis/ @sekoia_io
Proopoint: Beyond the breach: inside a cargo theft actor’s post-compromise playbook https://www.proofpoint.com/us/blog/threat-insight/beyond-breach-inside-cargo-theft-actors-post-compromise-playbook
Group-IB: W3LL Unmasked https://www.group-ib.com/blog/w3ll-phishing-ecosystem-takedown/
Posted yesterday:
Halcyon: 44% and Rising: What the Automotive Industry's Ransomware Problem Tells Us About Where Attacks Are Heading https://www.halcyon.ai/blog/44-percent-and-rising-automotive-ransomware #infosec #threatresearch #ransomware #threatintel #threatintelligence #Python #Fortinet #SQL #Apple #macOS #Microsoft #cybercrime
##updated 2026-04-13T18:31:44
1 posts
5 repos
https://github.com/ercihan/CVE-2026-34621
https://github.com/KeulenR01/Remediate-AdobeAcrobat-CVE-2026-34621
https://github.com/NULL200OK/cve_2026_34621_advanced
Adobe releases April 2026 patches for multiple products
Adobe's April 2026 security update patches critical and important vulnerabilities across 11 product families, including arbitrary code execution, privilege escalation, and file system read flaws. One Acrobat prototype pollution vulnerability (CVE-2026-34621) is confirmed as actively exploited in the wild. Affected products include Acrobat/Reader, ColdFusion, InDesign, Connect, FrameMaker, Bridge, Photoshop, InCopy, Illustrator, and others, and users are urged to update immediately.
**If you use any Adobe products, prioritize updating Adobe Acrobat and Reader immediately since one of the vulnerabilities (CVE-2026-34621) is already being exploited in the wild, then update the rest of your Adobe software. Start with ColdFusion and Connect, which have critical flaws scoring above 9.0. If you can't update right away, avoid opening untrusted PDF files and restrict access to ColdFusion and Connect servers until patches are applied.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/adobe-releases-april-2026-patches-for-multiple-products-d-d-q-r-f/gD2P6Ple2L
updated 2026-04-10T21:32:47
2 posts
🟠 CVE-2026-40259 - High (8.1)
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler pass...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40259 - High (8.1)
SiYuan is an open-source personal knowledge management system. In versions 3.6.3 and below, the /api/av/removeUnusedAttributeView endpoint is protected only by generic authentication that accepts publish-service RoleReader tokens. The handler pass...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-09T19:06:18
5 posts
4 repos
https://github.com/0xBlackash/CVE-2026-39987
https://github.com/mki9/CVE-2026-39987_exploit
Marimo is a Python notebook used in AI toolchains. It was exploited 9 hours 41 minutes after CVE-2026-39987 disclosure. Sysdig published the telemetry. Full remote takeover, no login required. The patch shipped with the advisory. Most shops do not have weekend on-call for a Python notebook. By Sunday morning the command-and-control traffic was already 14 hours deep. Patch window is shorter than one night of sleep. On-call SLA is the new budget line.
##Marimo RCE Exploited Within Days: Attackers Deploy NKAbuse Malware via Trusted AI Platforms
A Critical Flaw Ignites a Rapid Cyber Offensive In early April 2026, a severe security vulnerability shook the developer and AI community. Just three days after its public disclosure on April 8, attackers had already moved from awareness to active exploitation. The flaw, identified as CVE-2026-39987, targeted the Marimo Python notebook platform and allowed attackers to execute…
##CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace | Sysdig
Read on HackerWorkspace: https://hackerworkspace.com/article/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface-sysdig
##Marimo is a Python notebook used in AI toolchains. It was exploited 9 hours 41 minutes after CVE-2026-39987 disclosure. Sysdig published the telemetry. Full remote takeover, no login required. The patch shipped with the advisory. Most shops do not have weekend on-call for a Python notebook. By Sunday morning the command-and-control traffic was already 14 hours deep. Patch window is shorter than one night of sleep. On-call SLA is the new budget line.
##CVE-2026-39987 update: How attackers weaponized marimo to deploy a blockchain botnet via HuggingFace | Sysdig
Read on HackerWorkspace: https://hackerworkspace.com/article/cve-2026-39987-update-how-attackers-weaponized-marimo-to-deploy-a-blockchain-botnet-via-huggingface-sysdig
##updated 2026-04-06T15:30:27.887000
1 posts
Malcolm v26.04.1 contains improvements, bug fixes, security updates, and component bumps.
If you are upgrading from an existing Malcolm installation, run ./scripts/status for Malcolm to migrate some settings prior to running ./scripts/configure, ./scripts/start, or other Malcolm control scripts.
Note that v26.04.1 is the same as v26.04.0 released last week, apart from the fix for bug #943. If you're already running v26.04.0 and don't use the encrypted install option in the installer ISO, you probably don't need to worry about updating to v26.04.1. The full release notes from v26.04.0 are also included here.
ssl_certificate_verification setting [https://github.com/cisagov/Malcolm/issues/915]./config/). The Malcolm control script (e.g., ./scripts/status, ./scripts/start) automatically handles creation and migration of variables according to ./config/env-var-actions.yml.ARKIME_PCAP_LIBPCAP to arkime.env should uses wish to revert to older libpcap mode for PCAP file processing rather than faster scheme processing (default false)FILEBEAT_SCANNER_FINGERPRINT_LENGTH's default in filescan.env has been changed from 1024 to 512redis.env has been renamed to valkey.env and its variables also have been renamed accordinglySTRELKA_SCANNERS has been added to pipeline.env for #935ZEEK_DISABLE_SPICY_ZIP has been added to zeek.env for #922 (default true)Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #Zeek #Arkime #Strelka #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL
##updated 2026-03-27T22:07:43
1 posts
Malcolm v26.04.1 contains improvements, bug fixes, security updates, and component bumps.
If you are upgrading from an existing Malcolm installation, run ./scripts/status for Malcolm to migrate some settings prior to running ./scripts/configure, ./scripts/start, or other Malcolm control scripts.
Note that v26.04.1 is the same as v26.04.0 released last week, apart from the fix for bug #943. If you're already running v26.04.0 and don't use the encrypted install option in the installer ISO, you probably don't need to worry about updating to v26.04.1. The full release notes from v26.04.0 are also included here.
ssl_certificate_verification setting [https://github.com/cisagov/Malcolm/issues/915]./config/). The Malcolm control script (e.g., ./scripts/status, ./scripts/start) automatically handles creation and migration of variables according to ./config/env-var-actions.yml.ARKIME_PCAP_LIBPCAP to arkime.env should uses wish to revert to older libpcap mode for PCAP file processing rather than faster scheme processing (default false)FILEBEAT_SCANNER_FINGERPRINT_LENGTH's default in filescan.env has been changed from 1024 to 512redis.env has been renamed to valkey.env and its variables also have been renamed accordinglySTRELKA_SCANNERS has been added to pipeline.env for #935ZEEK_DISABLE_SPICY_ZIP has been added to zeek.env for #922 (default true)Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #Zeek #Arkime #Strelka #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL
##updated 2026-03-23T15:31:40
4 posts
5 repos
https://github.com/jeffaf/cve-2026-32746
https://github.com/chosenonehacks/CVE-2026-32746
https://github.com/danindiana/cve-2026-32746-mitigation
https://github.com/watchtowrlabs/watchtowr-vs-telnetd-CVE-2026-32746
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs https://labs.watchtowr.com/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746/
##CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8) https://pwn.guide/free/other/cve-2026-32746
##A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746) - watchTowr Labs https://labs.watchtowr.com/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746/
##CVE-2026-32746 GNU telnetd Buffer Overflow PoC - Critical (9.8) https://pwn.guide/free/other/cve-2026-32746
##updated 2026-03-18T20:20:40
2 posts
1 repos
CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store https://blog.securelayer7.net/cve-2026-22730-sql-injection-spring-ai-mariadb/
##CVE-2026-22730: SQL Injection in Spring AI’s MariaDB Vector Store https://blog.securelayer7.net/cve-2026-22730-sql-injection-spring-ai-mariadb/
##updated 2026-03-18T20:20:27
2 posts
CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore https://blog.securelayer7.net/cve-2026-22729-jsonpath-injection-spring-ai-pgvectorstore/
##CVE-2026-22729: JSONPath Injection in Spring AI’s PgVectorStore https://blog.securelayer7.net/cve-2026-22729-jsonpath-injection-spring-ai-pgvectorstore/
##updated 2026-03-18T04:17:30.720000
2 posts
6 repos
https://github.com/fevar54/CVE-2026-3888-POC-all-from-the-Qualys-platform.
https://github.com/TheCyberGeek/CVE-2026-3888-snap-confine-systemd-tmpfiles-LPE
https://github.com/Many-Hat-Group/Ubuntu-CVE-2026-3888-patcher
https://github.com/netw0rk7/CVE-2026-3888-PoC
Ubtuntu 24.04+ Snapd Local Privilege Escalation (CVE-2026-3888) https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root
##Ubtuntu 24.04+ Snapd Local Privilege Escalation (CVE-2026-3888) https://blog.qualys.com/vulnerabilities-threat-research/2026/03/17/cve-2026-3888-important-snap-flaw-enables-local-privilege-escalation-to-root
##updated 2026-02-23T22:28:06
1 posts
Malcolm v26.04.1 contains improvements, bug fixes, security updates, and component bumps.
If you are upgrading from an existing Malcolm installation, run ./scripts/status for Malcolm to migrate some settings prior to running ./scripts/configure, ./scripts/start, or other Malcolm control scripts.
Note that v26.04.1 is the same as v26.04.0 released last week, apart from the fix for bug #943. If you're already running v26.04.0 and don't use the encrypted install option in the installer ISO, you probably don't need to worry about updating to v26.04.1. The full release notes from v26.04.0 are also included here.
ssl_certificate_verification setting [https://github.com/cisagov/Malcolm/issues/915]./config/). The Malcolm control script (e.g., ./scripts/status, ./scripts/start) automatically handles creation and migration of variables according to ./config/env-var-actions.yml.ARKIME_PCAP_LIBPCAP to arkime.env should uses wish to revert to older libpcap mode for PCAP file processing rather than faster scheme processing (default false)FILEBEAT_SCANNER_FINGERPRINT_LENGTH's default in filescan.env has been changed from 1024 to 512redis.env has been renamed to valkey.env and its variables also have been renamed accordinglySTRELKA_SCANNERS has been added to pipeline.env for #935ZEEK_DISABLE_SPICY_ZIP has been added to zeek.env for #922 (default true)Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻♀️.
Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.
Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.
As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.
#Malcolm #HedgehogLinux #Zeek #Arkime #Strelka #NetBox #OpenSearch #Elasticsearch #Suricata #PCAP #NetworkTrafficAnalysis #networksecuritymonitoring #OT #ICS #icssecurity #CyberSecurity #Cyber #Infosec #INL
##updated 2026-02-10T18:30:34
2 posts
68 repos
https://github.com/r00tuser111/CVE-2026-24061
https://github.com/FurkanKAYAPINAR/CVE-2026-24061-telnet2root
https://github.com/SeptembersEND/CVE--2026-24061
https://github.com/Remnant-DB/CVE-2026-24061
https://github.com/Mr-Zapi/CVE-2026-24061
https://github.com/Alter-N0X/CVE-2026-24061-POC
https://github.com/BrainBob/Telnet-TestVuln-CVE-2026-24061
https://github.com/0p5cur/CVE-2026-24061-POC
https://github.com/XsanFlip/CVE-2026-24061-Scanner
https://github.com/obrunolima1910/CVE-2026-24061
https://github.com/h3athen/CVE-2026-24061
https://github.com/HD0x01/CVE-2026-24061-NSE
https://github.com/hyu164/Terrminus-CVE-2026-2406
https://github.com/hackingyseguridad/root
https://github.com/leonjza/inetutils-telnetd-auth-bypass
https://github.com/cumakurt/tscan
https://github.com/MY0723/GNU-Inetutils-telnet-CVE-2026-24061-
https://github.com/Gabs-hub/CVE-2026-24061_Lab
https://github.com/duy-31/CVE-2026-24061---telnetd
https://github.com/JayGLXR/CVE-2026-24061-POC
https://github.com/Parad0x7e/CVE-2026-24061
https://github.com/z3n70/CVE-2026-24061
https://github.com/killsystema/scan-cve-2026-24061
https://github.com/parameciumzhang/Tell-Me-Root
https://github.com/X-croot/CVE-2026-24061_POC
https://github.com/lavabyte/telnet-CVE-2026-24061
https://github.com/punitdarji/telnetd-cve-2026-24061
https://github.com/LucasPDiniz/CVE-2026-24061
https://github.com/yanxinwu946/CVE-2026-24061--telnetd
https://github.com/androidteacher/CVE-2026-24061-PoC-Telnetd
https://github.com/SafeBreach-Labs/CVE-2026-24061
https://github.com/Mefhika120/Ashwesker-CVE-2026-24061
https://github.com/ekomsSavior/telnet_scan
https://github.com/przemytn/CVE-2026-24061
https://github.com/TryA9ain/CVE-2026-24061
https://github.com/madfxr/Twenty-Three-Scanner
https://github.com/infat0x/CVE-2026-24061
https://github.com/ibrahmsql/CVE-2026-24061-PoC
https://github.com/scumfrog/cve-2026-24061
https://github.com/monstertsl/CVE-2026-24061
https://github.com/typeconfused/CVE-2026-24061
https://github.com/midox008/CVE-2026-24061
https://github.com/Ali-brarou/telnest
https://github.com/dotelpenguin/telnetd_CVE-2026-24061_tester
https://github.com/shivam-bathla/CVE-2026-24061-setup
https://github.com/0xBlackash/CVE-2026-24061
https://github.com/0xXyc/telnet-inetutils-auth-bypass-CVE-2026-24061
https://github.com/ridpath/Terrminus-CVE-2026-2406
https://github.com/franckferman/CVE_2026_24061
https://github.com/m3ngx1ng/cve_2026_24061_cli
https://github.com/nrnw/CVE-2026-24061-GNU-inetutils-Telnet-Detector
https://github.com/ilostmypassword/Melissae-Honeypot-Framework
https://github.com/athack-ctf/chall2026-telneted
https://github.com/BrainBob/CVE-2026-24061
https://github.com/buzz075/CVE-2026-24061
https://github.com/Chocapikk/CVE-2026-24061
https://github.com/balgan/CVE-2026-24061
https://github.com/tiborscholtz/CVE-2026-24061
https://github.com/ms0x08-dev/CVE-2026-24061-POC
https://github.com/Lingzesec/CVE-2026-24061-GUI
https://github.com/xuemian168/CVE-2026-24061
https://github.com/SystemVll/CVE-2026-24061
https://github.com/canpilayda/inetutils-telnetd-cve-2026-24061
https://github.com/0x7556/CVE-2026-24061
2026-01-14: The Day the telnet Died
"On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation."
Link: https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
#linkdump #blogpost #filtering #internet #isp #security #telnet
##2026-01-14: The Day the telnet Died
"On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation."
Link: https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/
#linkdump #blogpost #filtering #internet #isp #security #telnet
##updated 2025-12-09T16:53:25
1 posts
100 repos
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/LucasPDiniz/CVE-2025-55182
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/sumanrox/rschunter
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/timsonner/React2Shell-CVE-2025-55182
https://github.com/shyambhanushali/React2Shell
https://github.com/emredavut/CVE-2025-55182
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/snipevx/React2Shell-POC
https://github.com/rix4uni/CVE-2025-55182
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/zr0n/react2shell
https://github.com/sickwell/CVE-2025-55182
https://github.com/gensecaihq/react2shell-scanner
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
https://github.com/vulncheck-oss/cve-2025-55182
https://github.com/jctommasi/react2shellVulnApp
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/surajhacx/react2shellpoc
https://github.com/zzhorc/CVE-2025-55182
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/ynsmroztas/NextRce
https://github.com/nehkark/CVE-2025-55182
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/mrknow001/RSC_Detector
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/ZihxS/check-react-rce-cve-2025-55182
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/Archerkong/CVE-2025-55182
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/hoosin/CVE-2025-55182
https://github.com/Updatelap/CVE-2025-55182
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/hualy13/CVE-2025-55182
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/shamo0/react2shell-PoC
https://github.com/xalgord/React2Shell
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/assetnote/react2shell-scanner
https://github.com/msanft/CVE-2025-55182
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/kavienanj/CVE-2025-55182
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/theman001/CVE-2025-55182
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/BlackTechX011/React2Shell
https://github.com/alsaut1/react2shell-lab
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/hexsh1dow/CVE-2025-55182
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/Spritualkb/CVE-2025-55182-exp
2026-W14 — Weekly Threat Roundup
🔥 Critical week for supply chain attacks with React2Shell (CVE-2025-55182) exploited to harvest credentials from 766+ Next.js hosts
🎯 North Korean UNC1069 compromised Axios npm maintainer via fake Teams call, injecting malware into packages with 100M weekly downloads
🚨 European Commission breach…
updated 2025-10-14T18:30:47
2 posts
1 repos
CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit https://sec-fault.com/blog/cve-2025-59284/
##CVE-2025-59284: How reading a gnu manpage led to a Windows NetNTLM phishing exploit https://sec-fault.com/blog/cve-2025-59284/
##updated 2025-02-11T19:03:09
2 posts
CISA Warns of Active Exploitation in Apache ActiveMQ Jolokia API Vulnerability
CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.
**If you're running Apache ActiveMQ, upgrade to version 5.19.4 or 6.2.3 ASAP. Atackers are actively exploiting this right now. While you're at it, make sure your ActiveMQ console is not exposed to the internet, change any default admin:admin credentials, and disable the Jolokia endpoint entirely if you don't need it.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-in-apache-activemq-jolokia-api-vulnerability-i-v-s-d-e/gD2P6Ple2L
CISA Warns of Active Exploitation in Apache ActiveMQ Jolokia API Vulnerability
CISA added a high-severity Apache ActiveMQ vulnerability (CVE-2026-34197) to its KEV catalog due to active exploitation that allows attackers to run arbitrary OS commands via the Jolokia API. The flaw is particularly dangerous when chained with CVE-2024-32114, which enables unauthenticated remote code execution in certain versions.
**If you're running Apache ActiveMQ, upgrade to version 5.19.4 or 6.2.3 ASAP. Atackers are actively exploiting this right now. While you're at it, make sure your ActiveMQ console is not exposed to the internet, change any default admin:admin credentials, and disable the Jolokia endpoint entirely if you don't need it.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisa-warns-of-active-exploitation-in-apache-activemq-jolokia-api-vulnerability-i-v-s-d-e/gD2P6Ple2L
🟠 CVE-2025-65104 - High (7.9)
Firebird is an open-source relational database management system. In versions FB3 of the client library placed incorrect data length values into XSQLDA fields when communicating with FB4 or higher servers, resulting in an information leak. This is...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65104/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-65104 - High (7.9)
Firebird is an open-source relational database management system. In versions FB3 of the client library placed incorrect data length values into XSQLDA fields when communicating with FB4 or higher servers, resulting in an information leak. This is...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-65104/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup https://0dave.ch/posts/cve-2026-33058/
##Kanboard Authenticated SQL Injection CVE-2026-33058 Writeup https://0dave.ch/posts/cve-2026-33058/
##🟠 CVE-2026-40316 - High (8.8)
OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Versions prior to 2.1.1 contain an RCE vulnerability in the .github/workflows/regenerate-migrations.yml workflow. The work...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40316/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Gabriel Diyan, un étudiant de 2eme année découvre une faille de sécurité dans Stirling PDF (CVE-2026-33438).
"Après avoir découvert la vulnérabilité, je souhaitais expérimenter concrètement le processus de signalement…"
✅ 20/20 excellent travail 👍
##