24h | 7d | 30d

Overview

  • Google
  • Chrome

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
3.03%

Description

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 12 Posts
  • 3 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback

Außerplanmäßiges Update für #Chrome: Die Schwachstelle CVE-2026-5281 wird bereits aktiv angegriffen - 21 Sicherheitsprobleme insgesamt behoben. Jetzt updaten. winfuture.de/news,157889.html?

  • 1
  • 1
  • 1
  • 10h ago
Profile picture fallback

📊 MORNING BRIEFING (AI-FREE EDITION)

Last 24h: 257 stories detected (GrayZone: 191, Russia: 27, China: 16, FiveEyes: 15, Local: 8). 40 critical incidents flagged.

⏰ MISSING IN CZ:
• North Korea’s Lazarus Group Behind the Axios npm Supply Chain Attack... (22.6h lag)
#Cybersecurity #ITSecurity #InfoSec #CyberNews #Hacking #EthicalHackingNews Axio... (19.7h lag)
• New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released...

Read more: index.deceiver.io/story/106130

  • 0
  • 0
  • 0
  • 12h ago

Bluesky

Profile picture fallback
🛑 Patch Google Chrome La 4ème faille zero-day de l'année 2026 a été patchée dans le navigateur de Google. -> CVE-2026-5281 Le récap 👇 - www.it-connect.fr/google-corri... #Google #GoogleChrome #Web #infosec
  • 0
  • 1
  • 0
  • 12h ago
Profile picture fallback
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
~Cisa~ CISA added Google Dawn use-after-free flaw CVE-2026-5281 to its Known Exploited Vulnerabilities catalog due to active exploitation. - IOCs: CVE-2026-5281 - #CISA #CVE20265281 #ThreatIntel
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Google、Chromeの悪用確認済み ゼロデイ 脆弱性(CVE-2026-5281)含む21件を修正 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Chromeの新たなゼロデイ脆弱性CVE-2026-5281が現在悪用されていることが判明 ― パッチがリリースされました New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released #HackerNews (Apr 1) thehackernews.com/2026/04/new-...
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Apr 1) CVE-2026-5281 Google DawnのUse-After-Free脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released - https://mwyr.es/E91pHYme #thn #infosec
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released URL: thehackernews.com/2026/04/new-... Classification: Critical, Solution: Official Fix, Exploit Maturity: High, CVSSv3.1: None
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Cisco
  • Cisco Smart Software Manager On-Prem

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.17%

KEV

Description

A vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected SSM On-Prem host. This vulnerability is due to the unintentional exposure of an internal service. An attacker could exploit this vulnerability by sending a crafted request to the API of the exposed service. A successful exploit could allow the attacker to execute commands on the underlying operating system with root-level privileges.

Statistics

  • 3 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

📰 Cisco Patches Critical Unauthenticated RCE Flaw in Smart Software Manager

🔥 CRITICAL FLAW: Cisco patches a 9.8 CVSS unauthenticated RCE vulnerability (CVE-2026-20160) in its Smart Software Manager On-Prem. The flaw allows remote root access. No workarounds exist, patch immediately! #Cisco #RCE #Vulnerability #PatchNow

🔗 cyber.netsecops.io/articles/ci

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
Cisco SSM On-Prem 0-Day Alert: Critical CVE-2026-20160 Opens Root Access to Unauthenticated Attackers – Patch Now! + Video Introduction: Cisco’s Smart Software Manager On-Prem (SSM On-Prem) is a license management platform that many enterprises rely on to control Cisco product entitlements behind…
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
Cisco patches 2 critical and 6 high-severity vulnerabilities, including CVE-2026-20160 and CVE-2026-20093, affecting Smart Software Manager and password authentication, risking root access and admin takeover. #CiscoSecurity #AuthenticationBypass #USA
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Google
  • Chrome

20 Jan 2026
Published
26 Feb 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 11 hours ago

Fediverse

Profile picture fallback
[RSS] CHECK Removed, Context Confused, Checkmate Achieved

https://starlabs.sg/blog/2026/04-check-removed-context-confused-checkmate-achieved/

CVE-2026-0899
  • 0
  • 1
  • 0
  • 11h ago

Bluesky

Profile picture fallback
[RSS] CHECK Removed, Context Confused, Checkmate Achieved starlabs.sg -> CVE-2026-0899 Original->
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • F5
  • BIG-IP

15 Oct 2025
Published
31 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
41.41%

Description

When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 2 Posts

Last activity: 7 hours ago

Bluesky

Profile picture fallback
F5 BIG-IP APMの脆弱性がRCEに再分類-CVE-2025-53521は既に悪用確認 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #セキュリティ #Security #CybersecurityNews
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Over 14,000 F5 BIG-IP APM instances remain exposed online amid active exploitation of CVE-2025-53521, reclassified from DoS to remote code execution. F5 and CISA recommend system rebuilds and log checks. #CVE2025 #BIGIP #USA
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
65.08%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Bluesky

Profile picture fallback
FulcrumSec exploited CVE-2025-55182 on an unpatched AWS host to access 57 S3 buckets, exposing 23,000 insurance policyholders, $797M in premiums, driver licenses, SSNs, and proprietary ML models. #DataBreach #AWSBreach #USA
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
~Talos~ UAT-10608 exploits React2Shell (CVE-2025-55182) in Next.js apps to deploy NEXUS Listener for mass credential theft. - IOCs: 144. 172. 102. 88, 172. 86. 127. 128, 144. 172. 112. 136 - #CVE202555182 #Malware #ThreatIntel
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • nltk
  • nltk/nltk

05 Mar 2026
Published
06 Mar 2026
Updated

CVSS v3.0
CRITICAL (10.0)
EPSS
0.48%

KEV

Description

NLTK versions <=3.9.2 are vulnerable to arbitrary code execution due to improper input validation in the StanfordSegmenter module. The module dynamically loads external Java .jar files without verification or sandboxing. An attacker can supply or replace the JAR file, enabling the execution of arbitrary Java bytecode at import time. This vulnerability can be exploited through methods such as model poisoning, MITM attacks, or dependency poisoning, leading to remote code execution. The issue arises from the direct execution of the JAR file via subprocess with unvalidated classpath input, allowing malicious classes to execute when loaded by the JVM.

Statistics

  • 2 Posts
  • 3 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture fallback

Cómo un fallo en una librería de Python puede comprometer sistemas de IA (CVE-2026-0848)

blog.elhacker.net/2026/04/como

  • 0
  • 3
  • 1
  • 13h ago

Overview

  • ci4-cms-erp
  • ci4ms

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.05%

KEV

Description

CI4MS is a CodeIgniter 4-based CMS skeleton that delivers a production-ready, modular architecture with RBAC authorization and theme support. Prior to version 0.31.0.0, the application fails to properly sanitize user-controlled input when adding Pages to navigation menus through the Menu Management functionality. Page-related data selected via the Pages section is stored server-side and rendered without proper output encoding. This stored payload is later rendered unsafely within administrative interfaces and public-facing navigation menus, leading to stored DOM-based cross-site scripting (XSS). This issue has been patched in version 0.31.0.0.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-34564 (CRITICAL, CVSS 9.1): ci4ms < 0.31.0.0 vulnerable to stored XSS via Menu Management. Low-priv attackers can inject scripts, impacting admins & users. Patch & audit menus now. radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 7h ago

Overview

  • vitejs
  • vite

24 Mar 2025
Published
24 Mar 2025
Updated

CVSS v3.1
MEDIUM (5.3)
EPSS
88.96%

KEV

Description

Vite, a provider of frontend development tooling, has a vulnerability in versions prior to 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10. `@fs` denies access to files outside of Vite serving allow list. Adding `?raw??` or `?import&raw??` to the URL bypasses this limitation and returns the file content if it exists. This bypass exists because trailing separators such as `?` are removed in several places, but are not accounted for in query string regexes. The contents of arbitrary files can be returned to the browser. Only apps explicitly exposing the Vite dev server to the network (using `--host` or `server.host` config option) are affected. Versions 6.2.3, 6.1.2, 6.0.12, 5.4.15, and 4.5.10 fix the issue.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
Attempts to Exploit Exposed "Vite" Installs (CVE-2025-30208) https://isc.sans.edu/diary/32860
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • OpenSSL
  • OpenSSL

13 Mar 2026
Published
17 Mar 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client's initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to interpolate the built-in default group list into its own configuration, perhaps adding or removing specific elements, then an implementation defect causes the 'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups were treated as a single sufficiently secure 'tuple', with the server not sending a Hello Retry Request (HRR) even when a group in a more preferred tuple was mutually supported. As a result, the client and server might fail to negotiate a mutually supported post-quantum key agreement group, such as 'X25519MLKEM768', if the client's configuration results in only 'classical' groups (such as 'X25519' being the only ones in the client's initial keyshare prediction). OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS 1.3 key agreement group on TLS servers. The old syntax had a single 'flat' list of groups, and treated all the supported groups as sufficiently secure. If any of the keyshares predicted by the client were supported by the server the most preferred among these was selected, even if other groups supported by the client, but not included in the list of predicted keyshares would have been more preferred, if included. The new syntax partitions the groups into distinct 'tuples' of roughly equivalent security. Within each tuple the most preferred group included among the client's predicted keyshares is chosen, but if the client supports a group from a more preferred tuple, but did not predict any corresponding keyshares, the server will ask the client to retry the ClientHello (by issuing a Hello Retry Request or HRR) with the most preferred mutually supported group. The above works as expected when the server's configuration uses the built-in default group list, or explicitly defines its own list by directly defining the various desired groups and group 'tuples'. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary. OpenSSL 3.6 and 3.5 are vulnerable to this issue. OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released. OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released. OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
🚨 New LOW CVE detected in AWS Lambda 🚨 CVE-2026-2673 impacts openssl-fips-provider-latest in 20 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/454 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Python Software Foundation
  • CPython

16 Mar 2026
Published
16 Mar 2026
Updated

CVSS v4.0
MEDIUM (6.0)
EPSS
0.11%

KEV

Description

The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().

Statistics

  • 1 Post

Last activity: 6 hours ago

Bluesky

Profile picture fallback
🚨 New MEDIUM CVE detected in AWS Lambda 🚨 CVE-2026-3644 impacts python in 7 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/455 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 6h ago
Showing 1 to 10 of 39 CVEs