24h | 7d | 30d

Overview

  • musl-libc
  • musl

10 Apr 2026
Published
10 Apr 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
Pending

KEV

Description

An issue was discovered in musl libc 0.7.10 through 1.2.6. Stack-based memory corruption can occur during qsort of very large arrays, due to incorrectly implemented double-word primitives. The number of elements must exceed about seven million, i.e., the 32nd Leonardo number on 32-bit platforms (or the 64th Leonardo number on 64-bit platforms, which is not practical).

Statistics

  • 1 Post
  • 42 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

SECURITY ADVISORY: musl libc up through 1.2.6 (present version) is affected by CVE-2026-40200 affecting qsort with large arrays.

Unless you have a setup with at least tens of terrabytes of virtual memory, this does not affect 64-bit systems, only 32-bit ones. But all users should patch.

openwall.com/lists/musl/2026/0

  • 21
  • 21
  • 0
  • 3h ago

Overview

  • Meta
  • react-server-dom-turbopack

08 Apr 2026
Published
08 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.32%

KEV

Description

A denial of service vulnerability exists in React Server Components, affecting the following packages: react-server-dom-parcel, react-server-dom-turbopack and react-server-dom-webpack (versions 19.0.0 through 19.0.4, 19.1.0 through 19.1.5, and 19.2.0 through 19.2.4). The vulnerability is triggered by sending specially crafted HTTP requests to Server Function endpoints.The payload of the HTTP request causes excessive CPU usage for up to a minute ending in a thrown error that is catchable.

Statistics

  • 4 Posts
  • 2 Interactions

Last activity: Last hour

Bluesky

Profile picture fallback
React Server ComponentでDoSの脆弱性 "Summary of CVE-2026-23869 - Vercel" https://vercel.com/changelog/summary-of-cve-2026-23869
  • 0
  • 1
  • 0
  • 18h ago
Profile picture fallback
Summary of CVE-2026-23869 - Vercel https://vercel.com/changelog/summary-of-cve-2026-23869
  • 0
  • 1
  • 0
  • 5h ago
Profile picture fallback
React Server Components(RSC)のDoS脆弱性の修正としてNext.js 15.5.15/16.2.3とReact 19.2.5がリリースされている。 App RouterのServer Functionエンドポイントに対して、細工されたHTTPリクエストを送ることで過剰なCPU消費を引き起こせる脆弱性。 Next… "" https://vercel.com/changelog/summary-of-cve-2026-23869
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
CVE-2026-23869: React Server Components Flaw Unleashes Devastating DoS Attacks – Patch Now! + Video Introduction: React Server Components (RSC) represent a paradigm shift in modern web development, enabling server-side rendering with seamless client interactivity. However, a newly disclosed…
  • 0
  • 0
  • 0
  • Last hour

Overview

  • marimo-team
  • marimo

09 Apr 2026
Published
09 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
2.70%

KEV

Description

marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification. This vulnerability is fixed in 0.23.0.

Statistics

  • 3 Posts

Last activity: 5 hours ago

Fediverse

Profile picture fallback

A critical remote code execution (RCE) vulnerability in the Marimo notebook, CVE-2026-39987, was exploited by a threat actor just nine hours after its public disclosure. The unauthenticated flaw allows arbitrary system command execution, and the attacker successfully used it to steal credentials and exfiltrate files.
securityweek.com/critical-mari

  • 0
  • 0
  • 0
  • 5h ago

Bluesky

Profile picture fallback
A critical unauthenticated RCE in Marimo (CVE-2026-39987) was exploited just 9 hours after public disclosure via the terminal WebSocket endpoint, allowing shell access and data exfiltration. Upgrade to 0.23.0+. #MarimoExploit #RCEvulnerability
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
A critical security vulnerability (CVE-2026-39987) in the open-source Python notebook Marimo was exploited within 9 hours and 41 minutes of […]
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Apache Software Foundation
  • Apache ActiveMQ Broker
  • org.apache.activemq:activemq-broker

07 Apr 2026
Published
08 Apr 2026
Updated

CVSS
Pending
EPSS
5.60%

KEV

Description

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

Statistics

  • 2 Posts

Last activity: 5 hours ago

Fediverse

Profile picture fallback

A 13-year-old ActiveMQ RCE bug (CVE-2026-34197) was discovered and weaponized in minutes by researchers using AI, specifically Claude, highlighting the potential of AI in exploit-building. The vulnerability, which allowed arbitrary system command execution through the Jolokia API, has been fixed in newer versions of ActiveMQ Classic.
csoonline.com/article/4157146/

  • 0
  • 0
  • 0
  • 5h ago

Bluesky

Profile picture fallback
A new Phorpiex/Twizt hybrid botnet employs HTTP + P2P C2 to evade takedowns, delivering clippers and ransomware. ActiveMQ flaws including CVE-2026-34197 allow stealthy RCE. AI-aided exploits are rising. #Phorpiex #ActiveMQ #USA
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Fortinet
  • FortiClientEMS

04 Apr 2026
Published
07 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
25.26%

Description

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback

Critical Fortinet FortiClient EMS Zero-Day CVE-2026-35616 Actively Exploited — Patch Now
#CyberSecurity
securebulletin.com/critical-fo

  • 4
  • 0
  • 0
  • 10h ago

Overview

  • moby
  • moby

31 Mar 2026
Published
02 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.01%

KEV

Description

Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 11 hours ago

Bluesky

Profile picture fallback
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access https://thehackernews.com/2026/04/docker-cve-2026-34040-lets-attackers.html
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Critical Flowise RCE (CVE-2025-59528) actively exploited via CustomMCP; Docker Engine (CVE-2026-34040) & Ninja Forms (CVE-2026-0740) need patches. APT28 hijacks MikroTik/TP-Link DNS to steal Microsoft creds. #FlowiseRCE #APT28DNS #Russia
  • 0
  • 1
  • 0
  • 18h ago

Overview

  • SaturdayDrive
  • Ninja Forms - File Uploads

07 Apr 2026
Published
08 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerability was partially patched in version 3.3.25 and fully patched in version 3.3.27.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 3 hours ago

Fediverse

Bluesky

Profile picture fallback
Critical Flowise RCE (CVE-2025-59528) actively exploited via CustomMCP; Docker Engine (CVE-2026-34040) & Ninja Forms (CVE-2026-0740) need patches. APT28 hijacks MikroTik/TP-Link DNS to steal Microsoft creds. #FlowiseRCE #APT28DNS #Russia
  • 0
  • 1
  • 0
  • 18h ago

Overview

  • Pending

13 May 2008
Published
07 Aug 2024
Updated

CVSS
Pending
EPSS
2.49%

KEV

Description

OpenSSL 0.9.8c-1 up to versions before 0.9.8g-9 on Debian-based operating systems uses a random number generator that generates predictable numbers, which makes it easier for remote attackers to conduct brute force guessing attacks against cryptographic keys.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture fallback

Who still remembers the #Debian RNG patch disaster??

nvd.nist.gov/vuln/detail/cve-2

I just realized this will very soon be 18 (eighteen) years ago! 😲 Feeling old yet?

  • 0
  • 2
  • 0
  • 21h ago

Overview

  • Totolink
  • A7100RU

10 Apr 2026
Published
10 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.89%

KEV

Description

A vulnerability was detected in Totolink A7100RU 7.4cu.2313_b20191024. The affected element is the function setVpnAccountCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument User results in os command injection. The attack may be launched remotely. The exploit is now public and may be used.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture fallback

⚠️ CVE-2026-6029 (CRITICAL, CVSS 9.3): Totolink A7100RU firmware 7.4cu.2313_b20191024 is vulnerable to unauthenticated OS command injection via setVpnAccountCfg. No patch yet — restrict access and monitor for updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Ubuntu
  • openssh
  • openssh

12 Mar 2026
Published
18 Mar 2026
Updated

CVSS v4.0
LOW (2.7)
EPSS
0.03%

KEV

Description

Vulnerability in the OpenSSH GSSAPI delta included in various Linux distributions. This vulnerability affects the GSSAPI patches added by various Linux distributions and does not affect the OpenSSH upstream project itself. The usage of sshpkt_disconnect() on an error, which does not terminate the process, allows an attacker to send an unexpected GSSAPI message type during the GSSAPI key exchange to the server, which will call the underlying function and continue the execution of the program without setting the related connection variables. As the variables are not initialized to NULL the code later accesses those uninitialized variables, accessing random memory, which could lead to undefined behavior. The recommended workaround is to use ssh_packet_disconnect() instead, which does terminate the process. The impact of the vulnerability depends heavily on the compiler flag hardening configuration.

Statistics

  • 1 Post

Last activity: 7 hours ago

Fediverse

Profile picture fallback

OpenSSH 10.3 には
CVE-2026-3497
nvd.nist.gov/vuln/detail/CVE-2
の修正が含まれる(つまり 11.0_RC4 追加アイテム)ということなのだろうか

  • 0
  • 0
  • 0
  • 7h ago
Showing 1 to 10 of 43 CVEs