24h | 7d | 30d

Overview

  • InternLM
  • lmdeploy

20 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.03%

KEV

Description

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.

Statistics

  • 3 Posts
  • 5 Interactions

Last activity: 14 hours ago

Bluesky

Profile picture fallback
Une faille critique (CVE-2026-33626, CVSS 7.5) dans LMDeploy, un outil open-source pour le déploiement de LLMs, est activement exploitée dans la nature moins de 13h après sa divulgation ! Il s’agit d’une vulnérabilité SSRF permettant l’accès à des données sensibles thehackernews.com/2026/04/lmde...
  • 3
  • 2
  • 0
  • 23h ago
Profile picture fallback
Exploit su LMDeploy CVE-2026-33626: attacco SSRF immediato dopo disclosure
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Cisco
  • Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

25 Sep 2025
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
41.43%

Description

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device.

Statistics

  • 2 Posts
  • 3 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

Neu Warnung:
Update #1: Schwerwiegende Sicherheitslücken in Cisco Adaptive Security Appliance - aktiv ausgenutzt - Updates verfügbar cert.at/de/warnungen/2026/4/up

  • 1
  • 2
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Firestarter malware persists on Cisco Firepower and Secure Firewall devices running ASA/FTD, bypassing patches and reboots. Linked to UAT-4356, it exploits CVE-2025-20333 & CVE-2025-20362 via WebVPN. #CiscoFirepower #UK #Backdoor
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
24 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
0.07%

KEV

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 14 hours ago

Bluesky

Profile picture fallback
A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202 Akamai www.akamai.com/blog/securit...
  • 1
  • 0
  • 0
  • 21h ago
Profile picture fallback
~Akamai~ An incomplete patch for APT28's CVE-2026-21510 leaves a zero-click NTLM authentication coercion flaw (CVE-2026-32202) via malicious LNK files. - IOCs: CVE-2026-32202, CVE-2026-21510, APT28 - #APT28 #CVE2026_32202 #ThreatIntel #ZeroDay
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • F5
  • BIG-IP

15 Oct 2025
Published
31 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
7.45%

Description

When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 18 hours ago

Bluesky

Profile picture fallback
Approximately a month ago, F5 published advisory on malware deployed to BIG-IP systems vulnerable to CVE-2025-53521. #ESETresearch discovered two related malware components on VirusTotal and named the threat #PoisonedRefresh. 1/6 my.f5.com/manage/s/art...
  • 4
  • 3
  • 0
  • 18h ago

Overview

  • Pending

25 Mar 2025
Published
25 Apr 2026
Updated

CVSS
Pending
EPSS
1.25%

Description

A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.

Statistics

  • 2 Posts

Last activity: 14 hours ago

Fediverse

Profile picture fallback

📰 Mirai Botnet Exploits Critical Flaw in Discontinued D-Link Routers for DDoS Attacks

🚨 A new Mirai botnet campaign is exploiting a critical RCE flaw (CVE-2025-29635) in discontinued D-Link routers. The devices are EoL and will not be patched. Disconnect them now to prevent them from joining a DDoS botnet! #Mirai #Botnet #IoT #DLink

🔗 cyber.netsecops.io/articles/mi

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
~Cisa~ CISA added 4 actively exploited CVEs affecting Samsung, SimpleHelp, and D-Link to the KEV catalog. - IOCs: CVE-2024-7399, CVE-2024-57726, CVE-2025-29635 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Apple
  • iOS and iPadOS

22 Apr 2026
Published
23 Apr 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture fallback

📰 Apple Rushes Fix for iOS Flaw That Let FBI Recover Deleted Signal Messages

🚨 Apple issues emergency patch for iOS flaw (CVE-2026-28950) that let the FBI recover deleted Signal message notifications. The bug improperly stored notification data, undermining user privacy. Update your iPhone & iPad now! 📱🔒 #iOS #Privacy #In...

🔗 cyber.netsecops.io/articles/ap

  • 2
  • 1
  • 0
  • 17h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
24 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.10%

KEV

Description

Double free in Windows IKE Extension allows an unauthorized attacker to execute code over a network.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture fallback

En las últimas 24 horas, se reveló Fast16, un malware sigiloso con impacto nuclear histórico, mientras una grave falla en Windows IKEv2 fue parcheada urgentemente; además, una cadena de suministro comprometida afectó a Bitwarden CLI, un masivo robo de datos sacudió Francia, y avanzan ataques sofisticados con suplantación en Microsoft Teams y uso malicioso de software legítimo por Tropic Trooper. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 24/04/26 📆 |====

🔓 MALWARE FAST16 DESCIFRADO: AMENAZA SILENCIOSA AL PROGRAMA NUCLEAR DE IRÁN

Investigadores revelan Fast16, un código malicioso de 2005 capaz de manipular software de simulación crítica. Se sospecha que pudo haber sido empleado por EE. UU. o aliados para sabotajes encubiertos, precediendo a Stuxnet. Entender su funcionamiento permite fortalecer defensas contra malware avanzado y ataques dirigidos. Descubre todos los detalles sobre esta amenaza histórica y su impacto en la ciberseguridad nuclear. Conoce más sobre Fast16 y su análisis completo aquí 👉 djar.co/f2tf5

🛡️ CADENA DE SUMINISTRO COMPROMETIDA AFECTA A BITWARDEN CLI

Una campaña maliciosa aprovechó la plataforma Checkmarx para infiltrar malware en la versión 2026.4.0 de Bitwarden CLI, exponiendo secretos y distribuyendo código malicioso a usuarios confiables. Este incidente resalta la importancia crítica de auditar y proteger las cadenas de suministro de software, clave para la seguridad integral. Aprende cómo detectar y mitigar riesgos derivados de ataques en la cadena de suministro y protege tus credenciales. Más información relevante en 👉 djar.co/nYZn

⚠️ VULNERABILIDAD CRÍTICA EN WINDOWS IKEV2 (CVE-2026-33824) PERMITÍA EJECUCIÓN REMOTA DE CÓDIGO

Se identificó una falla grave en el servicio IKEv2 de Windows que posibilitaba la ejecución de código remoto, poniendo en riesgo la integridad de miles de sistemas. Microsoft lanzó un parche urgente que debe aplicarse de inmediato para evitar explotación activa. Descubre cómo funciona esta vulnerabilidad y las mejores prácticas para mantener tu entorno seguro frente a amenazas similares. Revisa el aviso de seguridad oficial aquí 👉 djar.co/qhEL

🇫🇷 INCIDENTE EN FRANCIA EXPONE DATOS PERSONALES DE 18 MILLONES DE CIUDADANOS

La Agencia Nacional de Seguridad Documental de Francia confirmó un acceso no autorizado que comprometió documentos de identidad y datos sensibles de millones de personas. Este incidente enfatiza la necesidad de reforzar controles y medidas de protección sobre bases de datos críticas a nivel estatal. Descubre el alcance del evento, las medidas adoptadas y consejos para proteger tus datos personales en escenarios de brechas masivas. Detalles completos en 👉 djar.co/VXYXb

👥 SUSTRACCIÓN DE DATOS CON SUPLANTACIÓN EN MICROSOFT TEAMS: MALWARE SNOW DE UNC6692

El grupo UNC6692 utilizó técnicas de impersonación en Microsoft Teams para engañar a empleados, desplegar el malware SNOW y exfiltrar información confidencial. Esta táctica demuestra la sofisticación en la ingeniería social y la explotación de plataformas de colaboración. Aprende a identificar señales de ataques de suplantación y cómo fortalecer la seguridad en entornos colaborativos para evitar filtraciones. Amplía la información y recomendaciones aquí 👉 djar.co/kQat

🐉 TROPIC TROOPER EMPLEA VERSIONES TROYANIZADAS DE SUMATRAPDF Y GITHUB PARA DESPLEGAR ADAPTIXC2

En 2024, el grupo Tropic Trooper desplegó el malware AdaptixC2 utilizando versiones manipuladas del lector SumatraPDF junto con canales de comando en GitHub, permitiendo acceso encubierto y persistente en redes comprometidas. Este caso resalta la amenaza que representan herramientas legítimas convertidas en vectores de ataque avanzados. Descubre cómo identificar y defenderte de estas campañas sofisticadas que combinan ingeniería de software y abuso de plataformas confiables. Conoce todos los detalles aquí 👉 djar.co/SnJilf

  • 1
  • 1
  • 0
  • 23h ago

Overview

  • simple-git

25 Apr 2026
Published
25 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
Pending

KEV

Description

Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 4 hours ago

Fediverse

Profile picture fallback

🚩 CRITICAL: CVE-2026-6951 in simple-git <3.36.0 enables remote code execution via untrusted input to the options argument. Upgrade or block untrusted input! Impact: full system compromise. More: radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 4h ago

Overview

  • Ericsson
  • CodeChecker

24 Apr 2026
Published
24 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
Pending

KEV

Description

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Authentication bypass occurs when the URL ends with Authentication with certain function calls.  This bypass allows assigning arbitrary permission to any user existing in CodeChecker. This issue affects CodeChecker: through 6.27.3.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: Last hour

Fediverse

Profile picture fallback

Ericsson CodeChecker (≤6.27.3) is vulnerable to CRITICAL auth bypass (CVE-2026-25660). Attackers can assign permissions via crafted URLs. Restrict access & monitor for changes. Patch not yet available. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • Last hour

Overview

  • flatpak
  • flatpak

07 Apr 2026
Published
11 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

Flatpak is a Linux application sandboxing and distribution framework. Prior to 1.16.4, the Flatpak portal accepts paths in the sandbox-expose options which can be app-controlled symlinks pointing at arbitrary paths. Flatpak run mounts the resolved host path in the sandbox. This gives apps access to all host files and can be used as a primitive to gain code execution in the host context. This vulnerability is fixed in 1.16.4.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 13 hours ago

Bluesky

Profile picture fallback
📢 CVE-2026-34078 : Sandbox escape dans Flatpak via injection de chemins non fiables 📝 ## 🗓️ Contexte Article publié le 23 avril 2026 par Sebastian Wi… https://cyberveille.ch/posts/2026-04-24-cve-2026-34078-sandbox-escape-dans-flatpak-via-injection-de-chemins-non-fiables/ #CVE_2026_34078 #Cyberveille
  • 0
  • 1
  • 0
  • 13h ago
Showing 1 to 10 of 40 CVEs