24h | 7d | 30d

Overview

  • Adobe
  • Acrobat Reader

11 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
6.08%

Description

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Statistics

  • 11 Posts
  • 10 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Adobe PDF: Zero-Day seit Monaten angegriffen

Wieder einmal hat Adobe mit Acrobat etc. der Welt ein zweifelhaftes Geschenk gemacht. In den Produkten Acrobat DC, Acrobat Reader DC und Acrobat 2024 für Windows und macOS steckte eine öffentlich bisher nicht bekannte Sicherheitslücke, die mindestens seit dem vorigen November für Angriffe ausgenutzt wird (Zero-Day Exploit). Entdeckt wurde die Lücke CVE-2026-34621 im März. In der Meldung steht noch, dass es keinen Flicken gäbe. Das stimmt nicht mehr; Adobe hat gerade Updates veröffentlicht. Für einen Angriff reicht es aus, dem Opfer ein präpariertes PDF unterzuschieben. Außer das PDF

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #pdf #sicherheit #spionage #trojaner #UnplugTrump #adobe

  • 3
  • 2
  • 0
  • 3h ago
Profile picture fallback

CISA Adds Seven Known Exploited Vulnerabilities to Catalog

CVE-2012-1854 Visual Basic for Applications Insecure Library Loading

CVE-2020-9715 Adobe Acrobat Use-After-Free

CVE-2023-21529 Microsoft Exchange Deserialization of Untrusted

CVE-2023-36424 Microsoft Windows Out-of-Bounds Read

CVE-2025-60710 Microsoft Windows Link Following

CVE-2026-21643 Fortinet SQL Injection

CVE-2026-34621 Adobe Acrobat Reader Prototype

cisa.gov/news-events/alerts/20

#cybersecurity #cisa #adobe #microsoft

  • 0
  • 3
  • 0
  • 22h ago

Bluesky

Profile picture fallback
While I have patched my #Adobe Acrobat Reader I find it disgusting that it could have gone this far with CVE-2026-34621, apparently this has been going on since November. PDFs just aren't regular files, there is something deeply troubling about the,
  • 0
  • 1
  • 0
  • 7h ago
Profile picture fallback
Adobe patches CVE-2026-34621 after active exploitation since Dec 2025, preventing remote code execution via malicious PDFs.
  • 0
  • 1
  • 0
  • 3h ago
Profile picture fallback
Adobeは、実際に悪用されたAcrobat Readerの脆弱性(CVE-2026-34621)に対する緊急修正プログラムをリリースしました Adobe issues emergency fix for Acrobat Reader flaw exploited in the wild (CVE-2026-34621) #HelpNetSecurity (Apr 13) www.helpnetsecurity.com/2026/04/13/a...
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Adobe Acrobat Reader Zero-Day Under Active Attack: Patch Now or Risk Total System Compromise (CVE-2026-34621) + Video Introduction: A critical zero-day vulnerability (CVE-2026-34621) in Adobe Acrobat and Acrobat Reader is being actively exploited in the wild, allowing attackers to execute…
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
Adobe Acrobat 脆弱性「CVE-2026-34621」とは?PDFを開くだけで危険なゼロデイと対策をわかりやすく解説 2026年4月11日、米Adobe社がAdobe AcrobatとAcrobat Readerの深刻な脆弱性「CVE-2026-34621」に対する緊急アップデートを公開しました。この脆弱性について紹介します。
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
https://www.ipa.go.jp/security/security-alert/2026/0413-adobereader.html IPAは、Adobe Acrobat/Readerのセキュリティ更新プログラム公開を案内しています。 脆弱性悪用で異常終了やPCの制御被害のおそれがあり、CVE-2026-34621は悪用確認済みです。 該当版は至急最新版へ更新し、管理者も早急に適用対応してください。
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
⚠️ Adobe - CVE-2026-34621 Adobe a publié des correctifs de sécurité pour patcher la CVE-2026-34621 (faille zero-day déjà exploitée) Les détails par ici 👇 - www.it-connect.fr/cve-2026-346... #Adobe #infosec #cybersecurite
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
Adobe fixes actively exploited Acrobat Reader flaw CVE-2026-34621
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
~Cisa~ CISA added 7 actively exploited vulnerabilities to the KEV catalog, urging immediate patching. - IOCs: CVE-2026-21643, CVE-2026-34621, CVE-2025-60710 - #CISA #KEV #threatintel
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • wolfSSL
  • wolfSSL

09 Apr 2026
Published
10 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.

Statistics

  • 5 Posts
  • 3 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Critical wolfSSL flaw (CVE-2026-5194) allows digital ID forgery across billions of devices. Update to version 5.9.1 to fix the issue and reduce risk

Read: hackread.com/wolfssl-vulnerabi

#CyberSecurity #Vulnerability #wolfSSL #IoT

  • 1
  • 0
  • 0
  • 1h ago

Bluesky

Profile picture fallback
Critical wolfSSL flaw (CVE-2026-5194) allows digital ID forgery across billions of devices. Update to version 5.9.1 to fix the issue and reduce risk Read: hackread.com/wolfssl-vuln... #CyberSecurity #Vulnerability #wolfSSL #IoT
  • 1
  • 1
  • 0
  • 1h ago
Profile picture fallback
⚠️ wolfSSL - CVE-2026-5194 Une faille de sécurité critique a été découverte et patchée dans la bibliothèque wolfSSL, particulièrement utilisée sur les systèmes embarqués et l'IoT. Les détails par ici 👇 - www.it-connect.fr/cve-2026-519... #infosec #cybersecurite
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • ShowDoc
  • ShowDoc

29 Apr 2025
Published
19 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
2.03%

KEV

Description

An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution.This issue affects ShowDoc: before 2.8.7.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 13 hours ago

Bluesky

Profile picture fallback
ShowDoc RCE Flaw CVE-2025-0520 Actively Exploited on Unpatched Servers #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
A critical vulnerability in ShowDoc allows remote code execution through unrestricted file uploads, with active exploitation reported for CVE-2025-0520.
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
CVE-2025-0520: Unauthenticated Web Shell Uploads Exploited in the Wild – Patch Now! + Video Introduction: ShowDoc, a popular open-source online documentation tool, is currently under active exploitation due to CVE-2025-0520 – a critical unauthenticated file upload vulnerability (CVSS 9.4).…
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • axios
  • axios

10 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.24%

KEV

Description

Axios is a promise based HTTP client for the browser and Node.js. Prior to 1.15.0 and 0.3.1, the Axios library is vulnerable to a specific "Gadget" attack chain that allows Prototype Pollution in any third-party dependency to be escalated into Remote Code Execution (RCE) or Full Cloud Compromise (via AWS IMDSv2 bypass). This vulnerability is fixed in 1.15.0 and 0.3.1.

Statistics

  • 4 Posts

Last activity: 1 hour ago

Bluesky

Profile picture fallback
#Axios - yet another issue with this popular #NPM library: A newly discovered critical vulnerability CVE-2026-40175 in axios has exposed countless web & cloud apps to potential Remote Code Execution (#RCE) and full infrastructure compromise: 👇
  • 0
  • 0
  • 1
  • 5h ago
Profile picture fallback
CVE-2026-40175: The Axios Nightmare That (Probably) Won’t Break Your Cloud—But Here’s Why You Must Patch Now + Video Introduction: A critical vulnerability with a perfect CVSS score of 10 has sent shockwaves through the JavaScript ecosystem, threatening to hand attackers the keys to entire cloud…
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
The Axios CVE-2026-40175 vulnerability is rated as a "10/10 critical" threat but is not realistically exploitable in standard environments. It requires bypassing Node.js's protection mechanisms and is mainly a concern for custom configurations. The media coverage has exaggerated the threat.
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • marimo-team
  • marimo

09 Apr 2026
Published
09 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
2.70%

KEV

Description

marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification. This vulnerability is fixed in 0.23.0.

Statistics

  • 2 Posts
  • 5 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback

Critical Marimo Python Notebook Zero-Day (CVE-2026-39987) Exploited Within 10 Hours of Disclosure
#CyberSecurity
securebulletin.com/critical-ma

  • 5
  • 0
  • 0
  • 11h ago

Bluesky

Profile picture fallback
📢 CVE-2026-39987 : RCE pré-auth critique dans Marimo exploitée 10h après divulgation 📝 ## 🗓️ Contexte Source : BleepingComputer, publié le 12 avril … https://cyberveille.ch/posts/2026-04-14-cve-2026-39987-rce-pre-auth-critique-dans-marimo-exploitee-10h-apres-divulgation/ #CVE_2026_39987 #Cyberveille
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.18%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 2 Posts
  • 6 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Anthropic built an AI model called Mythos that autonomously found a 17-year-old remote code execution vulnerability in FreeBSD. No human involvement after the initial prompt. It found thousands more zero-days across every major OS and browser, some hiding for decades. Anthropic says it's too dangerous to release publicly, so they gave it to AWS, Microsoft, Apple, Google, CrowdStrike, and a handful of others under a new initiative called Project Glasswing. $100M in usage credits to go fix things before similar capabilities go wide.

Impressive, but worth some skepticism. Bruce Schneier pointed out this is also a very effective PR play. A security firm called Aisle replicated many of the same findings using older, cheaper, publicly available models. The gap between "too dangerous to release" and "already achievable with what's out there" may be thinner than the headlines suggest.

🔒 Mythos autonomously discovered and exploited a FreeBSD RCE that had been present for 17 years (CVE-2026-4747)
🔗 It chains 3-5 vulnerabilities together into multi-step attack sequences
📊 Over 99% of the vulnerabilities found are still unpatched, so we're trusting Anthropic's claims on scope
💰 $25/$125 per million input/output tokens for partners, if you're on the list

Meanwhile, the advice cybersecurity experts are giving the rest of us: update your software, use MFA, get a password manager. The most advanced AI vulnerability scanner ever built, use off-line (truly air-gapped) backups, and basic hygiene is still the best defense most people have.

crn.com/news/security/2026/5-t

  • 4
  • 2
  • 0
  • 1h ago
Profile picture fallback

FreeBSD CVE-2026-4747 Log Suggests Mythos is a Marketing Trick flyingpenguin.com/freebsd-cve-

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Red Hat
  • Red Hat Enterprise Linux 10
  • cockpit

07 Apr 2026
Published
10 Apr 2026
Updated

CVSS
Pending
EPSS
0.10%

KEV

Description

Cockpit's remote login feature passes user-supplied hostnames and usernames from the web interface to the SSH client without validation or sanitization. An attacker with network access to the Cockpit web service can craft a single HTTP request to the login endpoint that injects malicious SSH options or shell commands, achieving code execution on the Cockpit host without valid credentials. The injection occurs during the authentication flow before any credential verification takes place, meaning no login is required to exploit the vulnerability.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Red Hat published RHSA-2026:7381 for CVE-2026-4631. The flaw is unauthenticated remote code execution in Cockpit. Cockpit is the default web console on RHEL 9, RHEL 10, Rocky, and AlmaLinux. CVSS 9.8. Cockpit passes hostnames and usernames from the browser straight to SSH, before any password check. One HTTP request to the login page runs commands as the server. Default on, web-facing, unauthenticated. Patch this week.

#Linux #CyberSecurity #RHEL #SysAdmin

  • 1
  • 0
  • 0
  • 4h ago

Overview

  • Microsoft
  • Microsoft SharePoint Enterprise Server 2016

14 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
Pending

Description

Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts

Last activity: Last hour

Bluesky

Profile picture fallback
Microsoft's Patch Tuesday updates address 165 vulnerabilities, including a critical SharePoint zero-day exploit tracked as CVE-2026-32201.
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
Microsoft’s April 2026 Patch Tuesday: 168 Flaws Including Actively Exploited SharePoint Zero-Day – Patch NOW or Get Spoofed! + Video Introduction: Microsoft’s April 2026 Patch Tuesday addresses a massive 168 vulnerabilities, including one actively exploited zero-day (CVE-2026-32201) in Microsoft…
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Talend
  • Talend JobServer

14 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.24%

KEV

Description

A critical vulnerability in the Talend JobServer and Talend Runtime allows unauthenticated remote code execution via the JMX monitoring port. The attack vector is the JMX monitoring port of the Talend JobServer. The vulnerability can be mitigated for the Talend JobServer by requiring TLS client authentication for the monitoring port; however, the patch must be applied for full mitigation. For Talend ESB Runtime, the vulnerability can be mitigated by disabling the JobServer JMX monitoring port, which is disabled by default from the R2024-07-RT patch.

Statistics

  • 2 Posts

Last activity: 12 hours ago

Fediverse

Profile picture fallback

🔴 CRITICAL: CVE-2026-6264 affects Talend JobServer 8.0 & 7.3. Unauthenticated RCE via JMX port — patch immediately or require TLS client auth for mitigation. Disable JMX in Runtime if possible. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
🚨 Critical RCE in Talend JobServer (CVE-2026-6264) Unauthenticated attackers can exploit the JMX monitoring port to execute arbitrary code. CVSS: 9.8 🔥 Affects Talend (Qlik) 🔗 basefortify.eu/cve_reports/...
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 31 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture fallback

🚨 Composer 2.9.6 and 2.2.27 are out with fixes for CVE-2026-40261 and CVE-2026-40176, both command injection issues in the Perforce driver. Run composer self-update now. No exploitation detected on Packagist.org and Private Packagist. Details on our blog: blog.packagist.com/composer-2- #php #phpc #composerphp

  • 20
  • 11
  • 0
  • 9h ago
Showing 1 to 10 of 42 CVEs