24h | 7d | 30d

Overview

  • PackageKit
  • PackageKit

22 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.22%

KEV

Description

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5. A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags` combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`: 1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING. 2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags. 3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.

Statistics

  • 4 Posts
  • 3 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture fallback

Telekom's security team warns: “Pack2TheRoot” (CVE-2026-41651) in PackageKit lets low‑privilege users install/remove system packages and escalate to root — patch to PackageKit ≥1.3.5 and apply distro updates now: heise.de/en/news/Pack2TheRoot- 🔒🐧 #CyberSecurity #Linux

  • 2
  • 1
  • 0
  • 5h ago

Bluesky

Profile picture fallback
SIOSセキュリティブログを更新しました。 PackageKitの脆弱性(High: CVE-2026-41651) #sios_tech #security #vulnerability #セキュリティ #脆弱性 #linux #packagekit security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
A high-severity vulnerability in PackageKit allows unprivileged users to install packages with root privileges, tracked as CVE-2026-41651.
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
A critical TOCTOU race condition in PackageKit (CVE-2026-41651) allows unprivileged users to gain root access by installing arbitrary RPMs. Fixed in PackageKit 1.3.5 and updated in Debian, Ubuntu, Fedora. #Pack2TheRoot #LinuxSecurity #Germany
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Mozilla
  • Firefox

21 Apr 2026
Published
21 Apr 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Other issue in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture fallback

A Firefox bug (CVE-2026-6770) allowed cross-site tracking and Tor fingerprinting, even in Private Browsing mode. This vulnerability, which exposed stable identifiers via IndexedDB, has been fixed in Firefox 150 and Tor Browser 15.0.10.
securityaffairs.com/191374/sec

  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback

En las últimas 24 horas, se detectaron vulnerabilidades críticas en CrowdStrike LogScale y navegadores Firefox y Tor que permitían accesos no autorizados y seguimiento en modo privado; además, Itron reportó un incidente de seguridad en su red interna y CISA actualizó su lista con fallos explotados en SimpleHelp, Samsung y D-Link. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 27/04/26 📆 |====

🔓 VULNERABILIDAD CRÍTICA EN CROWDSTRIKE LOGSCALE PERMITÍA ACCESO NO AUTORIZADO A ARCHIVOS

CrowdStrike ha corregido la grave falla CVE-2026-40050 que afectaba a LogScale autohospedado. Esta vulnerabilidad de traversal de rutas podía ser explotada por atacantes para acceder a archivos sensibles sin necesidad de autenticación, poniendo en riesgo datos críticos. Actualizar a la última versión es fundamental para proteger su entorno. Conozca más sobre esta amenaza y la solución implementada aquí 👉 djar.co/A0eG

⚠️ ITRON, IMPORTANTE EMPRESA DE SERVICIOS PÚBLICOS, REPORTA INCIDENTE DE SEGURIDAD INFORMÁTICA

Itron reveló un acceso no autorizado detectado el 13 de abril de 2026 en parte de su infraestructura informática. La empresa activó sus protocolos de respuesta y notificó a las autoridades regulatorias para mitigar posibles impactos. Este caso subraya la importancia de la vigilancia continua y respuesta rápida frente a intrusiones en infraestructuras críticas. Detalles completos y medidas tomadas 👉 djar.co/aW8Q

🦊 FALLA EN FIREFOX Y TOR PERMITÍA SEGUIMIENTO ENTRE SITIOS Y FINGERPRINTING EN MODO PRIVADO

El bug CVE-2026-6770 afectaba a Firefox y Tor Browser, posibilitando que atacantes realizaran seguimiento cruzado y obtuvieran huellas digitales del usuario incluso en navegación privada. Las actualizaciones Firefox 150 y Tor Browser 15.0.10 corrigen esta vulnerabilidad, reforzando la privacidad y seguridad del usuario. Asegure sus navegadores actualizados para evitar ser rastreado 👉 djar.co/D31m9

🔐 ITRON CONFIRMA INCIDENTE DE SEGURIDAD EN SU RED INTERNA

Mediante un informe oficial 8-K a la SEC, Itron, Inc. informó que un tercero no autorizado accedió a ciertos sistemas internos, destacando la creciente amenaza contra infraestructuras críticas. La transparencia en la comunicación de incidentes y la pronta reacción son clave para minimizar daños y aumentar la resiliencia. Conozca más sobre la situación y el manejo del incidente aquí 👉 djar.co/YdgE

📋 CISA INCORPORA VULNERABILIDADES DE SIMPLEHELP, SAMSUNG Y D-LINK A SU LISTADO DE FALLOS EXPLOTADOS

La Agencia de Seguridad de Infraestructura y Ciberseguridad de EE. UU. (CISA) ha incluido nuevas vulnerabilidades explotadas activamente en sus registros, afectando productos de SimpleHelp, Samsung y D-Link. Esta actualización alerta a organizaciones y usuarios sobre riesgos inmediatos, recomendando acciones rápidas para parchear y mitigar posibles ataques. Revise la lista completa y los detalles aquí 👉 djar.co/zEJeo

  • 1
  • 1
  • 0
  • 6h ago

Overview

  • CrowdStrike
  • LogScale Self-Hosted

21 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.32%

KEV

Description

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does not affect Next-Gen SIEM customers. The vulnerability exists in a specific cluster API endpoint that, if exposed, allows a remote attacker to read arbitrary files from the server filesystem without authentication. Next-Gen SIEM customers are not affected and do not need to take any action. CrowdStrike mitigated the vulnerability for LogScale SaaS customers by deploying network-layer blocks to all clusters on April 7, 2026. We have proactively reviewed all log data and there is no evidence of exploitation. LogScale Self-hosted customers should upgrade to a patched version immediately to remediate the vulnerability. CrowdStrike identified this vulnerability during continuous and ongoing product testing.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

En las últimas 24 horas, se detectaron vulnerabilidades críticas en CrowdStrike LogScale y navegadores Firefox y Tor que permitían accesos no autorizados y seguimiento en modo privado; además, Itron reportó un incidente de seguridad en su red interna y CISA actualizó su lista con fallos explotados en SimpleHelp, Samsung y D-Link. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 27/04/26 📆 |====

🔓 VULNERABILIDAD CRÍTICA EN CROWDSTRIKE LOGSCALE PERMITÍA ACCESO NO AUTORIZADO A ARCHIVOS

CrowdStrike ha corregido la grave falla CVE-2026-40050 que afectaba a LogScale autohospedado. Esta vulnerabilidad de traversal de rutas podía ser explotada por atacantes para acceder a archivos sensibles sin necesidad de autenticación, poniendo en riesgo datos críticos. Actualizar a la última versión es fundamental para proteger su entorno. Conozca más sobre esta amenaza y la solución implementada aquí 👉 djar.co/A0eG

⚠️ ITRON, IMPORTANTE EMPRESA DE SERVICIOS PÚBLICOS, REPORTA INCIDENTE DE SEGURIDAD INFORMÁTICA

Itron reveló un acceso no autorizado detectado el 13 de abril de 2026 en parte de su infraestructura informática. La empresa activó sus protocolos de respuesta y notificó a las autoridades regulatorias para mitigar posibles impactos. Este caso subraya la importancia de la vigilancia continua y respuesta rápida frente a intrusiones en infraestructuras críticas. Detalles completos y medidas tomadas 👉 djar.co/aW8Q

🦊 FALLA EN FIREFOX Y TOR PERMITÍA SEGUIMIENTO ENTRE SITIOS Y FINGERPRINTING EN MODO PRIVADO

El bug CVE-2026-6770 afectaba a Firefox y Tor Browser, posibilitando que atacantes realizaran seguimiento cruzado y obtuvieran huellas digitales del usuario incluso en navegación privada. Las actualizaciones Firefox 150 y Tor Browser 15.0.10 corrigen esta vulnerabilidad, reforzando la privacidad y seguridad del usuario. Asegure sus navegadores actualizados para evitar ser rastreado 👉 djar.co/D31m9

🔐 ITRON CONFIRMA INCIDENTE DE SEGURIDAD EN SU RED INTERNA

Mediante un informe oficial 8-K a la SEC, Itron, Inc. informó que un tercero no autorizado accedió a ciertos sistemas internos, destacando la creciente amenaza contra infraestructuras críticas. La transparencia en la comunicación de incidentes y la pronta reacción son clave para minimizar daños y aumentar la resiliencia. Conozca más sobre la situación y el manejo del incidente aquí 👉 djar.co/YdgE

📋 CISA INCORPORA VULNERABILIDADES DE SIMPLEHELP, SAMSUNG Y D-LINK A SU LISTADO DE FALLOS EXPLOTADOS

La Agencia de Seguridad de Infraestructura y Ciberseguridad de EE. UU. (CISA) ha incluido nuevas vulnerabilidades explotadas activamente en sus registros, afectando productos de SimpleHelp, Samsung y D-Link. Esta actualización alerta a organizaciones y usuarios sobre riesgos inmediatos, recomendando acciones rápidas para parchear y mitigar posibles ataques. Revise la lista completa y los detalles aquí 👉 djar.co/zEJeo

  • 1
  • 1
  • 0
  • 6h ago

Bluesky

Profile picture fallback
CVE-2026-40050 — CrowdStrike LogScale Unauthenticated Path Traversal #patchmanagement
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Moxa
  • EDR-8010 Series

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.09%

KEV

Description

An improper handling of the length parameter inconsistency vulnerability has been identified in Moxa’s Secure Router. Because of improper validation of length parameters in the HTTPS management interface, an unauthenticated remote attacker could send specially crafted requests that trigger a buffer overflow condition, causing the web service to become unresponsive. Successful exploitation may result in a denial-of-service condition requiring a device reboot to restore normal operation. While successful exploitation can severely impact the availability of the affected device, no impact to the confidentiality or integrity of the affected product has been identified. Additionally, no confidentiality, integrity, or availability impact to the subsequent system has been identified.

Statistics

  • 2 Posts

Last activity: 1 hour ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: CVE-2026-3868 affects Moxa EDR-8010 v1.0 routers. Remote attackers can trigger a DoS via HTTPS mgmt interface buffer overflow. No patch yet — restrict access & monitor for outages. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 9h ago

Bluesky

Profile picture fallback
~Cybergcca~ CCCS issued 9 advisories, highlighting critical flaws in IBM, VMware, and Notepad++. - IOCs: CVE-2026-3867, CVE-2026-3868 - #PatchManagement #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Apple
  • iOS and iPadOS

22 Apr 2026
Published
23 Apr 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture fallback

Apple Notfall-Update gegen Datenschutz-Loch

Apple hat gerade iOS/iPadOS 26.4.2 und iOS/iPadOS 18.7.8 veröffentlicht. Der einzige Zweck dieser Updates außer der Reihe besteht darin, die Sicherheitslücke CVE-2026-28950 zu schließen. Apple verschweigt (hier und hier), dass das FBI diese Lücke bereits ausgenutzt hat, um Informationen aus dem iPhone eines Verdächtigen auszulesen, die eigentlich geschützt sein sollten. Das geht so:

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Mobilfunk #Warnung #0day #apple #chat #datenschutz #ios #messenger #privacy #privatsphäre #sicherheit #spionage #UnplugApple #UnplugTrump #wissen

  • 4
  • 3
  • 0
  • 8h ago

Overview

  • Tenda
  • F456

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

🛡️ CVE-2026-7081: HIGH-severity buffer overflow in Tenda F456 v1.0.0.5 (fromGstDhcpSetSer, httpd). Remote exploit possible, no patch yet. Limit remote access & watch for Tenda updates. Details: radar.offseq.com/threat/cve-20

  • 2
  • 1
  • 0
  • 11h ago

Overview

  • Microsoft
  • Windows 10 Version 1507

10 Jun 2025
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
49.24%

Description

Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 3 hours ago

Bluesky

Profile picture fallback
Authentication reflection attacks are still not dead! In our new blogpost series, @yaumn.bsky.social shares his journey into bypassing the mitigations of CVE-2025-33073 to pop SYSTEM shells again! 🚀 👇 www.synacktiv.com/en/node/1337
  • 1
  • 0
  • 0
  • 3h ago

Overview

  • Totolink
  • A8000RU

26 Apr 2026
Published
27 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.89%

KEV

Description

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function setVpnPassCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument pptpPassThru results in os command injection. The attack can be executed remotely. The exploit has been released to the public and may be used for attacks.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 17 hours ago

Fediverse

Profile picture fallback

CVE-2026-7037: Totolink A8000RU (7.1cu.643_b20200521) — CRITICAL OS command injection flaw. Remote, unauthenticated exploit enables full device compromise. Restrict access & monitor systems. No patch yet. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 17h ago

Overview

  • Apache Software Foundation
  • Apache ActiveMQ Broker
  • org.apache.activemq:activemq-broker

07 Apr 2026
Published
17 Apr 2026
Updated

CVSS
Pending
EPSS
65.07%

Description

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture fallback

Apache ActiveMQ CVE-2026-34197 (CVSS 8.8) landed on the CISA Known Exploited list April 16. Federal patch deadline April 30. The flaw lets an attacker send a management command through Jolokia, the broker's monitoring API. The broker fetches a remote config file, then runs OS commands. Horizon3.ai says 13 years hiding in plain sight. I have chased similar setups across 14 platforms.

#CyberSecurity #InfoSec #DevOps #SysAdmin

  • 0
  • 2
  • 0
  • 21h ago

Overview

  • simple-git

25 Apr 2026
Published
25 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
0.08%

KEV

Description

Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 4 hours ago

Fediverse

Profile picture fallback

simple-git (the Node.js git wrapper sitting inside half of npm build pipelines) disclosed CVE-2026-6951 on April 25. Severity 9.8. It lets an attacker run any command on the build server. The new patch finishes a 2022 patch that blocked the "-c" flag and forgot "--config" was the same option. Snyk pulled telemetry: 73% of 9M weekly installs were on the broken patch at disclosure.

#OpenSource #CyberSecurity #SupplyChain

  • 0
  • 1
  • 0
  • 4h ago
Showing 1 to 10 of 29 CVEs