24h | 7d | 30d

Overview

  • moby
  • moby

31 Mar 2026
Published
02 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.01%

KEV

Description

Moby is an open source container framework. Prior to version 29.3.1, a security vulnerability has been detected that allows attackers to bypass authorization plugins (AuthZ). This issue has been patched in version 29.3.1.

Statistics

  • 5 Posts

Last activity: 8 hours ago

Fediverse

Profile picture fallback

CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access:
👇
thehackernews.com/2026/04/dock

  • 0
  • 0
  • 1
  • 11h ago

Bluesky

Profile picture fallback
Critical Alert: Docker AuthZ Bypass (CVE-2026-34040) Enables Host Root Access #patchmanagement
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
Docker CVE-2026-34040 Lets Attackers Bypass Authorization and Gain Host Access reconbee.com/docker-cve-2... #DockerCVE #bypassauthorization #gainhostaccess #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
📢 CVE-2026-34040 : Contournement de l'autorisation Docker via corps HTTP surdimensionné 📝 ## 🔍 Contexte Publié le 7 avril 2026 par Vladimir Tokarev (C… https://cyberveille.ch/posts/2026-04-08-cve-2026-34040-contournement-de-l-autorisation-docker-via-corps-http-surdimensionne/ #AI_agent #Cyberveille
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Apache Software Foundation
  • Apache ActiveMQ Broker
  • org.apache.activemq:activemq-broker

07 Apr 2026
Published
08 Apr 2026
Updated

CVSS
Pending
EPSS
0.10%

KEV

Description

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

Statistics

  • 3 Posts

Last activity: 8 hours ago

Fediverse

Profile picture fallback

En las últimas 24 horas, destaca Project Glasswing, que fortalece la defensa del software crítico ante la IA; vulnerabilidades graves en ActiveMQ y el kernel de Linux; ataques día cero en Adobe Reader y Windows sin parche; y amenazas avanzadas de grupos vinculados al MOIS, obligando a rediseñar estrategias de ciberseguridad. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 08/04/26 📆 |====

🔐 PROJECT GLASSWING: SEGURIDAD DEL SOFTWARE CRÍTICO EN LA ERA DE LA IA

Una nueva iniciativa global busca proteger el software más vital del planeta ante la llegada de una nueva era dominada por la inteligencia artificial. Project Glasswing promete fortalecer las defensas cibernéticas, proporcionando herramientas avanzadas y estrategias para anticipar y neutralizar amenazas emergentes. Esta acción es crucial para mantener la integridad de infraestructuras críticas y sistemas esenciales en un entorno cada vez más automatizado. Descubre cómo esta propuesta cambiará la forma de proteger el software clave. Más información aquí 👉 djar.co/jLuDy

⚠️ CVE-2026-34197: VULNERABILIDAD RCE EN ACTIVEMQ A TRAVÉS DE LA API JOLOKIA

Se ha identificado una grave vulnerabilidad de ejecución remota de código en ActiveMQ que puede ser explotada mediante la API Jolokia. Esta falla permite a atacantes ejecutar comandos a distancia, poniendo en riesgo la disponibilidad y confidencialidad de sistemas que dependen de este software. Conoce las versiones afectadas, cómo detectar esta vulnerabilidad y las medidas recomendadas para mitigar el riesgo antes de que sea explotada masivamente. Protege tus sistemas ahora mismo. Lee el análisis completo aquí 👉 djar.co/co76K3

🚨 ALERTA DE DÍA CERO DETECTADA EN ADOBE READER POR EXPMON

EXPMON ha identificado un sofisticado ataque de día cero que utiliza técnicas avanzadas de fingerprinting para comprometer usuarios de Adobe Reader. Esta vulnerabilidad puede ser aprovechada para instalar malware sin ser detectado, afectando especialmente a entornos corporativos y usuarios finales. Mantente informado sobre cómo funciona este ataque y cuáles son las recomendaciones para minimizar su impacto hasta que se publique un parche oficial. Protege tus documentos y dispositivos. Detalles y recomendaciones aquí 👉 djar.co/f0Hf

🛡️ LA CIBERSEGURIDAD EN LA ERA DEL SOFTWARE INSTANTÁNEO

La inteligencia artificial está revolucionando el ciclo de vida del software, dando lugar al concepto de "software instantáneo" que puede crearse, modificarse y eliminarse con rapidez sin precedentes. Este cambio impacta directamente en la seguridad cibernética, pues obliga a adaptar las estrategias de defensa para monitorear y proteger sistemas en constante transformación. Explora las nuevas amenazas y las soluciones propuestas para enfrentar este desafío de forma eficaz y segura. Profundiza en esta perspectiva innovadora aquí 👉 djar.co/lKM1L

🐧 INVESTIGACIÓN REVELA MÁS DE 100 VULNERABILIDADES EN KERNELS DE LINUX EN SOLO 30 DÍAS

Un análisis exhaustivo ha detectado más de un centenar de errores críticos en diferentes versiones del kernel de Linux durante un mes. Estos hallazgos subrayan la necesidad urgente de reforzar las prácticas de desarrollo y auditoría para evitar que estas vulnerabilidades sean explotadas, ya que Linux es la base de millones de dispositivos y servicios. Conoce cuáles son las vulnerabilidades más preocupantes y las recomendaciones para administradores y desarrolladores. Consulta el informe completo aquí 👉 djar.co/wpTO0

💥 EXPLOIT SIN PARCHE EN WINDOWS DESVELA BRECHA DE SEGURIDAD DE DÍA CERO

Un exploit de día cero sin parche ha sido publicado por un investigador anónimo, posibilitando a atacantes obtener privilegios SYSTEM en sistemas Windows. Esta brecha representa un riesgo grave para la seguridad, permitiendo control total sobre el equipo y la ejecución de código malicioso sin restricciones. Aprende cómo detectar esta amenaza y qué medidas temporales implementar hasta que Microsoft lance una actualización oficial. Mantén tus sistemas seguros con esta información vital. Accede a la alerta y guías aquí 👉 djar.co/YZrTZ

🌐 EVALUACIÓN DE AMENAZAS EN ECOSISTEMAS CIBERNÉTICOS VINCULADOS AL MOIS

Nuevos análisis muestran cómo colectivos como Handala, Homeland Justice y Karma operan dentro de un ecosistema cibernético complejo vinculado al MOIS de Irán. Estos grupos emplean técnicas avanzadas de hackeo y campañas de desinformación para influir en la opinión pública y ejecutar operaciones de espionaje. Entender estas dinámicas es esencial para anticipar posibles ataques y proteger la integridad de la información en organizaciones y gobiernos. Descubre los detalles y recomendaciones estratégicas aquí 👉 djar.co/aH8MB

  • 0
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture fallback
AI Uncovers 13-Year-Old Apache ActiveMQ RCE Nightmare – CVE-2026-34197 Demands Immediate Patching + Video Introduction: A critical remote code execution (RCE) vulnerability lurking in Apache ActiveMQ Classic for 13 years has finally been exposed – not by a human researcher, but by an AI assistant.…
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
A critical RCE vulnerability (CVE-2026-34197) has been uncovered in Apache ActiveMQ Classic after 13 years, exploitable via Jolokia API to execute remote commands. Patches released in versions 5.19.4 & 6.2.3. #ApacheActiveMQ #RCEBug #USA
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Kubernetes
  • ingress-nginx

19 Mar 2026
Published
21 Mar 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.04%

KEV

Description

A security issue was discovered in ingress-nginx where a combination of Ingress annotations can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)

Statistics

  • 2 Posts
  • 3 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture fallback

🚨 A high-vulnerability CVE (CVE-2026-4342) has been identified in ingress-nginx.

This vulnerability enables configuration injection and potential code execution on all versions below v1.13.9, v1.14.5, and v1.15.1.

As ingress-nginx is now EOL (End of Life), users are strongly encouraged to upgrade and migrate immediately.

Details: github.com/kubernetes/kubernet

  • 1
  • 1
  • 0
  • 14h ago

Bluesky

Profile picture fallback
🚨 A high-vulnerability CVE (CVE-2026-4342) has been identified in ingress-nginx. All versions below v1.13.9, v1.14.5, and v1.15.1 are vulnerable. As ingress-nginx is now EOL (End of Life), users are strongly encouraged to upgrade and migrate immediately. Details: github.com/kubernetes/k...
  • 0
  • 1
  • 0
  • 16h ago

Overview

  • Fortinet
  • FortiSwitchManager

09 Dec 2025
Published
20 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
7.62%

Description

A improper verification of cryptographic signature vulnerability in Fortinet FortiOS 7.6.0 through 7.6.3, FortiOS 7.4.0 through 7.4.8, FortiOS 7.2.0 through 7.2.11, FortiOS 7.0.0 through 7.0.17, FortiProxy 7.6.0 through 7.6.3, FortiProxy 7.4.0 through 7.4.10, FortiProxy 7.2.0 through 7.2.14, FortiProxy 7.0.0 through 7.0.21, FortiSwitchManager 7.2.0 through 7.2.6, FortiSwitchManager 7.0.0 through 7.0.5 allows an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML response message.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture fallback

CVE-2025-59718 analysis shows attackers bypassing FortiGate SSO, exfiltrating configs, and establishing persistent VPN access over 2 weeks of dwell time. They targeted hypervisors, DCs, and backup infrastructure—classic pre-ransomware reconnaissance. Detection gaps: firewall config changes blend into routine admin tasks. #CVE202559718 #ransomware #firewall #incidentresponse #threatintel

bit.ly/4cf8M7B

  • 1
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
Rapid7’s IR team was recently engaged around CVE-2025-59718 – a vuln that facilitates SSO login bypass in #Fortinet FortiGate appliances. In a new blog, dive into our investigative methodology, practical detection opportunities & more: r-7.co/3Q0CMwo
  • 0
  • 1
  • 0
  • 15h ago

Overview

  • abetlen
  • llama-cpp-python

10 May 2024
Published
02 Aug 2024
Updated

CVSS v3.1
CRITICAL (9.7)
EPSS
56.67%

KEV

Description

llama-cpp-python is the Python bindings for llama.cpp. `llama-cpp-python` depends on class `Llama` in `llama.py` to load `.gguf` llama.cpp or Latency Machine Learning Models. The `__init__` constructor built in the `Llama` takes several parameters to configure the loading and running of the model. Other than `NUMA, LoRa settings`, `loading tokenizers,` and `hardware settings`, `__init__` also loads the `chat template` from targeted `.gguf` 's Metadata and furtherly parses it to `llama_chat_format.Jinja2ChatFormatter.to_chat_handler()` to construct the `self.chat_handler` for this model. Nevertheless, `Jinja2ChatFormatter` parse the `chat template` within the Metadate with sandbox-less `jinja2.Environment`, which is furthermore rendered in `__call__` to construct the `prompt` of interaction. This allows `jinja2` Server Side Template Injection which leads to remote code execution by a carefully constructed payload.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Llama Drama:AIアプリ開発用Pythonパッケージに重大な欠陥 システムやデータが侵害される恐れ(CVE-2024-34359) | Codebook|Security News yayafa.com/2776397/ #AgenticAi #AI #ArtificialGeneralIntelligence #ArtificialIntelligence #LLAMA #Meta #MetaAI #エージェント型AI #人工知能 #汎用人工知能

  • 0
  • 1
  • 0
  • 7h ago

Bluesky

Profile picture fallback
Llama Drama:AIアプリ開発用Pythonパッケージに重大な欠陥 システムやデータが侵害される恐れ(CVE-2024-34359) | Codebook|Security News https://www.yayafa.com/2776397/ 5月18〜20日:サイバーセキュリティ関連ニュースAIアプリケーション開発用Pythonパッケージに重大な欠陥 システムやデータが侵害される恐れ(CVE-2024-34359) SecurityWeek – May 17 [...]
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • OpenSSL
  • OpenSSL

07 Apr 2026
Published
08 Apr 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

Issue summary: Applications using RSASVE key encapsulation to establish a secret encryption key can send contents of an uninitialized memory buffer to a malicious peer. Impact summary: The uninitialized buffer might contain sensitive data from the previous execution of the application process which leads to sensitive data leakage to an attacker. RSA_public_encrypt() returns the number of bytes written on success and -1 on error. The affected code tests only whether the return value is non-zero. As a result, if RSA encryption fails, encapsulation can still return success to the caller, set the output lengths, and leave the caller to use the contents of the ciphertext buffer as if a valid KEM ciphertext had been produced. If applications use EVP_PKEY_encapsulate() with RSA/RSASVE on an attacker-supplied invalid RSA public key without first validating that key, then this may cause stale or uninitialized contents of the caller-provided ciphertext buffer to be disclosed to the attacker in place of the KEM ciphertext. As a workaround calling EVP_PKEY_public_check() or EVP_PKEY_public_check_quick() before EVP_PKEY_encapsulate() will mitigate the issue. The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.1 and 3.0 are affected by this issue.

Statistics

  • 2 Posts

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Critical OpenSSL Flaw Exposes Sensitive Data: CVE-2026-31790 RSA KEM Vulnerability – Update Now! + Video Introduction: OpenSSL, the ubiquitous cryptographic library securing countless web servers, VPNs, and applications, has disclosed a moderate-severity vulnerability (CVE-2026-31790) in its RSA…
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
OpenSSL releases patch fixing seven vulnerabilities including CVE-2026-31790, a data leakage flaw from uninitialized memory in RSA key encapsulation. Affects versions 3.0 to 3.6. #OpenSSLUpdate #DataLeakage #CVE2026
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0232 Cortex XDR Agent: Local Administrator can disable the agent on Windows (Severity: MEDIUM)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0232
  • 0
  • 0
  • 0
  • 10h ago

Overview

  • FlowiseAI
  • Flowise

22 Sep 2025
Published
22 Sep 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
82.39%

KEV

Description

Flowise is a drag & drop user interface to build a customized large language model flow. In version 3.0.5, Flowise is vulnerable to remote code execution. The CustomMCP node allows users to input configuration settings for connecting to an external MCP server. This node parses the user-provided mcpServerConfig string to build the MCP server configuration. However, during this process, it executes JavaScript code without any security validation. Specifically, inside the convertToValidJSONString function, user input is directly passed to the Function() constructor, which evaluates and executes the input as JavaScript code. Since this runs with full Node.js runtime privileges, it can access dangerous modules such as child_process and fs. This issue has been patched in version 3.0.6.

Statistics

  • 2 Posts

Last activity: 15 hours ago

Bluesky

Profile picture fallback
Flowise AI Agent Builder Under Active CVSS 10.0 RCE Exploitation; 12,000+ Instances Exposed (CVE-2025-59528) #appsec
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
A critical RCE vulnerability in Flowise (CVE-2025-59528) is actively exploited, enabling arbitrary JavaScript execution via CustomMCP. Thousands of systems are at risk without proper updates. #FlowiseRisk #RemoteExecution #USA
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • SaturdayDrive
  • Ninja Forms - File Uploads

07 Apr 2026
Published
08 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.08%

KEV

Description

The Ninja Forms - File Uploads plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'NF_FU_AJAX_Controllers_Uploads::handle_upload' function in all versions up to, and including, 3.3.26. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerability was partially patched in version 3.3.25 and fully patched in version 3.3.27.

Statistics

  • 2 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

#WordPress - Nachrichten direkt aus der PlugIn Hölle live. 🤢

"With over 600,000 downloads, Ninja Forms is a popular WordPress form builder that lets users create forms without coding using a drag-and-drop interface. Its File Upload extension, included in the same suite, serves 90,000 customers."

CVE-2026-0740 severity rating 9.8

"After patch reviews and a partial fix on February 10, the vendor released a complete fix in version 3.3.27, available since March 19."

"Identified as CVE-2026-0740, the issue is currently exploited in attacks. According to WordPress security company Defiant, its Wordfence firewall blocked more than 3,600 attacks over the past 24 hours."

Bin gespannt wie viele Naivlinge es diesmal erwischt? 🙈

Fragen Sie immer einen erfahrenen Spezialisten wie man sein #WordPress sicher betreiben muss. 😊

bleepingcomputer.com/news/secu

#WordPress

  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback

Hackers Take Advantage of Major Vulnerability in Ninja Forms Plugin for WordPress #wordpress

Critical vulnerability in Ninja Forms File Uploads for WordPress prompts urgent action. CVE-2026-0740 allows unauthenticated file uploads and potential remote code execution. Wordfence reports thousands of attacks daily. Upgrade to version 3.3.27+ now: ift.tt/K0kScOZ

Source: ift.tt/K0kScOZ | Image: ift.tt/ufylkGI

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Ivanti
  • Endpoint Manager Mobile

29 Jan 2026
Published
09 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
67.74%

Description

A code injection in Ivanti Endpoint Manager Mobile allowing attackers to achieve unauthenticated remote code execution.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Bluesky

Profile picture fallback
~Cisa~ CISA added actively exploited Ivanti EPMM code injection flaw (CVE-2026-1340) to its KEV catalog. - IOCs: CVE-2026-1340 - #CVE20261340 #Ivanti #ThreatIntel
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Apr 8) CVE-2026-1340 Ivanti Endpoint Manager Mobile (EPMM) のコードインジェクション脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 5h ago
Showing 1 to 10 of 38 CVEs