24h | 7d | 30d

Overview

  • Microsoft
  • ASP.NET Core 10.0

21 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.04%

KEV

Description

Improper verification of cryptographic signature in ASP.NET Core allows an unauthorized attacker to elevate privileges over a network.

Statistics

  • 7 Posts
  • 2 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

#Microsoft issues emergency update for #macOS and #Linux ASP.NET threat

Microsoft released an emergency patch for its ASP.NET Core to fix a high-severity #vulnerability that allows unauthenticated attackers to gain SYSTEM privileges on devices that use the Web development framework to run Linux or macOS apps.

The software maker said Tuesday evening that the vulnerability, tracked as CVE-2026-40372
#ASPNet #security

arstechnica.com/security/2026/

  • 0
  • 1
  • 0
  • 6h ago
Profile picture fallback

CVE-2026-40372 in ASP.NET Core enables privilege escalation via cryptographic validation flaws.
Patch released - but token persistence risk remains without key rotation.

Source: thehackernews.com/2026/04/micr

Follow TechNadu. Insights? 👇

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

CVE-2026-40372: Microsoft Patches ASP.NET Core Privilege Escalation Vulnerability esecurityplanet.com/threats/cv

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
ASP.NET Core vuln (CVE-2026-40372) → SYSTEM access risk. Crypto validation flaw = forged tokens possible. Patch helps, but key rotation is critical. Follow TechNadu for more. Thoughts? #CyberSecurity #Infosec #Microsoft
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
~Cybergcca~ Security updates released for GitLab CE/EE and a critical OOB patch for Microsoft .NET (CVE-2026-40372). - IOCs: CVE-2026-40372 - #GitLab #Microsoft #ThreatIntel
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Microsoft Patches Critical ASP.NET Core CVE-2026-40372 Privilege Escalation Bug thehackernews.com/2026/04/micr...
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • PackageKit
  • PackageKit

22 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
Pending

KEV

Description

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5. A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags` combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`: 1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING. 2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags. 3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.

Statistics

  • 8 Posts
  • 10 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Forgot your root password? No problem! With #PackageKit <= 1.3.4 you can do all the fun root action on any Linux system you have local access to, no privileges required!

Don't like that? Then PLEASE UPDATE your system ASAP to PackageKit >= 1.3.5 or any fixed distro package. Fixes for this vulnerability should already be available everywhere since today.

You can read more about CVE-2026-41651 on the security researcher's blog:
github.security.telekom.com/20

#pack2theroot #osssecurity

  • 3
  • 3
  • 0
  • 20h ago
Profile picture fallback

PackageKit GHSA-f55j-vvr9-69xv / "Pack2TheRoot" / CVE-2026-41651
请尽快更新
All PackageKit versions between >= 1.0.2 and <= 1.3.4 are vulnerable.
Debian 12 1.2.6-5+deb12u1
Debian 13 1.3.1-1+deb13u1
上游修复版本 1.3.5

This release fixes a critical security vulnerability that allows unprivileged local users to obtain root privileges on any distribution that uses PackageKit.

  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback

There is a great report out there by @dtcert

Telekom Red Team (great work guys) found a high severity LPE vulnerability in PackageKit daemon. In the report the distros of Ubuntu, Debian and Fedora and some more are mentioned as affected. Some left traces to hunt for the exploitation comes with the report, which is helpful.

edit: now known as CVE-2026-41651

github.security.telekom.com/20

  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
CVE-2026-41651: TOCTOU vulnerability in PackageKit <= 1.3.4 leads to
local root exploit

https://www.openwall.com/lists/oss-security/2026/04/22/6
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback

La inteligencia artificial avanza en la detección de vulnerabilidades ocultas mientras una gravísima falla permite la escalada de privilegios en Linux; simultáneamente, la lucha entre ingeniería inversa y ofuscación evoluciona, un ataque a la cadena de suministro de npm roba tokens, Mirai ataca routers D-Link y Lotus Wiper amenaza infraestructuras energéticas. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 23/04/26 📆 |====

🔍 DESCUBRIENDO VULNERABILIDADES CON IA AVANZADA

Los agentes basados en modelos de lenguaje grande (LLM) están revolucionando la seguridad informática al detectar vulnerabilidades que han permanecido ocultas durante décadas, superando el alcance de auditores humanos y fuzzers automatizados. Esta innovación es especialmente valiosa en proyectos de código abierto donde se puede analizar e instrumentar el código para mejorar la seguridad. Descubre cómo la inteligencia artificial está transformando el análisis de seguridad y ayudando a proteger mejor nuestro software. Aprende más sobre esta tecnología pionera en detección de fallas aquí 👉 djar.co/8N0H

🐧 ESCALADA DE PRIVILEGIOS EN LINUX: PACK2THEROOT (CVE-2026-41651)

Una grave vulnerabilidad local denominada Pack2TheRoot afecta múltiples distribuciones Linux en sus configuraciones predeterminadas, permitiendo a atacantes escalar privilegios y tomar control elevado del sistema. Este fallo compromete la seguridad fundamental de entornos Linux utilizados en servidores y dispositivos personales. Es crucial actualizar y aplicar parches cuanto antes para evitar riesgos de intrusión y mantener la integridad del sistema. Protege tus sistemas evaluando esta amenaza y las recomendaciones de mitigación. Más detalles y guía para protegerte aquí 👉 djar.co/61Y9L

🛡️ INGENIERÍA INVERSA Y OFUSCACIÓN: LA BATALLA DE LOS MODELOS DE LENGUAJE

Elastic Security Labs analiza la evolución de la ingeniería inversa acelerada por modelos de lenguaje grande frente a técnicas avanzadas de ofuscación de código. Este constante enfrentamiento genera una carrera armamentística digital donde cada avance en descifrar código malicioso se encuentra con nuevos métodos para esconderlo. Entender esta dinámica es clave para desarrolladores y profesionales de la seguridad que buscan proteger aplicaciones y detectar amenazas sofisticadas. Explora en profundidad este fenómeno y sus implicaciones en la defensa cibernética aquí 👉 djar.co/7N5t

🔗 ATAQUE EN LA CADENA DE SUMINISTRO DE NPM: ROBO DE TOKENS DE AUTENTICACIÓN

Un ataque reciente dirigido a la cadena de suministro del ecosistema Node Package Manager (npm) está comprometiendo cuentas de desarrolladores para propagar paquetes maliciosos. El objetivo principal es robar tokens de autenticación, lo que permite a los atacantes infiltrarse en proyectos confiables y expandir el compromiso a través de dependencias legítimas. Esta amenaza resalta la urgencia de implementar controles estrictos en la gestión de paquetes y credenciales, así como monitorizar continuamente la integridad de los entornos de desarrollo. Infórmate sobre cómo detectar y responder a este tipo de ataques aquí 👉 djar.co/NfhU

📡 MIRAI ATACA ROUTERS D-LINK VULNERABLES

La botnet Mirai ha reactivado ataques contra routers antiguos de la marca D-Link aprovechando una vulnerabilidad crítica de inyección de comandos identificada como CVE-2025-29635. Los atacantes emplean solicitudes POST manipuladas para ejecutar comandos maliciosos, comprometiendo la red doméstica o corporativa y usándola para actividades ilícitas. Es fundamental actualizar el firmware de los dispositivos afectados y reforzar la seguridad de la red para evitar ser parte de esta botnet distribuida. Conoce cómo proteger tus routers y detectar la infección aquí 👉 djar.co/HlUz

⚡ LOTUS WIPER: AMENAZA DESTRUCTIVA CONTRA EL SECTOR ENERGÉTICO

Kaspersky reporta un nuevo malware tipo wiper denominado Lotus Wiper, diseñado para sabotear infraestructuras críticas del sector energético y servicios públicos. Esta amenaza altamente destructiva borra datos y provoca interrupciones graves, lo que puede tener consecuencias devastadoras en la estabilidad de los servicios esenciales. La investigación detalla la cadena de ataques y las tácticas empleadas, además de recomendaciones para fortalecer la defensa frente a ciberataques dirigidos que buscan despliegues masivos de daño. Profundiza en este análisis y cómo proteger tu organización aquí 👉 djar.co/cfFu5

  • 1
  • 1
  • 0
  • 1h ago

Bluesky

Profile picture fallback
CVE-2026-41651: TOCTOU vulnerability in PackageKit <= 1.3.4 leads to local root exploit www.openwall.com -> Original->
  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback
Pack2TheRoot (CVE-2026-41651): Cross-Distro Local Privilege Escalation Vulnerability
  • 0
  • 0
  • 1
  • 16h ago

Overview

  • Microsoft
  • Microsoft Defender Antimalware Platform

14 Apr 2026
Published
23 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.06%

Description

Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.

Statistics

  • 6 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

🔴 Dreigingsniveau 84 - HOOG

Vandaag in Nederland en België:
• Eerste NIS2 conformiteitsevaluatie voor Belgische essentiële entiteiten
• MIVD waarschuwt, Chinese cybercapaciteiten evenaren die van de VS
• Cybercriminaliteit stijgt fors in Lier

Nu actief misbruikt:
• CVE-2026-21643, Fortinet FortiClient EMS (CVSS 9.8)
• CVE-2026-33825, Microsoft Defender (CVSS 7.8)
• CVE-2026-32201, Microsoft SharePoint Server (CVSS 6.5)

digiweerbaar.nl/dreigingsradar

#cybersecurity #dreigingsradar #NIS2 #infosec

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture fallback
CISA has added the Microsoft Defender insufficient granularity of access control vulnerability CVE-2026-33825 to its KEV Catalog www.cisa.gov/known-exploi...
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Apr 22) CVE-2026-33825 Microsoft Defenderのアクセス制御の粒度が不十分な脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
~Cisa~ CISA added an actively exploited Microsoft Defender access control flaw to its KEV catalog. - IOCs: CVE-2026-33825 - #CVE2026_33825 #Microsoft #ThreatIntel
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
Windows Defender: Quando fa paura chi ti deve difendere CVE-2026-33825 & UnDefend C’è una differenza enorme tra una vulnerabilità qualunque e una vulnerabilità che tocca il software... www.aiutocomputerhelp.it?p=16772 #BlueHammer #bug_microsoft #RedSun #UnDefend #Windows_Defender #Zero_day
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
A zero-day vulnerability in Microsoft Defender, tracked as CVE-2026-33825, allows privilege escalation through a flaw named BlueHammer.
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Pending

25 Mar 2025
Published
25 Mar 2025
Updated

CVSS
Pending
EPSS
1.25%

KEV

Description

A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.

Statistics

  • 5 Posts
  • 8 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

La inteligencia artificial avanza en la detección de vulnerabilidades ocultas mientras una gravísima falla permite la escalada de privilegios en Linux; simultáneamente, la lucha entre ingeniería inversa y ofuscación evoluciona, un ataque a la cadena de suministro de npm roba tokens, Mirai ataca routers D-Link y Lotus Wiper amenaza infraestructuras energéticas. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 23/04/26 📆 |====

🔍 DESCUBRIENDO VULNERABILIDADES CON IA AVANZADA

Los agentes basados en modelos de lenguaje grande (LLM) están revolucionando la seguridad informática al detectar vulnerabilidades que han permanecido ocultas durante décadas, superando el alcance de auditores humanos y fuzzers automatizados. Esta innovación es especialmente valiosa en proyectos de código abierto donde se puede analizar e instrumentar el código para mejorar la seguridad. Descubre cómo la inteligencia artificial está transformando el análisis de seguridad y ayudando a proteger mejor nuestro software. Aprende más sobre esta tecnología pionera en detección de fallas aquí 👉 djar.co/8N0H

🐧 ESCALADA DE PRIVILEGIOS EN LINUX: PACK2THEROOT (CVE-2026-41651)

Una grave vulnerabilidad local denominada Pack2TheRoot afecta múltiples distribuciones Linux en sus configuraciones predeterminadas, permitiendo a atacantes escalar privilegios y tomar control elevado del sistema. Este fallo compromete la seguridad fundamental de entornos Linux utilizados en servidores y dispositivos personales. Es crucial actualizar y aplicar parches cuanto antes para evitar riesgos de intrusión y mantener la integridad del sistema. Protege tus sistemas evaluando esta amenaza y las recomendaciones de mitigación. Más detalles y guía para protegerte aquí 👉 djar.co/61Y9L

🛡️ INGENIERÍA INVERSA Y OFUSCACIÓN: LA BATALLA DE LOS MODELOS DE LENGUAJE

Elastic Security Labs analiza la evolución de la ingeniería inversa acelerada por modelos de lenguaje grande frente a técnicas avanzadas de ofuscación de código. Este constante enfrentamiento genera una carrera armamentística digital donde cada avance en descifrar código malicioso se encuentra con nuevos métodos para esconderlo. Entender esta dinámica es clave para desarrolladores y profesionales de la seguridad que buscan proteger aplicaciones y detectar amenazas sofisticadas. Explora en profundidad este fenómeno y sus implicaciones en la defensa cibernética aquí 👉 djar.co/7N5t

🔗 ATAQUE EN LA CADENA DE SUMINISTRO DE NPM: ROBO DE TOKENS DE AUTENTICACIÓN

Un ataque reciente dirigido a la cadena de suministro del ecosistema Node Package Manager (npm) está comprometiendo cuentas de desarrolladores para propagar paquetes maliciosos. El objetivo principal es robar tokens de autenticación, lo que permite a los atacantes infiltrarse en proyectos confiables y expandir el compromiso a través de dependencias legítimas. Esta amenaza resalta la urgencia de implementar controles estrictos en la gestión de paquetes y credenciales, así como monitorizar continuamente la integridad de los entornos de desarrollo. Infórmate sobre cómo detectar y responder a este tipo de ataques aquí 👉 djar.co/NfhU

📡 MIRAI ATACA ROUTERS D-LINK VULNERABLES

La botnet Mirai ha reactivado ataques contra routers antiguos de la marca D-Link aprovechando una vulnerabilidad crítica de inyección de comandos identificada como CVE-2025-29635. Los atacantes emplean solicitudes POST manipuladas para ejecutar comandos maliciosos, comprometiendo la red doméstica o corporativa y usándola para actividades ilícitas. Es fundamental actualizar el firmware de los dispositivos afectados y reforzar la seguridad de la red para evitar ser parte de esta botnet distribuida. Conoce cómo proteger tus routers y detectar la infección aquí 👉 djar.co/HlUz

⚡ LOTUS WIPER: AMENAZA DESTRUCTIVA CONTRA EL SECTOR ENERGÉTICO

Kaspersky reporta un nuevo malware tipo wiper denominado Lotus Wiper, diseñado para sabotear infraestructuras críticas del sector energético y servicios públicos. Esta amenaza altamente destructiva borra datos y provoca interrupciones graves, lo que puede tener consecuencias devastadoras en la estabilidad de los servicios esenciales. La investigación detalla la cadena de ataques y las tácticas empleadas, además de recomendaciones para fortalecer la defensa frente a ciberataques dirigidos que buscan despliegues masivos de daño. Profundiza en este análisis y cómo proteger tu organización aquí 👉 djar.co/cfFu5

  • 1
  • 1
  • 0
  • 1h ago

Bluesky

Profile picture fallback
A new Mirai-based malware campaign is actively exploiting CVE-2025-29635, a high-severity command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.
  • 0
  • 5
  • 0
  • 16h ago
Profile picture fallback
Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers securityaffairs.com/191135/malwa...
  • 0
  • 1
  • 0
  • 6h ago
Profile picture fallback
MiraiボットネットはCVE-2025-29635を悪用し、旧型のD-Linkルーターを標的にしている Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers #SecurityAffairs (Apr 22) securityaffairs.com/191135/malwa...
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
A new Mirai campaign exploits CVE-2025-29635 in EoL D-Link DIR-823X routers, using POST to /goform/set_prohibiting for RCE and deploying the multi-arch variant "tuxnokill." Detected globally in March 2026. #DLink #MiraiBotnet #USA
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Microsoft
  • Microsoft SharePoint Enterprise Server 2016

14 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
7.94%

Description

Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 4 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

🔴 Dreigingsniveau 84 - HOOG

Vandaag in Nederland en België:
• Eerste NIS2 conformiteitsevaluatie voor Belgische essentiële entiteiten
• MIVD waarschuwt, Chinese cybercapaciteiten evenaren die van de VS
• Cybercriminaliteit stijgt fors in Lier

Nu actief misbruikt:
• CVE-2026-21643, Fortinet FortiClient EMS (CVSS 9.8)
• CVE-2026-33825, Microsoft Defender (CVSS 7.8)
• CVE-2026-32201, Microsoft SharePoint Server (CVSS 6.5)

digiweerbaar.nl/dreigingsradar

#cybersecurity #dreigingsradar #NIS2 #infosec

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture fallback
“security flaw tracked as CVE-2026-32201 affects SharePoint Enterprise Server 2016, SharePoint Server 2019 & SharePoint Server Subscription Edition (.. latest on-premises version which uses a ‘continuous update’ model).” www.bleepingcomputer.com/news/securit... @microsoft.com @bleepingcomputer.com
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Over 1,300 Microsoft SharePoint servers vulnerable to spoofing attacks (CVE-2026-32201) #patchmanagement
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
Over 1,300 internet-exposed Microsoft SharePoint servers remain unpatched against a spoofing flaw, CVE-2026-32201, posing significant security risks.
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Apple
  • iOS and iPadOS

22 Apr 2026
Published
22 Apr 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: Last hour

Fediverse

Profile picture fallback

support.apple.com/en-us/127002
Impact: Notifications marked for deletion could be unexpectedly retained on the device

Description: A logging issue was addressed with improved data redaction.

CVE-2026-28950

<3

  • 1
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
Apple released urgent updates iOS 26.4.2 and iPadOS 26.4.2 to fix CVE-2026-28950, a bug that retained deleted notification data potentially exposing Signal messages. #iOSUpdate #DataPrivacy #USA
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
Apple released updates iOS 26.4.2 and iPadOS 26.4.2 to fix CVE-2026-28950, a logging flaw that allowed deleted Signal chat notifications to be recovered. The FBI reportedly exploited this in the Prairieland case. #SignalChats #ApplePatch #USA
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
Apple fixes iPhone bug that let FBI retrieve deleted Signal messages(CVE-2026-28950) 📖 Read more: www.helpnetsecurity.com/2026/04/23/c... #cybersecurity #cybersecuritynews #iOS #iPad #vulnerability #privacy @signal.org
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Apache Software Foundation
  • Apache ActiveMQ Broker
  • org.apache.activemq:activemq-broker

07 Apr 2026
Published
17 Apr 2026
Updated

CVSS
Pending
EPSS
59.64%

Description

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Apache ActiveMQ Classic CVE-2026-34197: 13-Year-Old Vulnerability Now Under Active Exploitation, CISA Issues Federal Patch Mandate
#CyberSecurity
securebulletin.com/apache-acti

  • 4
  • 0
  • 0
  • 1h ago

Bluesky

Profile picture fallback
CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation: CVE-2026-34197 "This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise."
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • CrowdStrike
  • LogScale Self-Hosted

21 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.26%

KEV

Description

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does not affect Next-Gen SIEM customers. The vulnerability exists in a specific cluster API endpoint that, if exposed, allows a remote attacker to read arbitrary files from the server filesystem without authentication. Next-Gen SIEM customers are not affected and do not need to take any action. CrowdStrike mitigated the vulnerability for LogScale SaaS customers by deploying network-layer blocks to all clusters on April 7, 2026. We have proactively reviewed all log data and there is no evidence of exploitation. LogScale Self-hosted customers should upgrade to a patched version immediately to remediate the vulnerability. CrowdStrike identified this vulnerability during continuous and ongoing product testing.

Statistics

  • 1 Post
  • 11 Interactions

Last activity: 14 hours ago

Fediverse

Profile picture fallback

@reverseics I went to the Crowdstrike site to see if there was a new advisory and found this instead. Obviously better than any advisory. Even a ../ in CVE-2026-40050.

  • 3
  • 8
  • 0
  • 14h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
20 Mar 2026
Updated

CVSS
Pending
EPSS
0.70%

KEV

Description

Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with maliciously crafted AEAD parameters can trigger a stack buffer overflow. Impact summary: A stack buffer overflow may lead to a crash, causing Denial of Service, or potentially remote code execution. When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is copied into a fixed-size stack buffer without verifying that its length fits the destination. An attacker can supply a crafted CMS message with an oversized IV, causing a stack-based out-of-bounds write before any authentication or tag verification occurs. Applications and services that parse untrusted CMS or PKCS#7 content using AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable. Because the overflow occurs prior to authentication, no valid key material is required to trigger it. While exploitability to remote code execution depends on platform and toolchain mitigations, the stack-based write primitive represents a severe risk. The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the CMS implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue. OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

VDE-2026-029
METTLER TOLEDO: OpenSSL vulnerability in MX and MR balances

MX/MR firmware V2.0.0 or earlier is affected by the OpenSSL vulnerability CVE-2025-15467.
CVE-2025-15467

certvde.com/en/advisories/vde-

mettler-toledo.csaf-tp.certvde

  • 1
  • 1
  • 0
  • 1h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.08%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 20 hours ago
Showing 1 to 10 of 48 CVEs