24h | 7d | 30d

Overview

  • InternLM
  • lmdeploy

20 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.03%

KEV

Description

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.

Statistics

  • 7 Posts
  • 6 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

⚠️ LMDeploy flaw exploited within 12.5 hours of disclosure.

The SSRF bug let attackers hit AWS metadata, Redis, and internal services via the image loader to scan networks and access data.

WordPress plugin bugs are also being used for full site takeovers.

🔗 Read → thehackernews.com/2026/04/lmde

  • 0
  • 1
  • 0
  • 13h ago

Bluesky

Profile picture fallback
Une faille critique (CVE-2026-33626, CVSS 7.5) dans LMDeploy, un outil open-source pour le déploiement de LLMs, est activement exploitée dans la nature moins de 13h après sa divulgation ! Il s’agit d’une vulnérabilité SSRF permettant l’accès à des données sensibles thehackernews.com/2026/04/lmde...
  • 3
  • 2
  • 0
  • 10h ago
Profile picture fallback
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure https://thehackernews.com/2026/04/lmdeploy-cve-2026-33626-flaw-exploited.html
  • 0
  • 0
  • 1
  • 14h ago
Profile picture fallback
Threat actors exploited the critical SSRF bug in LMDeploy toolkit just 12 hours after its public disclosure. The vulnerability, CVE-2026-33626, […]
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Exploit su LMDeploy CVE-2026-33626: attacco SSRF immediato dopo disclosure
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
24 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.10%

KEV

Description

Double free in Windows IKE Extension allows an unauthorized attacker to execute code over a network.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

En las últimas 24 horas, se reveló Fast16, un malware sigiloso con impacto nuclear histórico, mientras una grave falla en Windows IKEv2 fue parcheada urgentemente; además, una cadena de suministro comprometida afectó a Bitwarden CLI, un masivo robo de datos sacudió Francia, y avanzan ataques sofisticados con suplantación en Microsoft Teams y uso malicioso de software legítimo por Tropic Trooper. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 24/04/26 📆 |====

🔓 MALWARE FAST16 DESCIFRADO: AMENAZA SILENCIOSA AL PROGRAMA NUCLEAR DE IRÁN

Investigadores revelan Fast16, un código malicioso de 2005 capaz de manipular software de simulación crítica. Se sospecha que pudo haber sido empleado por EE. UU. o aliados para sabotajes encubiertos, precediendo a Stuxnet. Entender su funcionamiento permite fortalecer defensas contra malware avanzado y ataques dirigidos. Descubre todos los detalles sobre esta amenaza histórica y su impacto en la ciberseguridad nuclear. Conoce más sobre Fast16 y su análisis completo aquí 👉 djar.co/f2tf5

🛡️ CADENA DE SUMINISTRO COMPROMETIDA AFECTA A BITWARDEN CLI

Una campaña maliciosa aprovechó la plataforma Checkmarx para infiltrar malware en la versión 2026.4.0 de Bitwarden CLI, exponiendo secretos y distribuyendo código malicioso a usuarios confiables. Este incidente resalta la importancia crítica de auditar y proteger las cadenas de suministro de software, clave para la seguridad integral. Aprende cómo detectar y mitigar riesgos derivados de ataques en la cadena de suministro y protege tus credenciales. Más información relevante en 👉 djar.co/nYZn

⚠️ VULNERABILIDAD CRÍTICA EN WINDOWS IKEV2 (CVE-2026-33824) PERMITÍA EJECUCIÓN REMOTA DE CÓDIGO

Se identificó una falla grave en el servicio IKEv2 de Windows que posibilitaba la ejecución de código remoto, poniendo en riesgo la integridad de miles de sistemas. Microsoft lanzó un parche urgente que debe aplicarse de inmediato para evitar explotación activa. Descubre cómo funciona esta vulnerabilidad y las mejores prácticas para mantener tu entorno seguro frente a amenazas similares. Revisa el aviso de seguridad oficial aquí 👉 djar.co/qhEL

🇫🇷 INCIDENTE EN FRANCIA EXPONE DATOS PERSONALES DE 18 MILLONES DE CIUDADANOS

La Agencia Nacional de Seguridad Documental de Francia confirmó un acceso no autorizado que comprometió documentos de identidad y datos sensibles de millones de personas. Este incidente enfatiza la necesidad de reforzar controles y medidas de protección sobre bases de datos críticas a nivel estatal. Descubre el alcance del evento, las medidas adoptadas y consejos para proteger tus datos personales en escenarios de brechas masivas. Detalles completos en 👉 djar.co/VXYXb

👥 SUSTRACCIÓN DE DATOS CON SUPLANTACIÓN EN MICROSOFT TEAMS: MALWARE SNOW DE UNC6692

El grupo UNC6692 utilizó técnicas de impersonación en Microsoft Teams para engañar a empleados, desplegar el malware SNOW y exfiltrar información confidencial. Esta táctica demuestra la sofisticación en la ingeniería social y la explotación de plataformas de colaboración. Aprende a identificar señales de ataques de suplantación y cómo fortalecer la seguridad en entornos colaborativos para evitar filtraciones. Amplía la información y recomendaciones aquí 👉 djar.co/kQat

🐉 TROPIC TROOPER EMPLEA VERSIONES TROYANIZADAS DE SUMATRAPDF Y GITHUB PARA DESPLEGAR ADAPTIXC2

En 2024, el grupo Tropic Trooper desplegó el malware AdaptixC2 utilizando versiones manipuladas del lector SumatraPDF junto con canales de comando en GitHub, permitiendo acceso encubierto y persistente en redes comprometidas. Este caso resalta la amenaza que representan herramientas legítimas convertidas en vectores de ataque avanzados. Descubre cómo identificar y defenderte de estas campañas sofisticadas que combinan ingeniería de software y abuso de plataformas confiables. Conoce todos los detalles aquí 👉 djar.co/SnJilf

  • 1
  • 1
  • 0
  • 11h ago

Bluesky

Profile picture fallback
ZDIによる今月のWU、IKEv2脆弱性の解析。基本的にFWでブロックし、既知でIKE、NAT-TネゴするところはIP指定で制限したほうがよい、と:Zero Day Initiative — CVE-2026-33824: Remote Code Execution in Windows IKEv2 https://www.zerodayinitiative.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
Zero Day Initiative — CVE-2026-33824: Remote Code Execution in Windows IKEv2 https://www.zerodayinitiative.com/blog/2026/4/22/cve-2026-33824-remote-code-execution-in-windows-ikev2
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Apple
  • iOS and iPadOS

22 Apr 2026
Published
23 Apr 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device.

Statistics

  • 2 Posts
  • 6 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Apple issues iOS/iPadOS 26.4.2 to fix a Notification Services bug (CVE-2026-28950) that could retain deleted-app notification previews — Signal says preserved fragments will be removed after users update. Install now: cyberinsider.com/apple-fixes-i 🔒📱 #iOS #Privacy #Security

  • 2
  • 1
  • 0
  • 19h ago
Profile picture fallback

📰 Apple Rushes Fix for iOS Flaw That Let FBI Recover Deleted Signal Messages

🚨 Apple issues emergency patch for iOS flaw (CVE-2026-28950) that let the FBI recover deleted Signal message notifications. The bug improperly stored notification data, undermining user privacy. Update your iPhone & iPad now! 📱🔒 #iOS #Privacy #In...

🔗 cyber.netsecops.io/articles/ap

  • 2
  • 1
  • 0
  • 4h ago

Overview

  • Pending

25 Mar 2025
Published
24 Apr 2026
Updated

CVSS
Pending
EPSS
1.25%

Description

A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.

Statistics

  • 4 Posts

Last activity: 2 hours ago

Fediverse

Profile picture fallback

📰 Mirai Botnet Exploits Critical Flaw in Discontinued D-Link Routers for DDoS Attacks

🚨 A new Mirai botnet campaign is exploiting a critical RCE flaw (CVE-2025-29635) in discontinued D-Link routers. The devices are EoL and will not be patched. Disconnect them now to prevent them from joining a DDoS botnet! #Mirai #Botnet #IoT #DLink

🔗 cyber.netsecops.io/articles/mi

  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture fallback
新たなMiraiの亜種、生産終了のD-Linkルーターを標的に(CVE-2025-29635) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45390/
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Mirai Botnet exploits CVE-2025-29635 to target legacy D-Link routers https://securityaffairs.com/191135/malware/mirai-botnet-exploits-cve-2025-29635-to-target-legacy-d-link-routers.html
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
~Cisa~ CISA added 4 actively exploited CVEs affecting Samsung, SimpleHelp, and D-Link to the KEV catalog. - IOCs: CVE-2024-7399, CVE-2024-57726, CVE-2025-29635 - #CISA #KEV #ThreatIntel
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Pending

23 Jun 2025
Published
21 Apr 2026
Updated

CVSS
Pending
EPSS
20.00%

Description

An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0 and 10.0 and 10.1. A Cross-Site Scripting (XSS) vulnerability in the Zimbra Classic UI allows attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information. This issue arises from insufficient sanitization of HTML content, specifically involving crafted tag structures and attribute values that include an @import directive and other script injection vectors. The vulnerability is triggered when a user views a crafted e-mail message in the Classic UI, requiring no additional user interaction.

Statistics

  • 3 Posts
  • 5 Interactions

Last activity: 6 hours ago

Bluesky

Profile picture fallback
We are scanning/reporting daily Zimbra Collaboration Suite instances vulnerable to CVE-2025-48700, that can allow unauthorized access to sensitive information. This vulnerability is exploited in the wild and on US CISA KEV. We see over 10.5K IPs unpatched 2026-04-23.
  • 2
  • 3
  • 0
  • 12h ago
Profile picture fallback
CVE-2025-48700 Tracker: dashboard.shadowserver.org/statistics/c... #CyberCivilDefense
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
Over 10,500 Zimbra servers remain vulnerable to CVE-2025-48700, an XSS flaw exploited by APT28 and APT29 in targeted phishing and mass intrusions. CISA lists it in KEV for federal patching. #ZimbraServer #CrossSiteScripting #USA
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • PackageKit
  • PackageKit

22 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.02%

KEV

Description

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5. A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags` combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`: 1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING. 2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags. 3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.

Statistics

  • 3 Posts
  • 4 Interactions

Last activity: 4 hours ago

Bluesky

Profile picture fallback
🧵Pack2TheRoot (CVE-2026-41651): nova vulnerabilitat crítica que afecta la majoria de distribucions Linux. Qualsevol usuari local sense privilegis pot obtenir accés root en cas d'explotar exitosament aquesta vulnerabilitat. Com? 👇🏾
  • 2
  • 2
  • 0
  • 15h ago
Profile picture fallback
Com solucionar-ho Actualitza PackageKit a la versió 1.3.5 o al backport específic de la teva distro: Versions de pedaç per distro: • Fedora 42–44: PackageKit-1.3.4-3 • Debian: tracker CVE-2026-41651 • Ubuntu: Launchpad CVE-2026-41651
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Cisco
  • Cisco Secure Firewall Adaptive Security Appliance (ASA) Software

25 Sep 2025
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
41.43%

Description

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to execute arbitrary code on an affected device. This vulnerability is due to improper validation of user-supplied input in HTTP(S) requests. An attacker with valid VPN user credentials could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to execute arbitrary code as root, possibly resulting in the complete compromise of the affected device.

Statistics

  • 2 Posts
  • 5 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Neu Warnung:
Update #1: Schwerwiegende Sicherheitslücken in Cisco Adaptive Security Appliance - aktiv ausgenutzt - Updates verfügbar cert.at/de/warnungen/2026/4/up

  • 1
  • 2
  • 0
  • 7h ago

Bluesky

Profile picture fallback
FIRESTARTER BackdoorはFirewallそのものを永続的な侵入基盤に変える攻撃です。 ・ファームウェア更新では除去されない ・ログに残らない ・ハード電源断でしか除去不可 CVE-2025-20333(認可不備) CVE-2025-20362(バッファオーバーフロー) 対象機器の特定(最優先) ・Cisco ASA / Firepower / FTD ・インターネット公開機器 パッチだけでは不十分 ・侵害前提で評価 ・過去に露出していたかが重要 フォレンジック前提 ・core dump取得 ・メモリ解析 ・YARA適用
  • 1
  • 1
  • 0
  • 12h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
24 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.3)
EPSS
0.07%

KEV

Description

Protection mechanism failure in Windows Shell allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 2 hours ago

Bluesky

Profile picture fallback
A Shortcut to Coercion: Incomplete Patch of APT28's Zero-Day Leads to CVE-2026-32202 Akamai www.akamai.com/blog/securit...
  • 1
  • 0
  • 0
  • 9h ago
Profile picture fallback
~Akamai~ An incomplete patch for APT28's CVE-2026-21510 leaves a zero-click NTLM authentication coercion flaw (CVE-2026-32202) via malicious LNK files. - IOCs: CVE-2026-32202, CVE-2026-21510, APT28 - #APT28 #CVE2026_32202 #ThreatIntel #ZeroDay
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • F5
  • BIG-IP

15 Oct 2025
Published
31 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
7.45%

Description

When a BIG-IP APM access policy is configured on a virtual server, specific malicious traffic can lead to Remote Code Execution (RCE).   Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 6 hours ago

Bluesky

Profile picture fallback
Approximately a month ago, F5 published advisory on malware deployed to BIG-IP systems vulnerable to CVE-2025-53521. #ESETresearch discovered two related malware components on VirusTotal and named the threat #PoisonedRefresh. 1/6 my.f5.com/manage/s/art...
  • 4
  • 3
  • 0
  • 6h ago

Overview

  • SenseLive
  • X3050

24 Apr 2026
Published
24 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.07%

KEV

Description

A vulnerability in SenseLive X3050’s embedded management service allows full administrative control to be established without any form of authentication or authorization on the SenseLive config application. The service accepts management connections from any reachable host, enabling unrestricted modification of critical configuration parameters, operational modes, and device state through a vendor-supplied or compatible client.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 19 hours ago

Fediverse

Profile picture fallback

SenseLive X3050 V1.523 is at CRITICAL risk (CVE-2026-40620, CVSS 9.3): missing auth lets remote attackers gain admin access. No patch yet — restrict management access, monitor logs, and follow vendor updates. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 19h ago
Showing 1 to 10 of 46 CVEs