24h | 7d | 30d

Overview

  • Microsoft
  • Microsoft Defender Antimalware Platform

14 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.04%

KEV

Description

Insufficient granularity of access control in Microsoft Defender allows an authorized attacker to elevate privileges locally.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 11 hours ago

Fediverse

Profile picture fallback

⚡ Researchers confirm exploitation of three Microsoft Defender flaws—one patched (CVE-2026-33825) , two unpatched.

Attackers escalate privileges and can block Defender updates.

🔗 Learn how these flaws are used in attacks → thehackernews.com/2026/04/thre

  • 0
  • 1
  • 0
  • 21h ago

Bluesky

Profile picture fallback
CVE-2026-33825 deep-dive: The researcher commented out the full credential dump. Here's what that means.
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
BlueHammer, RedSun, and UnDefend: Weaponized Microsoft Defender Zero-Days Are Already in the Wild—Assume Compromise Now + Video Introduction: Three actively exploited zero-day vulnerabilities in Microsoft Defender—BlueHammer (CVE-2026-33825, patched), RedSun (unpatched), and UnDefend…
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
~Sophos~ Microsoft patched 163 CVEs, including an actively exploited SharePoint zero-day (CVE-2026-32201) and a 9.8 CVSS IKE RCE. - IOCs: CVE-2026-32201, CVE-2026-33824, CVE-2026-33825 - #PatchTuesday #ThreatIntel #ZeroDay
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • TBK
  • DVR-4104

13 Apr 2024
Published
01 Aug 2024
Updated

CVSS v3.1
MEDIUM (6.3)
EPSS
83.86%

KEV

Description

A vulnerability was found in TBK DVR-4104 and DVR-4216 up to 20240412 and classified as critical. This issue affects some unknown processing of the file /device.rsp?opt=sys&cmd=___S_O_S_T_R_E_A_MAX___. The manipulation of the argument mdb/mdc leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-260573 was assigned to this vulnerability.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 5 hours ago

Bluesky

Profile picture fallback
Mirai Variant Nexcorium Exploits CVE-2024-3721 to Hijack TBK DVRs for DDoS Botnet #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 1
  • 0
  • 5h ago
Profile picture fallback
Nexcorium Mirai Strikes TBK DVRs: How CVE-2024-3721 Fuels a New DDoS Botnet Apocalypse + Video Introduction: The convergence of legacy IoT devices and unpatched vulnerabilities has given rise to a new generation of botnets. Attackers are actively exploiting CVE-2024-3721 in TBK DVRs to deploy the…
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • ShowDoc
  • ShowDoc

29 Apr 2025
Published
19 Nov 2025
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
2.03%

KEV

Description

An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution.This issue affects ShowDoc: before 2.8.7.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

📢⚠️ Hackers are exploiting a 5-year-old #ShowDoc vulnerability (CVE-2025-0520) to deploy web shells, enabling RCE and full server takeover worldwide.

Read: hackread.com/showdoc-vulnerabi

#CyberSecurity #Vulnerability #CyberAttacks

  • 0
  • 0
  • 1
  • 1h ago

Bluesky

Profile picture fallback
📢⚠️ Hackers are exploiting a 5-year-old #ShowDoc vulnerability (CVE-2025-0520) to deploy web shells, enabling RCE and full server takeover worldwide. Read: hackread.com/showdoc-vuln... #CyberSecurity #Vulnerability #CyberAttacks
  • 0
  • 1
  • 0
  • 1h ago

Overview

  • Apache Software Foundation
  • Apache ActiveMQ Broker
  • org.apache.activemq:activemq-broker

07 Apr 2026
Published
17 Apr 2026
Updated

CVSS
Pending
EPSS
46.64%

Description

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 5 hours ago

Fediverse

Profile picture fallback

CISA Adds Apache ActiveMQ CVE-2026-34197 to KEV Catalog as Active Exploitation Surges
#CyberSecurity
securebulletin.com/cisa-adds-a

  • 5
  • 0
  • 0
  • 5h ago

Overview

  • Microsoft
  • PowerShell 7.4

14 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
0.11%

KEV

Description

Improper input validation in Microsoft PowerShell allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 1 Post
  • 4 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture fallback

I just published a post on the new PowerShell CVE (CVE-2026-26143) with tips and guidance to ensure you are protected.

I breakdown, who’s affected, how to check, and what to do next.

dowst.dev/powershell-vulnerabi

#PowerShell #CyberSecurity #DevOps #Automation

  • 3
  • 1
  • 0
  • 21h ago

Overview

  • wolfSSL
  • wolfSSL

09 Apr 2026
Published
10 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.03%

KEV

Description

Missing hash/digest size and OID checks allow digests smaller than allowed when verifying ECDSA certificates, or smaller than is appropriate for the relevant key type, to be accepted by signature verification functions. This could lead to reduced security of ECDSA certificate-based authentication if the public CA key used is also known. This affects ECDSA/ECC verification when EdDSA or ML-DSA is also enabled.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 21 hours ago

Bluesky

Profile picture fallback
🧵CVE-2026-5194: vulnerabilitat crítica a wolfSSL, la biblioteca TLS present en 5.000 milions de dispositius, principalment IoT, electrònica de xarxa, automoció, PLCs industrials i equipament mèdic. La vulnerabilitat permet als atacants fer acceptar certificats falsificats com a
  • 0
  • 2
  • 0
  • 21h ago

Overview

  • The GNU C Library
  • glibc

16 May 2025
Published
26 Feb 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

Untrusted LD_LIBRARY_PATH environment variable vulnerability in the GNU C Library version 2.27 to 2.38 allows attacker controlled loading of dynamically shared library in statically compiled setuid binaries that call dlopen (including internal dlopen calls after setlocale or calls to NSS functions such as getaddrinfo).

Statistics

  • 1 Post
  • 1 Interaction

Last activity: Last hour

Bluesky

Profile picture fallback
Analysis of CVE-2025-4802: glibc 2.27-2.38 fails to sanitize LD_LIBRARY_PATH before dlopen() in statically linked SUID binaries, allowing arbitrary library loading and LPE. allelesecurity.com/libc-vuln-an... Infosec
  • 0
  • 1
  • 0
  • Last hour

Overview

  • Keisuke Nakayama
  • awkblog

11 Jun 2024
Published
14 Mar 2025
Updated

CVSS
Pending
EPSS
2.49%

KEV

Description

OS command injection vulnerability exists in awkblog v0.0.1 (commit hash:7b761b192d0e0dc3eef0f30630e00ece01c8d552) and earlier. If a remote unauthenticated attacker sends a specially crafted HTTP request, an arbitrary OS command may be executed with the privileges of the affected product on the machine running the product.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 10 hours ago

Fediverse

Profile picture fallback

awkといえば、awkblogのOSコマンドインジェクションの脆弱性CVE-2024-36360 が公開されたのと、そのdiffが出たのとを見て、PoCを書いてみた思い出。

github.com/yammerjp/awkblog/is

  • 0
  • 1
  • 0
  • 10h ago

Overview

  • HappySeaFox
  • sail

18 Apr 2026
Published
18 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.04%

KEV

Description

SAIL is a cross-platform library for loading and saving images with support for animation, metadata, and ICC profiles. Prior to commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302, the TGA codec's RLE decoder in `tga.c` has an asymmetric bounds check vulnerability. The run-packet path (line 297) correctly clamps the repeat count to the remaining buffer space, but the raw-packet path (line 305-311) has no equivalent bounds check. This allows writing up to 496 bytes of attacker-controlled data past the end of a heap buffer. Commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302 patches the issue.

Statistics

  • 1 Post

Last activity: 12 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-40494 in HappySeaFox sail (<45d48d1f2e8...) enables out-of-bounds write in TGA decoder. Heap overflow risk — update to commit 45d48d1f2e8e0d73e80bc1fd5310cb57f4547302. No exploits seen yet. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 12h ago

Overview

  • neutrinolabs
  • xrdp

17 Apr 2026
Published
17 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.04%

KEV

Description

xrdp is an open source RDP server. In versions through 0.10.5, xrdp does not implement verification for the Message Authentication Code (MAC) signature of encrypted RDP packets when using the "Classic RDP Security" layer. While the sender correctly generates signatures, the receiving logic lacks the necessary implementation to validate the 8-byte integrity signature, causing it to be silently ignored. An unauthenticated attacker with man-in-the-middle (MITM) capabilities can exploit this missing check to modify encrypted traffic in transit without detection. It does not affect connections where the TLS security layer is enforced. This issue has been fixed in version 0.10.6. If users are unable to immediately upgrade, they should configure xrdp.ini to enforce TLS security (security_layer=tls) to ensure end-to-end integrity.

Statistics

  • 1 Post

Last activity: 18 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-32105 (CRITICAL): neutrinolabs xrdp <0.10.6 does not validate MAC on Classic RDP Security layer, allowing MITM attackers to modify encrypted traffic. Upgrade to 0.10.6 or enforce TLS in xrdp.ini! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 18h ago
Showing 1 to 10 of 40 CVEs