24h | 7d | 30d

Overview

  • OpenClaw
  • OpenClaw

31 Mar 2026
Published
02 Apr 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.01%

KEV

Description

OpenClaw before 2026.3.28 contains a privilege escalation vulnerability in the /pair approve command path that fails to forward caller scopes into the core approval check. A caller with pairing privileges but without admin privileges can approve pending device requests asking for broader scopes including admin access by exploiting the missing scope validation in extensions/device-pair/index.ts and src/infra/device-pairing.ts.

Statistics

  • 7 Posts
  • 88 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

OpenClaw also got a terrifying privilege escalation vulnerability nvd.nist.gov/vuln/detail/CVE-2

Meanwhile the OpenClaw founder is claiming shush, it's no big deal, probably most of these aren't really exploitable! (There's good business interest reasons to argue that, since OpenClaw's founders got acquired by OpenAI) news.ycombinator.com/item?id=4

Okay. I know I have more than a few security researchers following me. There's a public list of literally hundreds of thousands of publicly accessible OpenClaw instances right here: openclaw.allegro.earth/

Anyone try taking a sampling of them and testing how vulnerable against recent escalation CVEs they are? Could be a rather juicy writeup!

  • 31
  • 55
  • 0
  • 7h ago
Profile picture fallback

En las últimas 24 horas, se revelaron graves vulnerabilidades: exploits kernel en Wi-Fi Mediatek, fallos de inyección en Claude Code que exfiltran credenciales, ataques Rowhammer que comprometen GPUs Nvidia, una falla Linux oculta 23 años, escalada de privilegios en OpenClaw y un ataque a la cadena de suministro NPM por ingeniería social; además, una investigación alerta sobre la aceptación pasiva de errores en IA. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 04/04/26 📆 |====

🔐 KERNEL ALCHEMY PT. 1: DESARROLLO DE PRIMITIVAS DE EXPLOITS CON CVE-2025-20741

Descubre el inicio de una serie que profundiza en la creación de primitivas de exploits en kernels, ejemplificado con vulnerabilidades críticas en el controlador Wi-Fi Mediatek MT76xx. Esta investigación aporta técnicas avanzadas para entender y mitigar fallos que podrían ser explotados para comprometer sistemas desde el núcleo. Aprende cómo estos exploits se desarrollan y cómo proteger tus dispositivos. Más detalles técnicos aquí 👉 djar.co/GrtG2W

⚠️ VULNERABILIDAD CRÍTICA EN CLAUDE CODE: 3 FALLOS DE INYECCIÓN DE COMANDOS QUE PERMITEN EXFILTRACIÓN DE CREDENCIALES

Phoenix Security reveló tres fallas CWE-78 en la CLI de Claude Code que abren la puerta a ataques de inyección de comandos durante procesos de integración y despliegue continuo (CI/CD). Esto representa una grave amenaza para la seguridad de pipelines y la integridad de las credenciales, con potenciales consecuencias devastadoras para la infraestructura de desarrollo. Conoce cómo detectar y proteger tus entornos contra estas vulnerabilidades. Profundiza en la investigación aquí 👉 djar.co/w0mAl

💥 NUEVOS ATAQUES ROWHAMMER COMPROMETEN MÁQUINAS CON GPU NVIDIA

Se han identificado ataques Rowhammer que no solo afectan la memoria GPU de Nvidia, sino que también permiten el control total de la CPU del sistema. Esto representa un riesgo significativo para la seguridad de los dispositivos que dependen de estas tarjetas gráficas, ya que pueden ser vulnerados a nivel de hardware. Infórmate sobre cómo funcionan estos ataques y las posibles medidas defensivas para proteger tus sistemas. Explora el análisis completo aquí 👉 djar.co/uZi4

🐧 VULNERABILIDAD EN LINUX OCULTA DURANTE 23 AÑOS DESCUBIERTA POR CLAUDE CODE

Una sorprendente vulnerabilidad en Linux, que pasó desapercibida por más de dos décadas, ha sido detectada gracias a las avanzadas capacidades de Claude Code en análisis de seguridad. Este hallazgo pone en evidencia la importancia de las auditorías profundas y continuas en sistemas considerados maduros. Entiende las implicaciones de esta falla y cómo proteger los sistemas Linux frente a amenazas ocultas. Lee la investigación completa aquí 👉 djar.co/w9N53F

🛡️ CVE-2026-33579: GUÍA PARA CORREGIR LA ESCALADA DE PRIVILEGIOS EN OPENCLAW

Presentamos una guía detallada para mitigar la vulnerabilidad crítica CVE-2026-33579 en OpenClaw, que permite escalada de privilegios. Incluye información sobre los sistemas afectados, parches disponibles y métodos para detectar intentos de explotación en tiempo real. Mantén tus entornos seguros implementando estas recomendaciones de inmediato. Accede a la guía práctica aquí 👉 djar.co/8xKb

🤖 INVESTIGACIÓN REVELA QUE USUARIOS DE IA ACEPTAN RESPUESTAS INCORRECTAS DE LLM SIN CUESTIONAR

Un estudio reciente muestra que muchos usuarios de grandes modelos de lenguaje (LLM) tienden a "rendirse" y aceptar sin críticas respuestas inexactas o erróneas. Esta conducta pone en riesgo la autonomía cognitiva y la toma de decisiones informadas, especialmente en contextos donde la precisión es vital. Conoce los resultados de esta investigación y reflexiona sobre el uso responsable de la inteligencia artificial. Descubre más detalles aquí 👉 djar.co/boCW

🕵️‍♂️ ATAQUE A LA CADENA DE SUMINISTRO DE NPM TRAS INGENIERÍA SOCIAL AL MANTENEDOR DE AXIOS

El grupo UNC1069 ejecutó un ataque de ingeniería social exitoso contra el mantenedor de Axios, una librería con más de 100 millones de descargas semanales. Este incidente expone la vulnerabilidad crítica en la cadena de suministro de software y la necesidad de fortalecer los controles de seguridad en proyectos open source para proteger a millones de usuarios y empresas. Entérate de cómo ocurrió y qué medidas adoptar para prevenir incidentes similares. Lee el informe completo aquí 👉 djar.co/8BES

  • 0
  • 1
  • 0
  • 11h ago

Bluesky

Profile picture fallback
OpenClaw privilege-escalation bug https://nvd.nist.gov/vuln/detail/CVE-2026-33579 https://news.ycombinator.com/item?id=47628608
  • 0
  • 0
  • 1
  • 22h ago
Profile picture fallback
CVE-2026-33579: OpenClaw Privilege Escalation Fix Guide #machinelearning #ai
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
https://nvd.nist.gov/vuln/detail/CVE-2026-33579 OpenClawの旧バージョンに権限昇格の脆弱性が発見されました。 特定のコマンドパスで、呼び出し元のスコープ検証が欠如しているとのことです。 管理者権限のないユーザーが、より広範な権限を持つデバイス要求を承認できる可能性があります。
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Fortinet
  • FortiClientEMS

04 Apr 2026
Published
04 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Statistics

  • 7 Posts
  • 4 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

🚨 CRITICAL: CVE-2026-35616 affects Fortinet FortiClientEMS 7.4.5 – 7.4.6. Unauthenticated attackers can run code via crafted requests — leading to total system compromise. Official fix is out. Patch ASAP! radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 21h ago
Profile picture fallback

🚨 Forticlient EMS Zero Day disclosed minutes ago actively being exploited in the wild as being report by @DefusedCyber & @fortinet

I've created a vulnerability detection script to check for vulnerable instances:
github.com/rxerium/rxerium-tem

Fortinet recommends that you install hotfixes for EMS 7.4.5 / 7.4.6 as per their advisory:
fortiguard.com/psirt/FG-IR-26-

  • 1
  • 0
  • 0
  • 15h ago
Profile picture fallback

FortiYikes at it again..

🔐 CVE-2026-35616

📊 CVSS: 9.1 · Critical
📅 04/04/2026, 05:31 AM
🛡️ CWE: CWE-284
📦 Affected: Fortinet FortiClientEMS (>= 7.4.5, <= 7.4.6)
📚 fortiguard.fortinet.com/psirt/ nvd.nist.gov/vuln/detail/CVE-2

🔗 hecate.pw/vulnerability/CVE-20

#cve #vulnerability #hecate

  • 1
  • 0
  • 0
  • 14h ago
Profile picture fallback

Geopolitical tensions escalate as the Iran War continues, leading to the functional closure of the Strait of Hormuz, severely impacting global energy markets. In cybersecurity, the European Commission confirmed a 300GB data breach on April 4, 2026, stemming from a Trivy supply chain attack. Additionally, critical RCE flaws in Progress ShareFile were reported on April 3, 2026, and an actively exploited FortiClient EMS zero-day (CVE-2026-35616) necessitated urgent hotfixes on April 4, 2026.

#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
CVE-2026-35616: Fortinet FortiClient EMS API Auth Bypass – Active Exploitation Demands Immediate Patching + Video Introduction: A critical improper access control vulnerability (CWE-284) in Fortinet FortiClient EMS, tracked as CVE-2026-35616 with a CVSS score of 9.1, is now being actively…
  • 1
  • 0
  • 0
  • 14h ago
Profile picture fallback
Critical Fortinet FortiClient EMS Zero-Day (CVE-2026-35616): Unauthenticated RCE Exploited in the Wild – Emergency Hotfix Required! + Video Introduction: A critical zero-day vulnerability in Fortinet FortiClient EMS, tracked as CVE-2026-35616 with a CVSSv3 score of 9.1 (Critical), is being…
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Google
  • Chrome

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
3.03%

Description

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 4 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Geopolitical tensions rise as Iran's Strait of Hormuz blockade severely disrupts shipping, causing global oil price surges. In cybersecurity, Google issued an emergency patch for a Chrome zero-day (CVE-2026-5281) actively exploited, alongside critical F5 BIG-IP and Citrix NetScaler vulnerabilities under exploitation. The tech sector saw OpenAI secure $122B in funding, with Oracle cutting jobs for AI infrastructure investments. Social media companies face new addiction lawsuits.

#Cybersecurity #Geopolitics #TechNews

  • 0
  • 0
  • 1
  • 19h ago
Profile picture fallback

CISA just added CVE-2026-5281, a vulnerability in Google Dawn, to its Known Exploited Vulnerabilities catalog. Dawn is the WebGPU implementation used across Chromium-based browsers, which means this flaw has a wide attack surface touching Chrome, Edge, and other...

Read more: steelefortress.com/jycnya

Cybersecurity

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 10 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

Fedify security updates: 1.9.7, 1.10.6, 2.0.10, and 2.1.3

If you use Fedify, update to a patched release now. A high-severity denial-of-service vulnerability (CVE-2026-34148) affects Fedify's remote document loader and authenticated document loader. Both follow HTTP redirects without a redirect limit or loop detection. An attacker-controlled server can return a redirect loop for a keyId or actor URL fetch, causing a single inbound ActivityPub request to keep issuing outbound requests until the fetch times out.

All versions up to and including 2.1.0 are affected. Patched releases are 1.9.7, 1.10.6, 2.0.10, and 2.1.3. Update with your package manager:

npm update @fedify/fedify
yarn upgrade @fedify/fedify
pnpm update @fedify/fedify
bun update @fedify/fedify
deno update @fedify/fedify

After updating, redeploy. If you run other Fedify-based servers, update those too.

Thanks to Abhinav Jaswal for the report and responsible disclosure. Disclosure was coordinated with Ghost so they had time to ship their update.

If anything is unclear, ask below.

  • 10
  • 0
  • 0
  • 15h ago

Overview

  • IceWhaleTech
  • ZimaOS

03 Apr 2026
Published
03 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.04%

KEV

Description

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Cloudflare Tunnel) to make requests to internal localhost services. This results in unauthenticated access to internal-only endpoints and sensitive local services when the product is reachable from the Internet through a Cloudflare Tunnel. This issue has been patched in version 1.5.3.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 18 hours ago

Bluesky

Profile picture fallback
Critical ZimaOS Vulnerability (CVE-2026-28798): How a Cloudflare Tunnel Exposed Internal Networks to Unauthenticated SSRF + Video Introduction Server-Side Request Forgery (SSRF) attacks allow adversaries to abuse application functionality to make requests from the vulnerable server, often pivoting…
  • 0
  • 1
  • 0
  • 18h ago

Overview

  • GNU
  • GNU SASL

19 Jul 2022
Published
03 Aug 2024
Updated

CVSS v3.1
LOW (3.8)
EPSS
0.07%

KEV

Description

GNU SASL libgsasl server-side read-out-of-bounds with malicious authenticated GSS-API client

Statistics

  • 1 Post

Last activity: 4 hours ago

Bluesky

Profile picture fallback
Critical Security Update for Ubuntu 22.04 & Fedora Sysadmins A new libpng patch (2025-b9e4e5a954) fixes a GSSAPI OOB read vulnerability (CVE-2022-2469) that could crash your authentication servers. Read more: 👉 tinyurl.com/vs4fxhu5 #Ubuntu #Fedora
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • CrewAI
  • CrewAI

30 Mar 2026
Published
31 Mar 2026
Updated

CVSS
Pending
EPSS
0.04%

KEV

Description

The CrewAI CodeInterpreter tool falls back to SandboxPython when it cannot reach Docker, which can enable RCE through arbitrary C function calling.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
CrewAI Vulnerabilities Expose Devices to Hacking (CVE-2026-2275) #appsec
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • MervinPraison
  • PraisonAI

03 Apr 2026
Published
03 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

PraisonAI is a multi-agent teams system. Prior to version 4.5.97, OAuthManager.validate_token() returns True for any token not found in its internal store, which is empty by default. Any HTTP request to the MCP server with an arbitrary Bearer token is treated as authenticated, granting full access to all registered tools and agent capabilities. This issue has been patched in version 4.5.97.

Statistics

  • 1 Post

Last activity: 22 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL vuln in PraisonAI (<4.5.97): CVE-2026-34953 allows any bearer token to bypass auth & gain full access to all agent capabilities. Patch to 4.5.97+ now! No exploits yet. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 22h ago

Overview

  • GIGABYTE
  • Gigabyte Control Center

30 Mar 2026
Published
31 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
0.37%

KEV

Description

Gigabyte Control Center developed by GIGABYTE has an Arbitrary File Write vulnerability. When the pairing feature is enabled, unauthenticated remote attackers can write arbitrary files to any location on the underlying operating system, leading to arbitrary code execution or privilege escalation.

Statistics

  • 1 Post

Last activity: 16 hours ago

Bluesky

Profile picture fallback
GIGABYTE Control Center vulnerable to arbitrary file write flaw (CVE-2026-4415) #patchmanagement
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Sourceforge
  • Snes9K 0.0.9z

04 Apr 2026
Published
04 Apr 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
Pending

KEV

Description

Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Port Number field that allows local attackers to trigger a structured exception handler (SEH) overwrite. Attackers can craft a malicious payload and paste it into the Socket Port Number field via the Netplay Options menu to achieve code execution through SEH chain exploitation.

Statistics

  • 1 Post

Last activity: Last hour

Fediverse

Profile picture fallback

Turns out "published date" != when the CVE actually happened, e.g. https://nvd.nist.gov/vuln/detail/CVE-2018-25251 was apparently published as recently as April (!), even though there were PoCs many years before.

So at least some of the uptick is reporting.

Interestingly when you search by the "CVE-YYYY" keyword, the difference between 2026 and 2025 appears to mostly disappear. Although searching by "CVE-YYYY" dredges up any instances of that string in any vulnerability (even if it's not a typo). So I don't think that's necessarily an accurate figure.

There's an actual JSON feed which likely sorts out this issue at https://nvd.nist.gov/vuln/data-feeds#APIS but it's too late at night for me to dig into it.

  • 0
  • 0
  • 0
  • Last hour
Showing 1 to 10 of 25 CVEs