Overview
Description
Statistics
- 11 Posts
- 4 Interactions
Fediverse
Fortinet customers confront actively exploited zero-day, with a full patch still pending https://cyberscoop.com/fortinet-forticlient-ems-zero-day-cve-2026-35616-hotfix-known-exploited/
"Fortinet on April 4 released a hotfix for a critical 9.8 bug in FortiClient EMS 7.4.5 and 7.4.6, saying that it had observed exploitation in the wild.
The API access bypass flaw – tracked as CVE-2026-35616 – was first reported to Fortinet by DefusedCyber, which posted on X about the bug early Saturday morning."
https://www.scworld.com/news/fortinet-issues-easter-weekend-hotfix-for-forticlient-ems
CVE-2026-35616 : déjà exploitée, cette faille Fortinet a été patchée en urgence ! https://www.it-connect.fr/cve-2026-35616-deja-exploitee-cette-faille-fortinet-a-ete-patchee-en-urgence/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Fortinet
The authentication bypass flaw, tracked as CVE-2026-35616, is the latest in a series of Fortinet vulnerabilities that have been exploited in the wild. https://www.darkreading.com/vulnerabilities-threats/fortinet-emergency-patch-forticlient-zero-day
Geopolitical tensions rise as Trump issues a Strait of Hormuz ultimatum amidst Middle East oil disruptions (Apr 7). In cybersecurity, North Korea's UNC4736 is linked to a $285M crypto heist (Apr 6), and a critical Fortinet zero-day (CVE-2026-35616) is under active exploitation (Apr 6-7). Technology advances with Fortrea launching AI-enhanced clinical trial solutions (Apr 7).
Fortinet issues emergency weekend patch for actively exploited FortiClient EMS zero-day
Over the weekend, Fortinet released an emergency security update for a critical FortiClient Enterprise Management Server (EMS) vulnerability (CVSS 9.1), after confirming it is being actively exploited in the wild. The flaw, CVE-2026-35616, is a pre-authentication access control issue that enables attackers to bypass authentication protections and gain elevated privileges on…
Bluesky
Overview
- FlowiseAI
- Flowise
Description
Statistics
- 4 Posts
- 5 Interactions
Fediverse
The Flowise AI Agent Builder is actively being exploited due to a critical CVSS 10.0 remote code execution vulnerability (CVE-2025-59528), affecting over 12,000 exposed instances. This flaw allows attackers to execute arbitrary JavaScript code, leading to potential system compromise and data exfiltration.
https://thehackernews.com/2026/04/flowise-ai-agent-builder-under-active.html
Bluesky
Overview
Description
Statistics
- 3 Posts
- 4 Interactions
Fediverse
Docker Flaw (CVE-2026-34040) Lets Attackers Bypass Security Controls and Take Over Hosts https://www.esecurityplanet.com/threats/docker-flaw-cve-2026-34040-lets-attackers-bypass-security-controls-and-take-over-hosts/
Bluesky
Overview
Description
Statistics
- 2 Posts
Fediverse
React2Shell (CVE-2025-55182) se explota para robar secretos en masa en apps Next.js
Una campaña automatizada está explotando React2Shell (CVE-2025-55182) para lograr RCE preautenticación en aplicaciones Next.js y desplegar recolección de secretos a gran escala. Tras comprometer el servidor, los atacantes exfiltran variables de entorno, tokens, claves SSH y credenciales cloud, por lo que cualquier secreto accesible desde el host debe considerarse comprometido...
Bluesky
Overview
Description
Statistics
- 2 Posts
Fediverse
Overview
- Progress
- ShareFile Storage Zones Controller
Description
Statistics
- 1 Post
- 7 Interactions
Bluesky
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Overview
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
#OT #Advisory VDE-2026-013
Helmholz: Use of a Broken or Risky Cryptographic Algorithm
Vulnerabilities in PROFINET-Switch devices with firmware <= V1.12.010 that allow an attacker to gain control over the device.
#CVE CVE-2016-2183
https://certvde.com/en/advisories/vde-2026-013/
#oCSAF
#CSAF https://helmholz.csaf-tp.certvde.com/.well-known/csaf/white/2026/vde-2026-013.json
Overview
Description
Statistics
- 1 Post
- 1 Interaction
Fediverse
CISA just added CVE-2023-48788 to its Known Exploited Vulnerabilities catalog and is giving federal agencies until Friday to patch FortiClient EMS.
Read more: https://steelefortress.com/nuy028
Overview
- pac4j
- pac4j-jwt
Description
Statistics
- 1 Post
- 1 Interaction