Overview
- Adobe
- Acrobat Reader
Description
Statistics
- 16 Posts
- 11 Interactions
Fediverse
Adobe Patches Actively Exploited Acrobat Reader Zero-Day CVE-2026-34621 — Exploited Since December 2025
#CyberSecurity
https://securebulletin.com/adobe-patches-actively-exploited-acrobat-reader-zero-day-cve-2026-34621-exploited-since-december-2025/
Geopolitical: US-Iran peace talks failed, raising Strait of Hormuz blockade threat and soaring oil prices (April 12-13).
Tech: Japan allocates $4B for Rapidus to accelerate 2nm AI chip production by 2027 (April 12). Harvard unveils "Cascade" AI for faster quantum error correction (April 12).
Cybersecurity: Adobe issued emergency patch for actively exploited Acrobat zero-day (CVE-2026-34621) (April 12). Iran-linked groups persist in targeting US industrial control systems (April 11-12).
#PDF Adobe Acrobat Reader Critical Vulnerability CVE-2026-34621 affects
* Acrobat DC versions 26.001.21367 and earlier
* Acrobat Reader DC versions 26.001.21367 and earlier
* Acrobat 2024 versions 24.001.30356 and earlier
👇
https://thehackernews.com/2026/04/adobe-patches-actively-exploited.html
Bluesky
Overview
- marimo-team
- marimo
Description
Statistics
- 5 Posts
- 2 Interactions
Fediverse
🚨 Pre-Auth RCE vuln tagged as CVE-2026-39987 (CVSS 9.3) seeing active exploitation in the wild as reported by Vulncheck and Bleeping Computer.
Passively scan infrastructure to find potentially vulnerable instances:
https://github.com/rxerium/rxerium-templates/blob/main/2026/CVE-2026-39987.yaml
An unauthenticated attacker can obtain a full interactive root shell on the server via a single WebSocket connection. No user interaction or authentication token is required, even when authentication is enabled on the marimo instance
https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc
Bluesky
Overview
Description
Statistics
- 2 Posts
- 2 Interactions
Fediverse
Aw jeez. Docker has had a badass authentication bug for a decade gives away the whole farm.
https://hackingpassion.com/docker-authorization-bypass-cve-2026-34040/
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
Fortinet Issues Emergency Patch for Actively Exploited FortiClient EMS Zero-Day CVE-2026-35616
#CyberSecurity
https://securebulletin.com/fortinet-issues-emergency-patch-for-actively-exploited-forticlient-ems-zero-day-cve-2026-35616/
Overview
Description
Statistics
- 1 Post
- 3 Interactions
Fediverse
The pentest professionals at #usdHeroLab identified a vulnerability in #EntraID during a cloud #pentest that allows the circumvention of conditional access policies for privileged identities.
Two additional vulnerabilities were identified during a web application pentest of #Tenable Nessus Manager, which allow low-privileged users to read arbitrary files at the operating system level.
All #vulnerabilities were reported to the vendors as part of our Responsible Disclosure policy.
🔎 You can find detailed information on the #SecurityAdvisories here: https://www.usd.de/en/security-advisories-entra-id-tenable-nessus-manager/
#SecurityResearch #SecurityAdvisory #moresecurity #NessusManager #Pentesting #Hacking #CVE_2026_3493 #AppSec #InfoSec #CyberSecurity
Overview
- Foxit Software Inc.
- Foxit PDF Services API
Description
Statistics
- 1 Post
- 1 Interaction
Overview
- Totolink
- A7100RU
Description
Statistics
- 1 Post
Fediverse
⚠️ CRITICAL OS command injection (CVE-2026-6132) in Totolink A7100RU routers (7.4cu.2313_b20191024). Unauthenticated remote code execution possible. No patch yet — restrict access & monitor closely. Details: https://radar.offseq.com/threat/cve-2026-6132-os-command-injection-in-totolink-a71-401747c5 #OffSeq #CVE20266132 #IoTSecurity
Overview
- axios
- axios
Description
Statistics
- 2 Posts
Overview
- Apache Software Foundation
- Apache Storm Client
- org.apache.storm:storm-client
Description
Statistics
- 1 Post
Fediverse
🔒 CRITICAL: CVE-2026-35337 in Apache Storm Client (<2.8.6) allows authenticated users to achieve RCE via unsafe deserialization in Nimbus/Worker JVMs. Upgrade to 2.8.6 or restrict deserialization classes now! Details: https://radar.offseq.com/threat/cve-2026-35337-cwe-502-deserialization-of-untruste-675b4697 #OffSeq #ApacheStorm #Vuln
Overview
Description
Statistics
- 1 Post