24h | 7d | 30d

Overview

  • PackageKit
  • PackageKit

22 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.22%

KEV

Description

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5. A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags` combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`: 1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING. 2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags. 3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.

Statistics

  • 3 Posts
  • 3 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture fallback

Telekom's security team warns: “Pack2TheRoot” (CVE-2026-41651) in PackageKit lets low‑privilege users install/remove system packages and escalate to root — patch to PackageKit ≥1.3.5 and apply distro updates now: heise.de/en/news/Pack2TheRoot- 🔒🐧 #CyberSecurity #Linux

  • 2
  • 1
  • 0
  • 17h ago

Bluesky

Profile picture fallback
A high-severity vulnerability in PackageKit allows unprivileged users to install packages with root privileges, tracked as CVE-2026-41651.
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
A critical TOCTOU race condition in PackageKit (CVE-2026-41651) allows unprivileged users to gain root access by installing arbitrary RPMs. Fixed in PackageKit 1.3.5 and updated in Debian, Ubuntu, Fedora. #Pack2TheRoot #LinuxSecurity #Germany
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • CrowdStrike
  • LogScale Self-Hosted

21 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.32%

KEV

Description

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does not affect Next-Gen SIEM customers. The vulnerability exists in a specific cluster API endpoint that, if exposed, allows a remote attacker to read arbitrary files from the server filesystem without authentication. Next-Gen SIEM customers are not affected and do not need to take any action. CrowdStrike mitigated the vulnerability for LogScale SaaS customers by deploying network-layer blocks to all clusters on April 7, 2026. We have proactively reviewed all log data and there is no evidence of exploitation. LogScale Self-hosted customers should upgrade to a patched version immediately to remediate the vulnerability. CrowdStrike identified this vulnerability during continuous and ongoing product testing.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 10 hours ago

Fediverse

Profile picture fallback

📰 Critical Unauthenticated Path Traversal Flaw Found in CrowdStrike LogScale

🚨 CRITICAL FLAW: CrowdStrike patches an unauthenticated path traversal vulnerability (CVE-2026-40050) in self-hosted LogScale. The bug could allow remote attackers to read any file on the server. Patch immediately! #CyberSecurity #Vulnerability

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

En las últimas 24 horas, se detectaron vulnerabilidades críticas en CrowdStrike LogScale y navegadores Firefox y Tor que permitían accesos no autorizados y seguimiento en modo privado; además, Itron reportó un incidente de seguridad en su red interna y CISA actualizó su lista con fallos explotados en SimpleHelp, Samsung y D-Link. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 27/04/26 📆 |====

🔓 VULNERABILIDAD CRÍTICA EN CROWDSTRIKE LOGSCALE PERMITÍA ACCESO NO AUTORIZADO A ARCHIVOS

CrowdStrike ha corregido la grave falla CVE-2026-40050 que afectaba a LogScale autohospedado. Esta vulnerabilidad de traversal de rutas podía ser explotada por atacantes para acceder a archivos sensibles sin necesidad de autenticación, poniendo en riesgo datos críticos. Actualizar a la última versión es fundamental para proteger su entorno. Conozca más sobre esta amenaza y la solución implementada aquí 👉 djar.co/A0eG

⚠️ ITRON, IMPORTANTE EMPRESA DE SERVICIOS PÚBLICOS, REPORTA INCIDENTE DE SEGURIDAD INFORMÁTICA

Itron reveló un acceso no autorizado detectado el 13 de abril de 2026 en parte de su infraestructura informática. La empresa activó sus protocolos de respuesta y notificó a las autoridades regulatorias para mitigar posibles impactos. Este caso subraya la importancia de la vigilancia continua y respuesta rápida frente a intrusiones en infraestructuras críticas. Detalles completos y medidas tomadas 👉 djar.co/aW8Q

🦊 FALLA EN FIREFOX Y TOR PERMITÍA SEGUIMIENTO ENTRE SITIOS Y FINGERPRINTING EN MODO PRIVADO

El bug CVE-2026-6770 afectaba a Firefox y Tor Browser, posibilitando que atacantes realizaran seguimiento cruzado y obtuvieran huellas digitales del usuario incluso en navegación privada. Las actualizaciones Firefox 150 y Tor Browser 15.0.10 corrigen esta vulnerabilidad, reforzando la privacidad y seguridad del usuario. Asegure sus navegadores actualizados para evitar ser rastreado 👉 djar.co/D31m9

🔐 ITRON CONFIRMA INCIDENTE DE SEGURIDAD EN SU RED INTERNA

Mediante un informe oficial 8-K a la SEC, Itron, Inc. informó que un tercero no autorizado accedió a ciertos sistemas internos, destacando la creciente amenaza contra infraestructuras críticas. La transparencia en la comunicación de incidentes y la pronta reacción son clave para minimizar daños y aumentar la resiliencia. Conozca más sobre la situación y el manejo del incidente aquí 👉 djar.co/YdgE

📋 CISA INCORPORA VULNERABILIDADES DE SIMPLEHELP, SAMSUNG Y D-LINK A SU LISTADO DE FALLOS EXPLOTADOS

La Agencia de Seguridad de Infraestructura y Ciberseguridad de EE. UU. (CISA) ha incluido nuevas vulnerabilidades explotadas activamente en sus registros, afectando productos de SimpleHelp, Samsung y D-Link. Esta actualización alerta a organizaciones y usuarios sobre riesgos inmediatos, recomendando acciones rápidas para parchear y mitigar posibles ataques. Revise la lista completa y los detalles aquí 👉 djar.co/zEJeo

  • 1
  • 1
  • 0
  • 18h ago

Bluesky

Profile picture fallback
CVE-2026-40050 — CrowdStrike LogScale Unauthenticated Path Traversal #patchmanagement
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • Fortinet
  • FortiClientEMS

06 Feb 2026
Published
14 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
43.14%

Description

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Statistics

  • 3 Posts

Last activity: 9 hours ago

Bluesky

Profile picture fallback
🚨 In this week’s newsletter, we cover CVE-2026-21643, a FortiClient EMS SQL injection now under active exploitation. We break down how it moved from advisory to real attacks and what defenders should do next. Read the full analysis and protect your systems 👉 www.crowdsec.net/vulntracking...
  • 0
  • 0
  • 1
  • 16h ago
Profile picture fallback
📢 CVE-2026-21643 : Injection SQL critique dans FortiClient EMS activement exploitée 📝 ## 🔍 Contexte Rapport publié le 27 avril 2026 par CrowdSec sur la pl… https://cyberveille.ch/posts/2026-04-27-cve-2026-21643-injection-sql-critique-dans-forticlient-ems-activement-exploitee/ #CISA_KEV #Cyberveille
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • OpenBSD
  • OpenSSH

02 Apr 2026
Published
02 Apr 2026
Updated

CVSS v3.1
MEDIUM (4.2)
EPSS
0.02%

KEV

Description

OpenSSH before 10.3 mishandles the authorized_keys principals option in uncommon scenarios involving a principals list in conjunction with a Certificate Authority that makes certain use of comma characters.

Statistics

  • 2 Posts

Last activity: 10 hours ago

Fediverse

Profile picture fallback

📰 Decade-Old OpenSSH Flaw (CVE-2026-35414) Allows Full Root Access, Exploits Hard to Detect

🚨 CRITICAL: A 15-year-old flaw in OpenSSH (CVE-2026-35414) allows attackers to gain full root access. The bug is trivial to exploit and hard to detect in logs. Update to OpenSSH 10.3p1 immediately! 🛡️ #OpenSSH #CVE #Linux #CyberSecurity

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 10h ago

Bluesky

Profile picture fallback
A 15-year-old OpenSSH flaw (CVE-2026-35414) mishandles commas in certificate principals, granting full root shell access by bypassing log detection. Fixed in OpenSSH 10.3. #OpenSSHFlaw #RootAccess #USA
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Mozilla
  • Firefox

21 Apr 2026
Published
21 Apr 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Other issue in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 150, Firefox ESR 140.10, Thunderbird 150, and Thunderbird 140.10.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture fallback

A Firefox bug (CVE-2026-6770) allowed cross-site tracking and Tor fingerprinting, even in Private Browsing mode. This vulnerability, which exposed stable identifiers via IndexedDB, has been fixed in Firefox 150 and Tor Browser 15.0.10.
securityaffairs.com/191374/sec

  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback

En las últimas 24 horas, se detectaron vulnerabilidades críticas en CrowdStrike LogScale y navegadores Firefox y Tor que permitían accesos no autorizados y seguimiento en modo privado; además, Itron reportó un incidente de seguridad en su red interna y CISA actualizó su lista con fallos explotados en SimpleHelp, Samsung y D-Link. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 27/04/26 📆 |====

🔓 VULNERABILIDAD CRÍTICA EN CROWDSTRIKE LOGSCALE PERMITÍA ACCESO NO AUTORIZADO A ARCHIVOS

CrowdStrike ha corregido la grave falla CVE-2026-40050 que afectaba a LogScale autohospedado. Esta vulnerabilidad de traversal de rutas podía ser explotada por atacantes para acceder a archivos sensibles sin necesidad de autenticación, poniendo en riesgo datos críticos. Actualizar a la última versión es fundamental para proteger su entorno. Conozca más sobre esta amenaza y la solución implementada aquí 👉 djar.co/A0eG

⚠️ ITRON, IMPORTANTE EMPRESA DE SERVICIOS PÚBLICOS, REPORTA INCIDENTE DE SEGURIDAD INFORMÁTICA

Itron reveló un acceso no autorizado detectado el 13 de abril de 2026 en parte de su infraestructura informática. La empresa activó sus protocolos de respuesta y notificó a las autoridades regulatorias para mitigar posibles impactos. Este caso subraya la importancia de la vigilancia continua y respuesta rápida frente a intrusiones en infraestructuras críticas. Detalles completos y medidas tomadas 👉 djar.co/aW8Q

🦊 FALLA EN FIREFOX Y TOR PERMITÍA SEGUIMIENTO ENTRE SITIOS Y FINGERPRINTING EN MODO PRIVADO

El bug CVE-2026-6770 afectaba a Firefox y Tor Browser, posibilitando que atacantes realizaran seguimiento cruzado y obtuvieran huellas digitales del usuario incluso en navegación privada. Las actualizaciones Firefox 150 y Tor Browser 15.0.10 corrigen esta vulnerabilidad, reforzando la privacidad y seguridad del usuario. Asegure sus navegadores actualizados para evitar ser rastreado 👉 djar.co/D31m9

🔐 ITRON CONFIRMA INCIDENTE DE SEGURIDAD EN SU RED INTERNA

Mediante un informe oficial 8-K a la SEC, Itron, Inc. informó que un tercero no autorizado accedió a ciertos sistemas internos, destacando la creciente amenaza contra infraestructuras críticas. La transparencia en la comunicación de incidentes y la pronta reacción son clave para minimizar daños y aumentar la resiliencia. Conozca más sobre la situación y el manejo del incidente aquí 👉 djar.co/YdgE

📋 CISA INCORPORA VULNERABILIDADES DE SIMPLEHELP, SAMSUNG Y D-LINK A SU LISTADO DE FALLOS EXPLOTADOS

La Agencia de Seguridad de Infraestructura y Ciberseguridad de EE. UU. (CISA) ha incluido nuevas vulnerabilidades explotadas activamente en sus registros, afectando productos de SimpleHelp, Samsung y D-Link. Esta actualización alerta a organizaciones y usuarios sobre riesgos inmediatos, recomendando acciones rápidas para parchear y mitigar posibles ataques. Revise la lista completa y los detalles aquí 👉 djar.co/zEJeo

  • 1
  • 1
  • 0
  • 18h ago

Overview

  • Moxa
  • EDR-8010 Series

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.09%

KEV

Description

An improper handling of the length parameter inconsistency vulnerability has been identified in Moxa’s Secure Router. Because of improper validation of length parameters in the HTTPS management interface, an unauthenticated remote attacker could send specially crafted requests that trigger a buffer overflow condition, causing the web service to become unresponsive. Successful exploitation may result in a denial-of-service condition requiring a device reboot to restore normal operation. While successful exploitation can severely impact the availability of the affected device, no impact to the confidentiality or integrity of the affected product has been identified. Additionally, no confidentiality, integrity, or availability impact to the subsequent system has been identified.

Statistics

  • 2 Posts

Last activity: 13 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: CVE-2026-3868 affects Moxa EDR-8010 v1.0 routers. Remote attackers can trigger a DoS via HTTPS mgmt interface buffer overflow. No patch yet — restrict access & monitor for outages. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 22h ago

Bluesky

Profile picture fallback
~Cybergcca~ CCCS issued 9 advisories, highlighting critical flaws in IBM, VMware, and Notepad++. - IOCs: CVE-2026-3867, CVE-2026-3868 - #PatchManagement #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Apple
  • iOS and iPadOS

22 Apr 2026
Published
23 Apr 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

A logging issue was addressed with improved data redaction. This issue is fixed in iOS 18.7.8 and iPadOS 18.7.8, iOS 26.4.2 and iPadOS 26.4.2. Notifications marked for deletion could be unexpectedly retained on the device.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 21 hours ago

Fediverse

Profile picture fallback

Apple Notfall-Update gegen Datenschutz-Loch

Apple hat gerade iOS/iPadOS 26.4.2 und iOS/iPadOS 18.7.8 veröffentlicht. Der einzige Zweck dieser Updates außer der Reihe besteht darin, die Sicherheitslücke CVE-2026-28950 zu schließen. Apple verschweigt (hier und hier), dass das FBI diese Lücke bereits ausgenutzt hat, um Informationen aus dem iPhone eines Verdächtigen auszulesen, die eigentlich geschützt sein sollten. Das geht so:

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Mobilfunk #Warnung #0day #apple #chat #datenschutz #ios #messenger #privacy #privatsphäre #sicherheit #spionage #UnplugApple #UnplugTrump #wissen

  • 4
  • 3
  • 0
  • 21h ago

Overview

  • Microsoft
  • Windows 10 Version 1507

10 Jun 2025
Published
26 Feb 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
49.24%

Description

Improper access control in Windows SMB allows an authorized attacker to elevate privileges over a network.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 16 hours ago

Bluesky

Profile picture fallback
Authentication reflection attacks are still not dead! In our new blogpost series, @yaumn.bsky.social shares his journey into bypassing the mitigations of CVE-2025-33073 to pop SYSTEM shells again! 🚀 👇 www.synacktiv.com/en/node/1337
  • 2
  • 1
  • 0
  • 16h ago

Overview

  • Tenda
  • F456

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.05%

KEV

Description

A vulnerability was detected in Tenda F456 1.0.0.5. Affected is the function fromGstDhcpSetSer of the file /goform/GstDhcpSetSer of the component httpd. Performing a manipulation of the argument dips results in buffer overflow. Remote exploitation of the attack is possible. The exploit is now public and may be used.

Statistics

  • 1 Post
  • 3 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture fallback

🛡️ CVE-2026-7081: HIGH-severity buffer overflow in Tenda F456 v1.0.0.5 (fromGstDhcpSetSer, httpd). Remote exploit possible, no patch yet. Limit remote access & watch for Tenda updates. Details: radar.offseq.com/threat/cve-20

  • 2
  • 1
  • 0
  • 23h ago

Overview

  • elixir-plug
  • plug_cowboy
  • plug_cowboy

27 Apr 2026
Published
28 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

Allocation of Resources Without Limits or Throttling vulnerability in elixir-plug plug_cowboy allows unauthenticated remote denial of service via atom table exhaustion. Plug.Cowboy.Conn.conn/1 in lib/plug/cowboy/conn.ex calls String.to_atom/1 on the value returned by :cowboy_req.scheme/1. For HTTP/2 connections, cowlib passes the client-supplied :scheme pseudo-header value through verbatim without validation. Each unique value permanently allocates a new entry in the BEAM atom table. Since atoms are never garbage-collected and the atom table has a fixed limit (default 1,048,576), an unauthenticated attacker can exhaust the table by sending HTTP/2 requests with unique :scheme values, causing the Erlang VM to abort with system_limit and taking down the entire node. This vulnerability does not affect HTTP/1.1, where cowboy derives the scheme from the listener type rather than from a client-supplied header. This issue affects plug_cowboy: from 2.0.0 before 2.8.1.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

If you're using plug_cowboy, update to the newly-released v2.8.1 to patch a denial-of-service vulnerability related to atom exhaustion.

cna.erlef.org/cves/CVE-2026-32

#ElixirLang

  • 1
  • 1
  • 0
  • 15h ago
Showing 1 to 10 of 131 CVEs