24h | 7d | 30d

Overview

  • Fortinet
  • FortiClientEMS

04 Apr 2026
Published
04 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.03%

KEV

Description

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Statistics

  • 17 Posts
  • 8 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

New FortiClient EMS flaw exploited in attacks, emergency patch released bleepingcomputer.com/news/secu

  • 0
  • 0
  • 1
  • 18h ago
Profile picture fallback

US-Iran geopolitical tensions escalate with downed aircraft and President Trump's threats. (Apr 5, 2026) On technology, Microsoft announced a ¥1.6 trillion investment in Japan for AI infrastructure and cybersecurity. (Apr 4, 2026) In cybersecurity, a critical Fortinet EMS zero-day (CVE-2026-35616) is actively exploited, and the EU Commission confirmed a 300GB data breach from a Trivy supply chain attack. (Apr 4, 2026)

#Cybersecurity #Geopolitics #TechNews

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

US President Trump issued an ultimatum to Iran: reopen the Strait of Hormuz by Tuesday or face strikes, intensifying Middle East tensions and driving up oil prices. NVIDIA unveiled new GPU compression technology, while a Chinese chipmaker claims a 300% performance lead over Nvidia's flagship GPU. In cybersecurity, Fortinet patched an actively exploited critical flaw (CVE-2026-35616) in FortiClient EMS. April has seen a surge in ransomware, including the Marquis fintech attack exposing 672,000 records.

#Cybersecurity #Geopolitics #TechNews

  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback

Una avanzada IA ha detectado más de 500 vulnerabilidades zero-day en software open source, mientras Fortinet parchea una falla crítica explotada en FortiClient EMS; además, se revelan brechas en la memoria GPU de Chrome WebGL, en wrappers de curl, y en sistemas industriales MB Connect Line, poniendo en riesgo infraestructuras clave. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 06/04/26 📆 |====

🔍 AI DESCUBRE MÁS DE 500 VULNERABILIDADES ZERO-DAY EN SOFTWARE OPEN SOURCE

Una avanzada inteligencia artificial identificó más de 500 vulnerabilidades de día cero en software de código abierto ampliamente usado, incluyendo fallos críticos que permiten a atacantes comprometer dispositivos mediante engaños sofisticados. Este hallazgo subraya la urgente necesidad de reforzar la seguridad en proyectos comunitarios y la importancia de integrar IA en auditorías de seguridad. Conoce los detalles y el impacto de esta investigación 👉 djar.co/RBFJr

🛡️ FORTINET SOLUCIONA FALLA GRAVE ACTIVAMENTE EXPLOTADA EN FORTICLIENT EMS

Fortinet lanzó parches críticos para corregir la vulnerabilidad CVE-2026-35616 en su producto FortiClient EMS, que estaba siendo explotada en ataques reales. La falla permitía a atacantes ejecutar código malicioso a distancia, poniendo en riesgo la infraestructura de seguridad de múltiples organizaciones. Es vital actualizar de inmediato para evitar compromisos. Infórmate aquí sobre cómo proteger tus sistemas 👉 djar.co/Uj8Xsj

⚠️ VULNERABILIDAD EN MEMORIA DE GPU EN ANGLE AFECTA A CHROME WEBGL

Se detectó una vulnerabilidad en ANGLE, componente clave para la aceleración gráfica WebGL en Chrome, donde la memoria de GPU no inicializada puede filtrar información sensible. Esta falla podría ser explotada para obtener datos confidenciales mediante técnicas de explotación específicas. Mantente al tanto de esta amenaza y cómo mitigarla a tiempo 👉 djar.co/e9LY

🔓 INYECCIÓN DE COMANDOS EN APLICACIÓN QUE ENVUELVE CURL

Una vulnerabilidad de inyección de comandos ha sido reportada en un wrapper o script interno que utiliza curl, producto de un manejo inseguro de parámetros no estándar como “-guid”. Esta brecha puede permitir la ejecución arbitraria de código y comprometer sistemas que dependan de esta herramienta. Revisa las recomendaciones para proteger tus entornos aquí 👉 djar.co/C5FudE

🔧 VULNERABILIDADES CRÍTICAS EN PRODUCTOS MB CONNECT LINE PONEN EN JAQUE SISTEMAS INDUSTRIALES

Expertos de SySS GmbH identificaron múltiples fallos de seguridad graves en productos de MB connect line, con potencial para permitir accesos no autorizados y afectar sistemas industriales críticos. Estas vulnerabilidades exigen atención inmediata por parte de empresas que utilizan esta tecnología para evitar interrupciones y filtraciones de datos. Descubre el informe completo y medidas preventivas 👉 djar.co/NCrie

🚀 PRIMERA HACKATHON NACIONAL DE COLOMBIA PARA IMPULSAR EL FUTURO DIGITAL DEL PAÍS

Este evento busca reunir talento innovador para desarrollar soluciones tecnológicas que transformen el panorama digital colombiano. Inscribirte es tu oportunidad para ser protagonista en la creación de un ecosistema más seguro y eficiente. No pierdas la chance de participar y potenciar tus habilidades 👉 djar.co/X7hk

🔍 ANÁLISIS DE UNA VULNERABILIDAD EN ASIGNACIÓN DE MEMORIA DEL KERNEL UTILIZANDO GHIDRA

Explora cómo técnicas avanzadas de ingeniería inversa con Ghidra revelan fallos críticos en la gestión de memoria del núcleo en software vulnerable clásico, abriendo la puerta a exploits sofisticados a nivel kernel. Esta investigación aporta valiosas lecciones para desarrolladores y analistas de seguridad. Aprende más sobre este caso y sus implicaciones 👉 djar.co/eTRwj

  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback

“Fortinet has released an emergency weekend security update for a new critical FortiClient Enterprise Management Server (EMS) vulnerability that is actively exploited in attacks.

Tracked as CVE-2026-35616, the flaw is an improper access control vulnerability that allows unauthenticated attackers to execute code or commands via specially crafted requests.”

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback

Fortinet corrige una vulnerabilidad crítica explotada activamente en FortiClient EMS (CVE-2026-35616)

Fortinet ha lanzado un hotfix de emergencia para CVE-2026-35616, una vulnerabilidad crítica en FortiClient EMS que ya se está explotando. El fallo permite a atacantes no autenticados eludir controles de la API y lograr ejecución de código o comandos en instalaciones afectadas, por lo que parchear de inmediato es prioritario.v

unaaldia.hispasec.com/2026/04/

  • 0
  • 0
  • 0
  • 1h ago

Bluesky

Profile picture fallback
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 1
  • 1
  • 0
  • 16h ago
Profile picture fallback
Fortinet patches critical CVE-2026-35616 affecting FortiClient EMS 7.4.5–7.4.6, allowing unauthenticated API access bypass and remote code execution. Update to 7.4.7 to fix. #Fortinet #APIBypass #USA
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
BREAKING: Fortinet has issued an emergency patch for a critical FortiClient EMS vulnerability (CVE-2026-35616) that is already being actively exploited in attacks.
  • 0
  • 0
  • 0
  • 12h ago
Profile picture fallback
FortiClient EMSのゼロデイ脆弱性が悪用されました。緊急ホットフィックスが利用可能です(CVE-2026-35616) FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616) #HelpNetSecurity (Apr 4) www.helpnetsecurity.com/2026/04/04/f...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
FortiClient EMSのゼロデイ悪用が確認される ホットフィックスも緊急リリース(CVE-2026-35616) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45037/
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
CVE-2026-35616: Fortinet fixes actively exploited high-severity flaw https://securityaffairs.com/190392/hacking/cve-2026-35616-fortinet-fixes-actively-exploited-high-severity-flaw.html
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
Heads up FortiClient EMS users! CVE-2026-35616 (new) & CVE-2026-21643 - both unauthenticated RCE observed to be exploited in the wild! We fingerprint about 2000 instances globally, see public Dashboard: dashboard.shadowserver.org/statistics/i... Top affected: US & Germany
  • 1
  • 5
  • 0
  • 19h ago
Profile picture fallback
Patch info: CVE-2026-35616 (0day reported by Defused Cyber): fortiguard.fortinet.com/psirt/FG-IR-... CVE-2026-21643: fortiguard.fortinet.com/psirt/FG-IR-...
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
URGENT: 2,000+ FortiClient EMS Servers Hacked – Active RCE Zero-Days Exposed! (CVE-2026-35616 & CVE-2026-21643) + Video Introduction: FortiClient Enterprise Management Server (EMS) is a centralized console for managing endpoint security across an organization, but its exposure to the public…
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 5 Posts
  • 10 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback
[RSS] New RCE in Control Web Panel (CVE-2025-70951)

https://fenrisk.com/rce-centos-webpanel-2
  • 0
  • 0
  • 0
  • 4h ago

Bluesky

Profile picture fallback
There's a new unauth remote code execution bug in the CentOS Control Web Panel web hosting toolkit, tracked as CVE-2025-70951, that will need patching in the coming days fenrisk.com/rce-centos-w...
  • 4
  • 6
  • 1
  • 20h ago
Profile picture fallback
[RSS] New RCE in Control Web Panel (CVE-2025-70951) fenrisk.com -> Original->
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
Remote code execution in CentOS Web Panel - CVE-2025-70951
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Qualcomm, Inc.
  • Snapdragon

01 Jul 2024
Published
01 Aug 2024
Updated

CVSS v3.1
HIGH (8.4)
EPSS
0.18%

KEV

Description

Memory corruption while handling user packets during VBO bind operation.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture fallback
[RSS] A Technical Deep Dive into CVE-2024-23380: Exploiting GPU Memory Corruption to Android Root

https://androidoffsec.withgoogle.com/posts/a-technical-deep-dive-into-cve-2024-23380-exploiting-gpu-memory-corruption-to-android-root/
  • 0
  • 1
  • 0
  • 17h ago

Bluesky

Profile picture fallback
[RSS] A Technical Deep Dive into CVE-2024-23380: Exploiting GPU Memory Corruption to Android Root androidoffsec.withgoogle.com -> Original->
  • 0
  • 1
  • 0
  • 17h ago

Overview

  • Cisco
  • Cisco Enterprise NFV Infrastructure Software

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.03%

KEV

Description

A vulnerability in the change password functionality of Cisco Integrated Management Controller (IMC) could allow an unauthenticated, remote attacker to bypass authentication and gain access to the system as Admin. This vulnerability is due to incorrect handling of password change requests. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to bypass authentication, alter the passwords of any user on the system, including an Admin user, and gain access to the system as that user.

Statistics

  • 2 Posts

Last activity: 9 hours ago

Bluesky

Profile picture fallback
Cisco IMCの認証バイパスの脆弱性により、攻撃者がユーザーパスワードを変更できる可能性があります(CVE-2026-20093) Cisco IMC auth bypass vulnerability allows attackers to alter user passwords (CVE-2026-20093) #HelpNetSecurity (Apr 3) www.helpnetsecurity.com/2026/04/03/c...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: (CVE-2026-20093) Cisco IMC Authentication Bypass" and "Emerging Threat: (CVE-2026-27876) Grafana Remote Code Execution via SQL Expressions". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Meta
  • react-server-dom-webpack

03 Dec 2025
Published
26 Feb 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
66.27%

Description

A pre-authentication remote code execution vulnerability exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 including the following packages: react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack. The vulnerable code unsafely deserializes payloads from HTTP requests to Server Function endpoints.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 22 hours ago

Bluesky

Profile picture fallback
Hackers are running a large-scale campaign to steal credentials in an automated way after exploiting React2Shell (CVE-2025-55182) in vulnerable Next.js apps.
  • 3
  • 4
  • 0
  • 22h ago

Overview

  • Belkin
  • F9K1015

06 Apr 2026
Published
06 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A security vulnerability has been detected in Belkin F9K1015 1.00.10. Impacted is the function formSetSystemSettings of the file /goform/formSetSystemSettings of the component Setting Handler. The manipulation of the argument webpage leads to stack-based buffer overflow. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 3 hours ago

Fediverse

Profile picture fallback

📢 CVE-2026-5628: HIGH severity stack buffer overflow in Belkin F9K1015 (v1.00.10). Remotely exploitable — no patch yet. Restrict mgmt access & disable remote mgmt until fixed. Info: radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 3h ago

Overview

  • Belkin
  • F9K1015

06 Apr 2026
Published
06 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A vulnerability was identified in Belkin F9K1015 1.00.10. This issue affects the function formReboot of the file /goform/formReboot. The manipulation of the argument webpage leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 6 hours ago

Fediverse

Profile picture fallback

🔔 CVE-2026-5613: HIGH severity stack-based buffer overflow in Belkin F9K1015 v1.00.10. Remote code execution or DoS possible. No patch; exploit public. Restrict mgmt interface, disable remote mgmt. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 6h ago

Overview

  • Fortinet
  • FortiClientEMS

06 Feb 2026
Published
31 Mar 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.07%

KEV

Description

An improper neutralization of special elements used in an sql command ('sql injection') vulnerability in Fortinet FortiClientEMS 7.4.4 may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Statistics

  • 3 Posts
  • 6 Interactions

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Heads up FortiClient EMS users! CVE-2026-35616 (new) & CVE-2026-21643 - both unauthenticated RCE observed to be exploited in the wild! We fingerprint about 2000 instances globally, see public Dashboard: dashboard.shadowserver.org/statistics/i... Top affected: US & Germany
  • 1
  • 5
  • 0
  • 19h ago
Profile picture fallback
Patch info: CVE-2026-35616 (0day reported by Defused Cyber): fortiguard.fortinet.com/psirt/FG-IR-... CVE-2026-21643: fortiguard.fortinet.com/psirt/FG-IR-...
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
URGENT: 2,000+ FortiClient EMS Servers Hacked – Active RCE Zero-Days Exposed! (CVE-2026-35616 & CVE-2026-21643) + Video Introduction: FortiClient Enterprise Management Server (EMS) is a centralized console for managing endpoint security across an organization, but its exposure to the public…
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.18%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture fallback

CVE-2026-4747

Re what's quoted in the opening post at <forums.freebsd.org/threads/102>, please note that Nicholas Carlini has not yet made a public statement about findings.

(I should not treat notebookcheck.net as an authoritative source on this matter.)

#FreeBSD #security

  • 0
  • 2
  • 0
  • 19h ago

Overview

  • Belkin
  • F9K1015

06 Apr 2026
Published
06 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A vulnerability has been found in Belkin F9K1015 1.00.10. Affected by this issue is the function formWISP5G of the file /goform/formWISP5G. Such manipulation of the argument webpage leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: Belkin F9K1015 (v1.00.10) stack buffer overflow (CVE-2026-5610) in /goform/formWISP5G. Remotely exploitable, no patch yet. Restrict device exposure & monitor for anomalies. More at radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 9h ago
Showing 1 to 10 of 21 CVEs