24h | 7d | 30d

Overview

  • InternLM
  • lmdeploy

20 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

LMDeploy is a toolkit for compressing, deploying, and serving large language models. Versions prior to 0.12.3 have a Server-Side Request Forgery (SSRF) vulnerability in LMDeploy's vision-language module. The `load_image()` function in `lmdeploy/vl/utils.py` fetches arbitrary URLs without validating internal/private IP addresses, allowing attackers to access cloud metadata services, internal networks, and sensitive resources. Version 0.12.3 patches the issue.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 12 hours ago

Fediverse

Profile picture fallback

LMDeploy CVE-2026-33626 Flaw Exploited Within 13 Hours of Disclosure thehackernews.com/2026/04/lmde

  • 1
  • 0
  • 1
  • 12h ago

Overview

  • Pending

07 Jun 2023
Published
20 Dec 2025
Updated

CVSS
Pending
EPSS
90.37%

Description

TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 was discovered to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 15 hours ago

Bluesky

Profile picture fallback
CVE-2023-33538の悪用未遂に関する詳細分析 #CybersecurityNews unit42.paloaltonetworks.com/exploitation...
  • 0
  • 1
  • 0
  • 15h ago

Overview

  • Microsoft
  • Microsoft SharePoint Enterprise Server 2016

14 Apr 2026
Published
28 Apr 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
7.94%

Description

Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 3 Posts

Last activity: 14 hours ago

Bluesky

Profile picture fallback
⚠️ #SharePoint CVE-2026-32201 #Alerta: Guía de mitigación para bloquear el exploit sin romper tu flujo de trabajo | #Ciberseguridad www.newstecnicas.info.ve/2026/04/shar...
  • 0
  • 0
  • 2
  • 14h ago

Overview

  • Foxit Software Inc.
  • Foxit PDF Editor

27 Apr 2026
Published
27 Apr 2026
Updated

CVSS v3.1
MEDIUM (5.5)
EPSS
0.01%

KEV

Description

Flaws in page lifecycle management allow document structure changes to desynchronize internal component states, causing subsequent operations to access invalidated objects and crash the program.

Statistics

  • 1 Post

Last activity: 11 hours ago

Fediverse

Profile picture fallback

📰 Foxit PDF Reader Flaw (CVE-2026-5942) Could Lead to Information Disclosure

📄 Foxit PDF Reader users: A use-after-free flaw (CVE-2026-5942) has been disclosed. It can leak sensitive info and requires opening a malicious file. A patch is available. #Foxit #Vulnerability #CyberSecurity #PatchNow

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Pending

06 Jul 2022
Published
03 Aug 2024
Updated

CVSS
Pending
EPSS
0.28%

KEV

Description

IOBit Advanced System Care (Asc.exe) 15 and Action Download Center both download components of IOBit suite into ProgramData folder, ProgramData folder has "rwx" permissions for unprivileged users. Low privilege users can use SetOpLock to wait for CreateProcess and switch the genuine component with a malicious executable thus gaining code execution as a high privilege user (Low Privilege -> high integrity ADMIN).

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture fallback

Just an update on the IObit Advanced SystemCare zero-day I posted about a couple days ago. I mentioned in that post VulDB marked it as a duplicate of CVE-2022-24138 and while I agree with the root cause analysis being the same (ProgramData permission issues) the actual exploit chain is quite different. I found a named pipe that lets a low-priv user trigger a SYSTEM integrity file write on-demand. Since IObit has a concrete history of not replying to researchers and history repeats, here is the full write-up:

github.com/usernameone101/Writ

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Totolink
  • A8000RU

28 Apr 2026
Published
28 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.89%

KEV

Description

A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. The impacted element is the function setWiFiEasyGuestCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument merge results in os command injection. It is possible to launch the attack remotely. The exploit has been released to the public and may be used for attacks.

Statistics

  • 1 Post

Last activity: 17 hours ago

Fediverse

Profile picture fallback

Totolink A8000RU (v7.1cu.643_b20200521) faces CRITICAL OS command injection (CVE-2026-7244, CVSS 9.3). Remote, unauthenticated exploit possible. No patch yet — restrict mgmt access & monitor for updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Totolink
  • A8000RU

28 Apr 2026
Published
28 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.89%

KEV

Description

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. The affected element is the function setRadvdCfg of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument maxRtrAdvInterval leads to os command injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-7243: Critical OS command injection in Totolink A8000RU (7.1cu.643_b20200521). Remote, unauthenticated RCE risk — public exploit out, no patch yet. Lock down management access & monitor for updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Microsoft
  • Windows 11 version 21H2

11 Jun 2024
Published
17 Dec 2025
Updated

CVSS v3.1
HIGH (7.8)
EPSS
54.34%

KEV

Description

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture fallback

Exploiting Reversing (ER) series: article 09 | Exploitation Techniques: CVE-2024-30085 (part 03)

Today I am releasing the nineth article in the Exploiting Reversing Series (ERS). In “Exploitation Techniques | CVE-2024-30085 (Part 09)” I provide a 106-page deep dive and a comprehensive roadmap for vulnerability exploitation:

exploitreversing.com/2026/04/2

Key features of this edition:

[+] Dual Exploit Strategies: Two distinct exploit editions built on the cldflt.sys heap overflow.
[+] PreviousMode Edition: Exploit cldflt.sys via WNF OOB + Pipe Attributes + ALPC + _KTHREAD.PreviousMode flip: elevation of privilege of a regular user to SYSTEM.
[+] PPL Bypass Edition: Exploit cldflt.sys via WNF OOB + PreviousMode flip + _EPROCESS.Protection strip + MiniDumpWriteDump: elevation of regular user to SYSTEM.
[+] Solid Reliability: Two complete, stable exploits, including a multi-step cleanup phase that restores the corrupted pipe attribute Flink and _KTHREAD.PreviousMode before process exit, preventing crash on cleanup.

This article guides you through two additional techniques for exploiting the CVE-2024-30085 Heap Buffer Overflow. While demonstrated here, these methods can be adapted as exploitation techniques for many other kernel targets.

I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback!

The following articles will continue the miniseries about iOS and Chrome, which are my areas of research.

Enjoy the reading and have an excellent day.

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • CrowdStrike
  • LogScale Self-Hosted

21 Apr 2026
Published
21 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.32%

KEV

Description

CrowdStrike has released security updates to address a critical unauthenticated path traversal vulnerability (CVE-2026-40050) in LogScale. This vulnerability only requires mitigation by customers that host specific versions of LogScale and does not affect Next-Gen SIEM customers. The vulnerability exists in a specific cluster API endpoint that, if exposed, allows a remote attacker to read arbitrary files from the server filesystem without authentication. Next-Gen SIEM customers are not affected and do not need to take any action. CrowdStrike mitigated the vulnerability for LogScale SaaS customers by deploying network-layer blocks to all clusters on April 7, 2026. We have proactively reviewed all log data and there is no evidence of exploitation. LogScale Self-hosted customers should upgrade to a patched version immediately to remediate the vulnerability. CrowdStrike identified this vulnerability during continuous and ongoing product testing.

Statistics

  • 1 Post

Last activity: 9 hours ago

Bluesky

Profile picture fallback
CrowdStrike recently disclosed a critical vulnerability, tracked as CVE-2026-40050, affecting its LogScale self-hosted product. The flaw enables unauthenticated path traversal, which could allow a remote attacker to read arbitrary files from the server filesystem.
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Microsoft
  • Microsoft Office 2019

13 Feb 2024
Published
21 Oct 2025
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
92.99%

Description

Microsoft Outlook Remote Code Execution Vulnerability

Statistics

  • 1 Post

Last activity: 19 hours ago

Fediverse

Profile picture fallback

CVE-2024-21413 (CVSS 9.8) is actively exploited and bypasses Outlook Protected View to enable remote code execution and NTLM hash theft. Here’s the enterprise risk breakdown, detection strategy, and mitigation roadmap security leaders need now.

thecybermind.co/2026/04/28/bri

  • 0
  • 0
  • 0
  • 19h ago
Showing 11 to 20 of 35 CVEs