24h | 7d | 30d

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
15 Apr 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.06%

KEV

Description

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows TCP/IP allows an unauthorized attacker to execute code over a network.

Statistics

  • 4 Posts
  • 2 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture fallback

Microsoft patch tuesday:
- 167 zranitelností včetně 2 zero-days (Sharepoint, Defender)
- 8 kritických, z toho 7 RCE (.NET, Office, Remote desktop client, AD, IKE, TCP/IP(!))
- bez započítání 80 opravených zranitelností v Edge / Chromiu

Velmi zajímavě vypadá CVE-2026-33827: msrc.microsoft.com/update-guid

Vychází i oprava pro Windows 10 (pokud máte LTSC nebo placenou podporu).

Dále Adobe opravuje své produkty, včetně opravy větší zranitelnosti v Readeru. Doporučuje se aktualizovat ASAP.

#kybez

  • 0
  • 0
  • 0
  • 9h ago

Bluesky

Profile picture fallback
The April release is so large, it gets not one but TWO bugs of the month. Not surprisingly, they are the two wormable bugs in the release affecting TCP/IP and IKE. Enjoy CVE-2026-33824 and CVE-2026-33827. youtube.com/shorts/aC5tk...
  • 1
  • 1
  • 1
  • 20h ago
Profile picture fallback
~Talos~ Microsoft patched 165 flaws, including 8 criticals and an actively exploited SharePoint spoofing bug (CVE-2026-32201). - IOCs: CVE-2026-32201, CVE-2026-33824, CVE-2026-33827 - #PatchTuesday #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • FreeBSD
  • FreeBSD

26 Mar 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
0.18%

KEV

Description

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerable, remote code execution in the kernel is possible by an authenticated user that is able to send packets to the kernel's NFS server while kgssapi.ko is loaded into the kernel. In userspace, applications which have librpcgss_sec loaded and run an RPC server are vulnerable to remote code execution from any client able to send it packets. We are not aware of any such applications in the FreeBSD base system.

Statistics

  • 1 Post
  • 9 Interactions

Last activity: 23 hours ago

Fediverse

Profile picture fallback

Anthropic built an AI model called Mythos that autonomously found a 17-year-old remote code execution vulnerability in FreeBSD. No human involvement after the initial prompt. It found thousands more zero-days across every major OS and browser, some hiding for decades. Anthropic says it's too dangerous to release publicly, so they gave it to AWS, Microsoft, Apple, Google, CrowdStrike, and a handful of others under a new initiative called Project Glasswing. $100M in usage credits to go fix things before similar capabilities go wide.

Impressive, but worth some skepticism. Bruce Schneier pointed out this is also a very effective PR play. A security firm called Aisle replicated many of the same findings using older, cheaper, publicly available models. The gap between "too dangerous to release" and "already achievable with what's out there" may be thinner than the headlines suggest.

🔒 Mythos autonomously discovered and exploited a FreeBSD RCE that had been present for 17 years (CVE-2026-4747)
🔗 It chains 3-5 vulnerabilities together into multi-step attack sequences
📊 Over 99% of the vulnerabilities found are still unpatched, so we're trusting Anthropic's claims on scope
💰 $25/$125 per million input/output tokens for partners, if you're on the list

Meanwhile, the advice cybersecurity experts are giving the rest of us: update your software, use MFA, get a password manager. The most advanced AI vulnerability scanner ever built, use off-line (truly air-gapped) backups, and basic hygiene is still the best defense most people have.

crn.com/news/security/2026/5-t

  • 5
  • 4
  • 0
  • 23h ago

Overview

  • Google
  • Chrome

01 Apr 2026
Published
02 Apr 2026
Updated

CVSS
Pending
EPSS
3.28%

Description

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Google Patches Actively Exploited Chrome Zero-Day CVE-2026-5281 — CISA Deadline Hits Today
#CyberSecurity
securebulletin.com/google-patc

  • 5
  • 1
  • 0
  • 7h ago

Overview

  • Fortinet
  • FortiSandbox

14 Apr 2026
Published
15 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.29%

KEV

Description

A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 6 hours ago

Fediverse

Profile picture fallback

🚨 Fortinet just disclosed CVE-2026-39808 and CVE-2026-39813 - 2 critical vulnerabilities affecting FortiSandbox. No active exploitation itw reported as of yet.

Scan your infrastructure to find vulnerable instances:
CVE-2026-39808: github.com/rxerium/rxerium-tem
CVE-2026-39813: github.com/rxerium/rxerium-tem

CVE-2026-39808 (CVSS 9.1):
An Improper Neutralization of Special Elements used in an OS Command ('OS command injection') vulnerability [CWE-78] in FortiSandbox may allow an unauthenticated attacker to execute unauthorized code or commands via crafted HTTP requests.

CVE-2026-39813 (CVSS 9.1):
A Path Traversal vulnerability [CWE-24] in FortiSandbox JRPC API may allow an unauthenticated attacker to bypass authentication via specially crafted HTTP requests.

Patches are available as per vendor advisories:
fortiguard.fortinet.com/psirt/
fortiguard.fortinet.com/psirt/

  • 0
  • 1
  • 0
  • 20h ago

Bluesky

Profile picture fallback
Critical OS Command Injection in FortiSandbox (CVE-2026-39808): Unauthenticated RCE with CVSS 91 – Patch Now! + Video Introduction: Fortinet has just disclosed two critical vulnerabilities affecting its FortiSandbox platform: CVE-2026-39808, an unauthenticated OS command injection flaw, and…
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
FortiSandbox Under Fire: Unauthenticated RCE and Auth Bypass (CVE-2026-39808 & CVE-2026-39813) – Patch Now! + Video Introduction: Fortinet’s FortiSandbox, a cornerstone for advanced threat detection and zero-day analysis, is now exposed to two critical vulnerabilities: CVE-2026-39808 (CVSS 9.1)…
  • 0
  • 0
  • 0
  • 6h ago

Overview

  • Adobe
  • Acrobat Reader

11 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
6.08%

Description

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Adobe Acrobat Zero-Day CVE-2026-34621: Four Months of Targeted Espionage via Prototype Pollution Exploit
#CyberSecurity
securebulletin.com/adobe-acrob

  • 5
  • 0
  • 0
  • 7h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts

Last activity: 6 hours ago

Fediverse

Profile picture fallback

En las últimas 24 horas, expertos revelan técnicas avanzadas para explotar CVE-2024-30085, analizan una vulnerabilidad crítica en drivers Minifilter, y alertan sobre fallas críticas en PHP Composer que permiten ejecución arbitraria. Además, se destacan riesgos en Hyper-V y novedades en gestión segura de identidades no humanas y en IA para seguridad ofensiva. Descubre estos y más detalles en el siguiente listado de noticias sobre seguridad informática:

🗞️ ÚLTIMAS NOTICIAS EN SEGURIDAD INFORMÁTICA 🔒
====| 🔥 LO QUE DEBES SABER HOY 15/04/26 📆 |====

🔍 EXPLOITING REVERSING: TÉCNICAS AVANZADAS PARA CVE-2024-30085 (PARTE 1)

Descubre un análisis detallado y completo de las técnicas de explotación para la vulnerabilidad CVE-2024-30085. Esta primera parte ofrece un roadmap exhaustivo, ideal para profesionales que buscan comprender a fondo los mecanismos detrás de esta amenaza crítica.

Conoce la guía técnica completa aquí 👉 djar.co/Zus9d

🔐 EXPLOITING REVERSING: TÉCNICAS AVANZADAS PARA CVE-2024-30085 (PARTE 2)

Continúa la exploración profunda en metodologías específicas para explotar CVE-2024-30085, con un enfoque práctico que facilita la aplicación en entornos reales de seguridad informática. Profundiza en las bases para fortalecer tus defensas o auditorías.

Accede al análisis detallado aquí 👉 djar.co/39UsU

🛡️ EXPLORANDO LA EXPLOTACIÓN DE UN MINIFILTER DRIVER (N-DAY)

Un estudio técnico de 296 páginas que desglosa la explotación de un driver Minifilter vulnerable, mostrando paso a paso cómo un atacante puede aprovechar esta brecha. Esencial para especialistas que trabajan en defensa de sistemas Windows.

Consulta el estudio completo aquí 👉 djar.co/IxJ4jx

⚙️ HYPER-V Y SUS RIESGOS: VULNERABILIDADES EN HIPERVISORES (PARTE 1)

Esta entrega inicial profundiza en las vulnerabilidades detectadas en Hyper-V, el hipervisor de Microsoft, y presenta métodos para identificar y mitigar riesgos en entornos virtualizados. Crucial para administradores y analistas de infraestructura segura.

Lee más sobre la seguridad en virtualización aquí 👉 djar.co/JiVg0

🐘 FALLAS CRÍTICAS EN PHP COMPOSER PERMITEN EJECUCIÓN ARBITRARIA DE COMANDOS

Se han descubierto dos vulnerabilidades graves (CVE-2026-40176 y CVE-2026-40261) en PHP Composer que permiten a atacantes ejecutar comandos arbitrarios. La actualización inmediata es vital para evitar compromisos de seguridad en proyectos dependientes de Composer.

Actualízate y protege tus sistemas ahora 👉 djar.co/svRAdu

☁️ GESTIÓN SEGURA DE IDENTIDADES NO HUMANAS: INNOVACIONES DE CLOUDFLARE

Cloudflare introduce mejoras para la seguridad en identidades no humanas, incluyendo tokens API escaneables, mayor visibilidad en OAuth y permisos con alcance controlado. Estas herramientas permiten una administración automatizada y segura para sistemas automatizados y servicios en la nube.

Descubre cómo fortalecer identidades digitales aquí 👉 djar.co/WmMa

🤖 EVALUACIÓN DE MODELOS DE LENGUAJE AUTO HOSPEDADOS EN SEGURIDAD OFENSIVA

Un benchmark que examina la efectividad de grandes modelos de lenguaje auto alojados en tareas de seguridad ofensiva, evaluación de hacking automatizado y análisis de vulnerabilidades. Ideal para quienes buscan integrar inteligencia artificial en sus estrategias de ciberseguridad.

Explora el estudio completo aquí 👉 djar.co/ComklW

  • 0
  • 0
  • 0
  • 6h ago

Bluesky

Profile picture fallback
Composer CVE-2026-40261/40176|Perforceドライバ起因のRCE、2.9.6/2.2.27で修正済み https://ai-heartland.com/news/news-composer-cve-2026-40261-perforce-rce/
  • 0
  • 0
  • 0
  • 14h ago

Overview

  • Microsoft
  • .NET 10.0

14 Apr 2026
Published
15 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.05%

KEV

Description

Improper neutralization of special elements in .NET allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

via @dotnet : .NET and .NET Framework April 2026 servicing releases updates

ift.tt/wyUxFph
#DotNet #NET #NETCore #NETFramework #April2026 #ServicingUpdate #SecurityUpdate #CVE2026 #CVE2026-23666 #CVE2026-26171 #CVE2026-32178 #CVE2026-32203 #CVE2026-32226…

  • 1
  • 0
  • 0
  • 1h ago

Bluesky

Profile picture fallback
🚨 New LOW CVE detected in AWS Lambda 🚨 CVE-2026-32178 impacts Microsoft.NETCore.App.Runtime.linux-x64 in 4 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/478 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • fastify
  • fastify

15 Apr 2026
Published
15 Apr 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

Impact: Fastify applications using schema.body.content for per-content-type body validation can have validation bypassed entirely by prepending a space to the Content-Type header. The body is still parsed correctly but schema validation is skipped. This is a regression introduced in fastify >= 5.3.2 by the fix for CVE-2025-32442 Patches: Upgrade to fastify v5.8.5 or later. Workarounds: None. Upgrade to the patched version.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture fallback

🚨 High-severity security fix in fastify@5.8.5 just released!

Patches CVE-2026-33806 — body schema validation bypass via leading space in Content-Type header

github.com/fastify/fastify/sec

  • 1
  • 1
  • 1
  • 17h ago

Overview

  • Fortinet
  • FortiClientEMS

04 Apr 2026
Published
07 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
25.26%

Description

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Fortinet remains the #1 targeted perimeter vendor:

• CVE-2026-35616 auth bypass: 1,535,690 sessions
• SSL VPN brute-force: 116,753 sessions (trending ↑)
• CISA KEV since April 6

See it on GreyNoise → greynoise.io/resources/at-the-

  • 1
  • 0
  • 1
  • 1h ago

Overview

  • Owen
  • WebStack

15 Apr 2026
Published
15 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.11%

KEV

Description

The WebStack theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the io_img_upload() function in all versions up to, and including, 1.2024. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 13 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL: Owen WebStack WordPress theme (CVE-2026-1555) lets unauthenticated attackers upload arbitrary files, risking RCE. No patch yet — restrict uploads & monitor activity! CVSS 9.8. Details: radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 13h ago
Showing 11 to 20 of 61 CVEs