24h | 7d | 30d

Overview

  • Apache Software Foundation
  • Apache Airflow
  • apache-airflow

18 Apr 2026
Published
20 Apr 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

Dag Authors, who normally should not be able to execute code in the webserver context could craft XCom payload causing the webserver to execute arbitrary code. Since Dag Authors are already highly trusted, severity of this issue is Low. Users are recommended to upgrade to Apache Airflow 3.2.0, which fixes the issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Apache Airflow 3.2.0 closed five security flaws starting April 18. CVE-2026-25917 lets any workflow author (DAG author) run code in the webserver. CVE-2026-31987 leaks login tokens through task logs. Three days earlier, Dagster patched its own SQL injection. Orchestration tools were built when the DAG author and the platform operator shared one chair. Today 30 employees and 12 contractors share that chair, and the threat model never updated.

#DevOps #InfoSec #DataEngineering #CyberSecurity

  • 0
  • 1
  • 0
  • 1h ago

Overview

  • Apache Software Foundation
  • Apache Airflow
  • apache-airflow

16 Apr 2026
Published
18 Apr 2026
Updated

CVSS
Pending
EPSS
0.03%

KEV

Description

JWT Tokens used by tasks were exposed in logs. This could allow UI users to act as Dag Authors. Users are advised to upgrade to Airflow version that contains fix. Users are recommended to upgrade to version 3.2.0, which fixes this issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Apache Airflow 3.2.0 closed five security flaws starting April 18. CVE-2026-25917 lets any workflow author (DAG author) run code in the webserver. CVE-2026-31987 leaks login tokens through task logs. Three days earlier, Dagster patched its own SQL injection. Orchestration tools were built when the DAG author and the platform operator shared one chair. Today 30 employees and 12 contractors share that chair, and the threat model never updated.

#DevOps #InfoSec #DataEngineering #CyberSecurity

  • 0
  • 1
  • 0
  • 1h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
10 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
31.03%

Description

Protection mechanism failure in MSHTML Framework allows an unauthorized attacker to bypass a security feature over a network.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture fallback

PRISMEX: la suite di cyberspionaggio di APT28 che prende di mira Ucraina e alleati NATO con steganografia e cloud C2

APT28 ha lanciato una nuova campagna di cyberspionaggio contro Ucraina e alleati NATO con PRISMEX, una suite di malware inedita che combina steganografia 'Bit Plane Round Robin', COM hijacking e abuso di Filen.io come C2 cifrato. La campagna sfrutta due vulnerabilità Microsoft Office — CVE-2026-21509 e CVE-2026-21513 — con exploit pronti settimane prima della divulgazione pubblica.

insicurezzadigitale.com/prisme

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Microsoft
  • Microsoft 365 Apps for Enterprise

26 Jan 2026
Published
01 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
7.50%

Description

Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 1 Post

Last activity: 9 hours ago

Fediverse

Profile picture fallback

PRISMEX: la suite di cyberspionaggio di APT28 che prende di mira Ucraina e alleati NATO con steganografia e cloud C2

APT28 ha lanciato una nuova campagna di cyberspionaggio contro Ucraina e alleati NATO con PRISMEX, una suite di malware inedita che combina steganografia 'Bit Plane Round Robin', COM hijacking e abuso di Filen.io come C2 cifrato. La campagna sfrutta due vulnerabilità Microsoft Office — CVE-2026-21509 e CVE-2026-21513 — con exploit pronti settimane prima della divulgazione pubblica.

insicurezzadigitale.com/prisme

  • 0
  • 0
  • 0
  • 9h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

14 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.08%

KEV

Description

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows TCP/IP allows an unauthorized attacker to execute code over a network.

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture fallback
Microsoft、2026年4月の定例パッチを公開-CVE-2026-33824とCVE-2026-33827などの脆弱性を修正 rocket-boys.co.jp/security-mea... #セキュリティ対策Lab #security #securitynews
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Cisco
  • Cisco Identity Services Engine Software

15 Apr 2026
Published
16 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.23%

KEV

Description

A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at least Read Only Admin credentials. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. In single-node ISE deployments, successful exploitation of these vulnerabilities could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition. In that condition, endpoints that have not already authenticated would be unable to access the network until the node is restored.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture fallback
Cisco patches critical ISE vulnerabilities (CVE-2026-20147, CVE-2026-20180, CVE-2026-20186) enabling remote code execution, root access, and privilege escalation in Identity Services Engine and Webex Services. #CiscoISE #RemoteCode #USA
  • 0
  • 0
  • 0
  • 11h ago

Overview

  • Cisco
  • Cisco Identity Services Engine Software

15 Apr 2026
Published
16 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
0.21%

KEV

Description

A vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have at least Read Only Admin credentials. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root. In single-node ISE deployments, successful exploitation of these vulnerabilities could cause the affected ISE node to become unavailable, resulting in a denial of service (DoS) condition. In that condition, endpoints that have not already authenticated would be unable to access the network until the node is restored.

Statistics

  • 1 Post

Last activity: 11 hours ago

Bluesky

Profile picture fallback
Cisco patches critical ISE vulnerabilities (CVE-2026-20147, CVE-2026-20180, CVE-2026-20186) enabling remote code execution, root access, and privilege escalation in Identity Services Engine and Webex Services. #CiscoISE #RemoteCode #USA
  • 0
  • 0
  • 0
  • 11h ago
Showing 31 to 37 of 37 CVEs