Overview
- Simopro Technology
- WinMatrix
16 Apr 2026
Published
16 Apr 2026
Updated
CVSS v4.0
CRITICAL (9.3)
EPSS
Pending
KEV
Description
WinMatrix agent developed by Simopro Technology has a Missing Authentication vulnerability, allowing authenticated local attackers to execute arbitrary code with SYSTEM privileges on the local machine as well as on all hosts within the environment where the agent is installed.
Statistics
- 1 Post
Last activity: 4 hours ago
Fediverse
🔴 CRITICAL: CVE-2026-6348 in Simopro WinMatrix 3.5.13 lets local authenticated users execute code as SYSTEM. No patch yet — restrict access & monitor usage. Details: https://radar.offseq.com/threat/cve-2026-6348-cwe-306-missing-authentication-for-c-2cb15b3d #OffSeq #CVE20266348 #Infosec #Vulnerability
Overview
Description
A remote code execution vulnerability exists in Remote Desktop Services formerly known as Terminal Services when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests, aka 'Remote Desktop Services Remote Code Execution Vulnerability'.
Statistics
- 1 Post
- 131 Interactions
Last activity: 17 hours ago
Bluesky
Overview
Description
NSS (Network Security Services) versions prior to 3.73 or 3.68.1 ESR are vulnerable to a heap overflow when handling DER-encoded DSA or RSA-PSS signatures. Applications using NSS for handling signatures encoded within CMS, S/MIME, PKCS \#7, or PKCS \#12 are likely to be impacted. Applications using NSS for certificate validation or other TLS, X.509, OCSP or CRL functionality may be impacted, depending on how they configure NSS. *Note: This vulnerability does NOT impact Mozilla Firefox.* However, email clients and PDF viewers that use NSS for signature verification, such as Thunderbird, LibreOffice, Evolution and Evince are believed to be impacted. This vulnerability affects NSS < 3.73 and NSS < 3.68.1.
Statistics
- 1 Post
- 131 Interactions
Last activity: 17 hours ago
Bluesky
Overview
Description
Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.
Statistics
- 1 Post
- 131 Interactions
Last activity: 17 hours ago
Bluesky
Overview
Description
A spoofing vulnerability exists in the way Windows CryptoAPI (Crypt32.dll) validates Elliptic Curve Cryptography (ECC) certificates.An attacker could exploit the vulnerability by using a spoofed code-signing certificate to sign a malicious executable, making it appear the file was from a trusted, legitimate source, aka 'Windows CryptoAPI Spoofing Vulnerability'.
Statistics
- 1 Post
- 131 Interactions
Last activity: 17 hours ago
Bluesky
Overview
- Microsoft
- Windows 10 Version 1507
08 Jul 2025
Published
13 Feb 2026
Updated
CVSS v3.1
LOW (3.5)
EPSS
0.44%
KEV
Description
External control of file name or path in Windows Storage allows an authorized attacker to perform spoofing over a network.
Statistics
- 1 Post
Last activity: 6 hours ago
Overview
- Ivanti
- Neurons for ITSM (On-Premise)
14 Apr 2026
Published
14 Apr 2026
Updated
CVSS v3.1
MEDIUM (5.7)
EPSS
0.11%
KEV
Description
Improper protection of an alternate path in Ivanti N-ITSM before version 2025.4 allows a remote authenticated attacker to retain access when their account has been disabled.
Statistics
- 1 Post
Last activity: 21 hours ago
Overview
- Ivanti
- Neurons for ITSM (On-Premise)
14 Apr 2026
Published
14 Apr 2026
Updated
CVSS v3.1
MEDIUM (5.4)
EPSS
0.07%
KEV
Description
Stored XSS in Ivanti N-ITSM before version 2025.4 allows a remote authenticated attacker to obtain limited information from other user sessions. User interaction is required.
Statistics
- 1 Post
Last activity: 21 hours ago
Overview
Description
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endpoint to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python code, achieving remote code execution, read arbitrary server files by setting UI_LOGO_PATH and fetching via /get_image, and take over other privileged accounts by overwriting UI_USERNAME and UI_PASSWORD environment variables. Fixed in v1.83.0.
Statistics
- 1 Post
Last activity: 12 hours ago
Overview
- BerriAI
- litellm
06 Apr 2026
Published
07 Apr 2026
Updated
CVSS v4.0
CRITICAL (9.4)
EPSS
0.08%
KEV
Description
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, when JWT authentication is enabled (enable_jwt_auth: true), the OIDC userinfo cache uses token[:20] as the cache key. JWT headers produced by the same signing algorithm generate identical first 20 characters. This configuration option is not enabled by default. Most instances are not affected. An unauthenticated attacker can craft a token whose first 20 characters match a legitimate user's cached token. On cache hit, the attacker inherits the legitimate user's identity and permissions. This affects deployments with JWT/OIDC authentication enabled. Fixed in v1.83.0.
Statistics
- 1 Post
Last activity: 12 hours ago