Skip to content
Threat Feed

Briefs

April 2026 (30)

high advisory

Multiple Vulnerabilities in Microsoft Cloud Products Allow Privilege Escalation and Code Execution

Multiple vulnerabilities in Microsoft Azure, Microsoft 365 Copilot, Microsoft Dynamics 365, and Microsoft Power Apps could allow an attacker to escalate privileges, execute arbitrary code, and conduct spoofing attacks.

Azure +3 cloud privilege-escalation code-execution spoofing
3r 3t 5c
critical advisory

PhantomRPC: Windows RPC Privilege Escalation Vulnerability

A vulnerability in Windows RPC architecture allows an attacker to create a fake RPC server and escalate their privileges to SYSTEM level, leveraging processes with impersonation privileges.

Windows privilege-escalation rpc
2r 1t
critical advisory

Flowise Multiple Vulnerabilities

Multiple vulnerabilities in Flowise allow an attacker to execute arbitrary code, bypass security measures, disclose information, and manipulate files.

Flowise vulnerability code-execution information-disclosure file-manipulation
2r 3t 5c
critical advisory

Multiple Vulnerabilities in Cisco Products Allow for Remote Code Execution

Multiple vulnerabilities in Cisco ASA, Secure Firewall Threat Defense, IOS, IOS XE, and IOS XR allow a remote attacker to bypass authentication and execute arbitrary code with administrator privileges.

ASA +4 cisco vulnerability rce authentication-bypass
2r 4t 3c
high advisory

D-Link DWM-222W USB Wi-Fi Adapter Brute-Force Protection Bypass Vulnerability

D-Link DWM-222W USB Wi-Fi Adapter is vulnerable to brute-force attacks due to a protection bypass, allowing unauthenticated adjacent network attackers to gain control over the device by circumventing login attempt limits.

DWM-222W USB Wi-Fi Adapter brute-force credential-access network-device
2r 1c
medium advisory

Argo Workflows Controller Denial-of-Service via Malformed Pod Annotation

A malformed `workflows.argoproj.io/pod-gc-strategy` annotation in an Argo Workflow pod can trigger an unchecked array index in the `podGCFromPod()` function, leading to a controller-wide panic and denial-of-service.

Argo Workflows argo-workflows denial-of-service kubernetes
2r 2t
high advisory

Kirby CMS Server-Side Template Injection via Double Template Resolution

A server-side template injection (SSTI) vulnerability exists in Kirby CMS within the option rendering feature due to double template resolution in option fields (checkboxes, color, multiselect, select, radio, tags, or toggles) when using options from a query or API with untrusted values, potentially allowing attackers to inject malicious queries.

cms ssti kirby template-injection
2r 1t
high advisory

Radare2 Path Traversal Vulnerability in Project Deletion

Radare2 versions prior to 6.1.4 are vulnerable to a path traversal in project deletion, allowing local attackers to recursively delete arbitrary directories by escaping the 'dir.projects' root, leading to integrity and availability loss.

radare2 path-traversal local-privilege-escalation
2r 1t 1c
high threat

Trigona Ransomware Employing Custom Data Exfiltration Tool

Trigona ransomware is using a custom data exfiltration tool named 'uploader_client.exe' to steal data from compromised environments, enhancing speed and evasion.

Windows +3 Trigona ransomware data exfiltration custom tool
2r 4t 1i
high advisory

CanisterSprawl: Self-Propagating npm Malware Campaign

The CanisterSprawl malware campaign targets npm packages, using a self-propagating approach to steal sensitive data from developer machines, including tokens and API keys, and attempting to publish malicious packages using hijacked credentials.

npm packages supply-chain malware npm
2r 6t
critical threat

UAT-4356 FIRESTARTER Backdoor Targeting Cisco Firepower Devices

UAT-4356 is actively targeting Cisco Firepower devices running FXOS, exploiting CVE-2025-20333 and CVE-2025-20362 to deploy the FIRESTARTER backdoor which allows remote access and control by injecting malicious shellcode into the LINA process.

Firepower eXtensible Operating System +2 UAT-4356 firestarter cisco backdoor network espionage
2r 2t 2c 2i
critical advisory

OpenC3 COSMOS SQL Injection Vulnerability in QuestDB Time-Series Database

A SQL injection vulnerability exists in the Time-Series Database (TSDB) component of COSMOS, allowing an authenticated remote user to execute arbitrary SQL commands, including telemetry data disclosure and deletion.

OpenC3 sql-injection cosmos questdb telemetry
2r 3t
medium advisory

Cisco Integrated Management Controller (IMC) Multiple XSS Vulnerabilities

Multiple cross-site scripting (XSS) vulnerabilities in the web-based management interface of Cisco Integrated Management Controller (IMC) could allow a remote attacker to conduct an XSS attack against a user of the interface.

Integrated Management Controller xss cisco cimc vulnerability
2r 1t 5c
high advisory

Daptin SQL Injection Vulnerability in Aggregate API

A SQL injection vulnerability exists in Daptin versions prior to 0.11.4 within the `/aggregate/:typename` endpoint, where the `column` and `group` query parameters are passed to `goqu.L()` without validation, allowing authenticated users to inject arbitrary SQL expressions and exfiltrate sensitive data.

Daptin sql-injection web-application
2r 1t
critical advisory

Mirai Campaign Exploiting CVE-2025-29635 in D-Link Routers

A new Mirai-based malware campaign is exploiting CVE-2025-29635, a command-injection vulnerability affecting D-Link DIR-823X routers, to enlist devices into the botnet.

DIR-823X +1 mirai ddos rce iot
2r 4t 2c
critical advisory

Rclone Unauthenticated options/set Allows Runtime Auth Bypass

Rclone is vulnerable to an unauthenticated options/set vulnerability that allows runtime authentication bypass, potentially leading to sensitive operations and command execution by setting `rc.NoAuth=true` on reachable RC servers started without global HTTP authentication.

rclone auth-bypass rc-api CVE-2026-41176 command-execution
2r 3t
high advisory

rust-openssl Unchecked Callback Length Memory Leak

The rust-openssl crate versions 0.9.24 prior to 0.10.78 are vulnerable to memory leaks due to unchecked callback lengths in PSK/cookie trampolines, potentially leading to buffer overflows.

openssl rust memory leak buffer overflow
2r
critical advisory

Xerte Online Toolkits Unauthenticated Remote Code Execution via File Upload

Xerte Online Toolkits 3.15 and earlier contain an incomplete input validation vulnerability allowing unauthenticated attackers to upload malicious PHP code with a '.php4' extension, leading to arbitrary operating system command execution on the server.

Online Toolkits cve-2026-34415 rce file-upload web-application
2r 3t 1c
medium advisory

xmldom Uncontrolled Recursion DoS Vulnerability

The xmldom library is vulnerable to a denial-of-service (DoS) attack due to uncontrolled recursion in XML serialization leading to application crashes.

xmldom dos recursion javascript
2r 1t
high threat

China-Nexus Cyber Actors Using Covert Networks of Compromised Devices

China-nexus cyber actors are increasingly using large-scale networks of compromised devices, including SOHO routers and IoT devices, to obscure the origin of their attacks and conduct various malicious activities, from reconnaissance to data exfiltration.

SOHO Routers +5 China-nexus cyber actors covert-network botnet china-nexus compromised-devices
2r 4t
critical advisory

Multiple Vulnerabilities in n8n Workflow Automation Tool

Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.

n8n vulnerability sqli xss rce session-hijacking
3r 5t 1c
critical advisory

Borg SPM 2007 Arbitrary File Upload Vulnerability (CVE-2026-6885)

An unauthenticated remote attacker can exploit an arbitrary file upload vulnerability (CVE-2026-6885) in Borg SPM 2007 to upload and execute web shell backdoors, leading to arbitrary code execution on the server.

SPM 2007 file-upload web-shell code-execution
2r 1t 1c
high advisory

WeKan Missing Authorization Vulnerability in Integration REST API

WeKan before 8.35 contains a missing authorization vulnerability in the Integration REST API endpoints, allowing authenticated board members to perform administrative actions without proper privilege verification, potentially leading to unauthorized data access and modification.

WeKan missing-authorization rest-api privilege-escalation
2r 1t 1c 4i
medium advisory

Microsoft Product Vulnerability CVE-2026-22005

CVE-2026-22005 is a newly published vulnerability affecting a Microsoft product, requiring further investigation to determine the specific product, attack vector, and potential impact.

CVE-2026-22005 vulnerability microsoft
3r 1c
medium advisory

Microsoft Discloses Information Regarding CVE-2026-22004

Microsoft has released information regarding the vulnerability CVE-2026-22004, but details about the vulnerability and its exploitation are currently unavailable.

cve-2026-22004 vulnerability microsoft
1r 1t 1c
low advisory

Microsoft CVE-2026-35236 Information Published

Microsoft has published information regarding CVE-2026-35236, but no details about the vulnerability or its exploitation are currently available.

cve vulnerability microsoft
2r
high advisory

CVE-2026-31478 Vulnerability in Microsoft ksmbd

CVE-2026-31478 is a vulnerability in Microsoft's ksmbd implementation related to incorrect calculation of maximum output buffer length, potentially leading to a denial-of-service or remote code execution.

ksmbd cve smb memory-corruption
2r 3t 1c
high advisory

CVE-2026-31507 Double-Free Vulnerability in net/smc

CVE-2026-31507 is a double-free vulnerability in the net/smc module that occurs when the tee() function duplicates a splice pipe buffer, potentially leading to memory corruption and denial of service.

cve-2026-31507 double-free memory corruption denial of service
2r 2t 1c
medium advisory

CVE-2026-34303 Affecting Microsoft Products

CVE-2026-34303 is a vulnerability affecting an unspecified Microsoft product, requiring further investigation upon disclosure of details.

vulnerability cve microsoft
2r 1c
medium advisory

IBM WebSphere Liberty Identity Spoofing Vulnerability (CVE-2026-3621)

IBM WebSphere Application Server Liberty versions 17.0.0.3 through 26.0.0.4 are susceptible to identity spoofing when applications are deployed without proper authentication and authorization configurations, potentially leading to unauthorized access and privilege escalation.

WebSphere Application Server - Liberty cve-2026-3621 websphere identity spoofing cwe-269
2r 1t 1c