Skip to content
Threat Feed

April 2026 (30)

high advisory

CVE-2025-47389 Memory Corruption Vulnerability in Attestation Report Generation

CVE-2025-47389 describes a memory corruption vulnerability stemming from a buffer copy operation failure due to an integer overflow during the attestation report generation process, potentially leading to arbitrary code execution.

cve-2025-47389 memory-corruption buffer-overflow attestation
2r 1t 1c
high advisory

CVE-2025-47390: JPEG Driver IOCTL Memory Corruption Vulnerability

A memory corruption vulnerability (CVE-2025-47390) exists while preprocessing IOCTL requests in the JPEG driver, potentially leading to local privilege escalation or denial of service.

memory-corruption jpeg qualcomm
2r 1t 1c
critical advisory

Twitch Studio Privilege Escalation Vulnerability (CVE-2024-14032)

Twitch Studio version 0.114.8 and prior contains a privilege escalation vulnerability (CVE-2024-14032) that allows local attackers to execute arbitrary code as root by exploiting an unprotected XPC service, enabling them to overwrite system files and achieve full system compromise.

privilege-escalation cve-2024-14032 twitch
2r 1t 1c
high advisory

Potential File Download via a Headless Browser

Detects the execution of headless browsers from suspicious parent processes with arguments indicative of scripted retrieval, bypassing application control policies and restrictions on direct download tools.

command-and-control headless-browser file-download windows
2r 1t
high advisory

OFFIS DCMTK Command Injection Vulnerability (CVE-2026-5663)

A remote command injection vulnerability exists in OFFIS DCMTK version 3.7.0 and earlier due to insufficient input sanitization in the `storescp` application, potentially allowing unauthenticated attackers to execute arbitrary OS commands.

command-injection dcmtk cve-2026-5663 storescp
2r 1t 1c
high advisory

Media Library Assistant WordPress Plugin SQL Injection Vulnerability

The Media Library Assistant WordPress plugin through version 3.34 is vulnerable to SQL injection, allowing attackers to manipulate database queries.

sql-injection wordpress plugin-vulnerability
2r 1t 1c
high advisory

Distribution Toolkit Authentication Redirection Vulnerability (CVE-2026-33540)

A vulnerability in the distribution toolkit prior to 3.1.0 allows a malicious upstream registry or man-in-the-middle attacker to redirect authentication requests, potentially exposing upstream credentials.

CVE-2026-33540 authentication redirection container
2r 1t 1c
high advisory

GLPI SQL Injection Vulnerability (CVE-2026-29047)

GLPI versions 10.0.0 before 10.0.24 and 11.0.6 are vulnerable to SQL Injection (CVE-2026-29047) via the logs export feature, allowing authenticated users to potentially execute arbitrary SQL commands.

glpi sqli cve-2026-29047
2r 1t 1c
critical advisory

GLPI Template Injection RCE (CVE-2026-26026)

GLPI versions 11.0.0 to before 11.0.6 are vulnerable to remote code execution (RCE) via template injection by an authenticated administrator, allowing for arbitrary code execution on the server.

cve-2026-26026 template-injection rce glpi
2r 3t 1c
high advisory

GLPI Unauthenticated Time-Based Blind SQL Injection Vulnerability (CVE-2026-26263)

GLPI versions 11.0.0 to before 11.0.6 are susceptible to an unauthenticated time-based blind SQL injection vulnerability in the search engine, allowing remote attackers to potentially extract sensitive information.

sql-injection glpi cve-2026-26263 web-application
2r 1t 1c
medium advisory

GLPI Cross-Site Scripting Vulnerability (CVE-2026-25932)

CVE-2026-25932 is a cross-site scripting vulnerability in GLPI versions 0.60 to before 10.0.24, where an authenticated technician user can store a malicious XSS payload within supplier fields, potentially leading to arbitrary code execution in the context of other users' browsers.

xss glpi cve-2026-25932
2r 1t 1c
high advisory

AWS IAM Long-Term Access Key Correlated with Elevated Detection Alerts

This rule correlates AWS Long-Term Access Key First Seen from Source IP alerts with other open alerts of medium or higher severity that share the same IAM access key ID to prioritize investigation of potentially compromised accounts, helping identify post-compromise activity.

cloud aws iam credential-access initial-access
2r 2t
high advisory

Mattermost Legal Hold Plugin Authentication Bypass Vulnerability

Mattermost Legal Hold plugin versions 1.1.4 and earlier allow authenticated attackers to bypass authorization checks, enabling unauthorized access and modification of legal hold data via crafted API requests.

mattermost authentication-bypass legal-hold
2r 2t 1c
low advisory

Kubernetes Secret Access via Unusual User Agent

Detects unusual access to Kubernetes secrets, potentially indicating an attacker attempting to steal sensitive information after gaining initial access to the cluster.

kubernetes credential-access cloud
2r 1t
high advisory

SQL Injection Vulnerability in Car Rental Project 1.0 (CVE-2026-5634)

A remote SQL injection vulnerability (CVE-2026-5634) exists in projectworlds Car Rental Project 1.0 via the fname parameter in /book_car.php, allowing unauthenticated attackers to potentially read, modify, or delete database information.

sqli web-application cve-2026-5634
2r 1t 1c
critical advisory

Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability in Tenda CH22 version 1.0.0.1 allows a remote attacker to execute arbitrary code by manipulating the 'GO' argument in the formWrlExtraSet function via the /goform/WrlExtraSet endpoint.

CVE-2026-5605 buffer-overflow tenda
2r 2t 1c
high advisory

SQL Injection Vulnerability in Easy Blog Site 1.0

A SQL injection vulnerability exists in code-projects Easy Blog Site 1.0 within the login.php file, exploitable remotely by manipulating the username/password parameters, potentially leading to unauthorized database access.

sqlinjection cve-2026-5646 webapplication
2r 1t 1c
high advisory

SQL Injection Vulnerability in projectworlds Car Rental System 1.0

A SQL injection vulnerability (CVE-2026-5637) exists in projectworlds Car Rental System 1.0's /message_admin.php, allowing remote attackers to execute arbitrary SQL commands by manipulating the 'Message' argument.

sql-injection web-application cve-2026-5637
2r 1t 1c
high advisory

GPT Researcher Server-Side Request Forgery Vulnerability (CVE-2026-5633)

A server-side request forgery (SSRF) vulnerability exists in assafelovic gpt-researcher up to version 3.4.3, affecting the ws Endpoint component, allowing a remote attacker to manipulate the source_urls argument and potentially access internal resources or conduct further attacks.

ssrf cve-2026-5633 gpt-researcher
2r 1t 1c 1i
high advisory

GPT Researcher Authentication Bypass Vulnerability (CVE-2026-5632)

CVE-2026-5632 is an authentication bypass vulnerability in assafelovic gpt-researcher up to version 3.4.3, affecting the HTTP REST API Endpoint and allowing remote attackers to perform actions without proper authorization.

CVE-2026-5632 authentication-bypass web-application
2r 1t 1c
high advisory

GPT Researcher Code Injection Vulnerability (CVE-2026-5631)

A remote code injection vulnerability exists in assafelovic gpt-researcher versions up to 3.4.3 due to improper handling of the 'args' argument in the extract_command_data function, potentially allowing attackers to execute arbitrary code.

code-injection vulnerability gpt-researcher
2r 1t 1c
high advisory

JeecgBoot AI Chat Module Authentication Bypass Vulnerability

JeecgBoot versions 3.9.0 and 3.9.1 are vulnerable to a remote unauthenticated bypass in the AI Chat Module, specifically affecting the JeecgBizToolsProvider.java file, potentially allowing unauthorized access.

jeecgboot authentication-bypass ai-chat-module
2r 1t 1c
critical advisory

Belkin F9K1015 Stack-Based Buffer Overflow Vulnerability (CVE-2026-5612)

A stack-based buffer overflow vulnerability (CVE-2026-5612) exists in Belkin F9K1015 1.00.10, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the 'formWlEncrypt' function of the '/goform/formWlEncrypt' file.

cve-2026-5612 buffer-overflow belkin
2r 1t 1c
critical advisory

Belkin F9K1122 Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5608) exists in the formWlanSetup function of Belkin F9K1122 version 1.00.33, allowing remote attackers to execute arbitrary code by manipulating the 'webpage' argument in the /goform/formWlanSetup file.

buffer-overflow belkin cve-2026-5608
2r 1t 1c
critical advisory

Tenda CH22 Router Stack-Based Buffer Overflow Vulnerability

A stack-based buffer overflow vulnerability (CVE-2026-5604) in Tenda CH22 1.0.0.1 allows remote attackers to execute arbitrary code by manipulating the 'standard' argument in the formCertLocalPrecreate function of the /goform/CertLocalPrecreate file within the Parameter Handler component.

cve-2026-5604 buffer-overflow tenda router
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25702)

Kados R10 GreenBee is vulnerable to SQL injection via the id_project parameter, allowing attackers to manipulate database queries to extract sensitive information or modify data.

sql-injection web-application cve-2019-25702
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25704)

Kados R10 GreenBee is vulnerable to SQL injection (CVE-2019-25704), allowing attackers to manipulate database queries via the filter_user_mail parameter, potentially leading to data extraction or modification.

sql-injection cve-2019-25704 web-application
2r 1t 1c
high advisory

Kados R10 GreenBee SQL Injection Vulnerability (CVE-2019-25692)

Kados R10 GreenBee is vulnerable to SQL injection via the 'id_to_modify' parameter, enabling attackers to manipulate database queries and potentially extract or modify sensitive data.

sqli cve-2019-25692 web-application
2r 1t 1c
critical advisory

phpBB Arbitrary File Upload Vulnerability (CVE-2019-25685)

phpBB is vulnerable to arbitrary file upload (CVE-2019-25685) by exploiting the plupload functionality and phar:// stream wrapper, allowing authenticated attackers to upload crafted zip files containing serialized PHP objects that execute arbitrary code via the imagick parameter.

phpBB file-upload deserialization CVE-2019-25685
2r 1c
high advisory

RealTerm Serial Terminal SEH Buffer Overflow Vulnerability (CVE-2019-25679)

RealTerm Serial Terminal 2.0.0.70 contains a structured exception handling (SEH) buffer overflow vulnerability allowing local attackers to execute arbitrary code by supplying a malicious payload via the Echo Port tab.

cve-2019-25679 buffer-overflow seh local-code-execution realterm
2r 1t 1c