Skip to content
Threat Feed

April 2026 (30)

high advisory

Auth0-PHP SDK Cookie Forging Vulnerability (CVE-2026-34236)

Auth0-PHP SDK versions 8.0.0 to before 8.19.0 encrypt cookies with insufficient entropy, potentially allowing attackers to brute-force the encryption key and forge session cookies.

cve-2026-34236 auth0 php cookie-forging session-hijacking
2r 1t 1c
medium advisory

Open WebUI Broken Access Control Vulnerability (CVE-2026-34222)

A broken access control vulnerability in Open WebUI versions prior to 0.8.11 (CVE-2026-34222) allows authenticated users to potentially access or modify tool values they should not be authorized to, leading to privilege escalation and unauthorized configuration changes.

broken-access-control web-application privilege-escalation
2r 3t 1c
high advisory

Tina CMS Path Traversal Vulnerability (CVE-2026-34603)

Tina CMS versions before 2.2.2 are vulnerable to a path traversal attack that allows unauthorized file system access due to insufficient validation of symlinks and junction targets in media routes.

path-traversal tina-cms CVE-2026-34603
2r 1t
critical advisory

DedeCMS 5.7.118 Code Injection Vulnerability via Crafted Module Upload (CVE-2026-30643)

DedeCMS 5.7.118 is vulnerable to remote code execution via crafted setup tag values during a module upload, as exploited by an unauthenticated attacker (CVE-2026-30643).

dedecms code-injection cve-2026-30643
2r 1t 1c
high advisory

pandas-ai SQL Injection Vulnerability (CVE-2026-30273)

pandas-ai v3.0.0 is vulnerable to SQL injection via the pandasai.agent.base._execute_sql_query component, potentially allowing unauthorized database access and modification.

sql-injection vulnerability pandas-ai
2r 1t 1c
critical advisory

Cisco Smart Software Manager On-Prem RCE via Exposed API (CVE-2026-20160)

CVE-2026-20160 is a critical vulnerability in Cisco Smart Software Manager On-Prem (SSM On-Prem) that allows an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system with root privileges by sending a crafted request to an exposed API.

cve-2026-20160 cisco ssm-on-prem rce webserver
2r 1t 1c
high advisory

Lakeside SysTrack Agent Local Privilege Escalation via Race Condition (CVE-2026-35099)

Lakeside SysTrack Agent 11 before 11.2.1.28 is vulnerable to a race condition that allows for local privilege escalation to SYSTEM, as tracked by CVE-2026-35099.

lakeside systrack privilege-escalation race-condition cve-2026-35099 windows
2r 1t 1c
critical advisory

Critical Vulnerability in FastGPT Allows API Key Exfiltration and Internal Network Access

CVE-2026-34162 in FastGPT allows unauthenticated attackers to exfiltrate API keys and gain complete access to internal services managed by Docker Compose by sending arbitrary HTTP requests, leading to potential compromise of the internal network.

fastgpt vulnerability information-disclosure
2r 3t 1c 1i
medium advisory

Unsecured Zoom Meeting Creation

The creation of Zoom meetings without passcodes allows unauthorized access and disruption, known as Zoombombing, potentially leading to the exposure of sensitive information or reputational damage.

zoom zoombombing initial-access
2r 2t
high threat

Potential JAVA/JNDI Exploitation Attempt

This rule detects a potential JAVA/JNDI exploitation attempt by identifying outbound network connections by JAVA to LDAP, RMI, or DNS standard ports followed by suspicious JAVA child processes such as shell interpreters and scripting languages, which may indicate a Java Naming and Directory Interface (JNDI) injection vulnerability exploitation attempt.

exploited jndi java log4shell rce exploitation
2r 5t 1c
medium advisory

Corosync Integer Overflow Vulnerability (CVE-2026-35092) Leads to DoS

CVE-2026-35092 is an integer overflow vulnerability in Corosync's join message sanity validation, allowing a remote, unauthenticated attacker to send crafted UDP packets, resulting in a denial of service condition.

cve-2026-35092 denial-of-service corosync
2r 2t 1c
high advisory

Libinput Code Injection Vulnerability via Malicious Lua Bytecode (CVE-2026-35093)

A local attacker can exploit CVE-2026-35093 in libinput by placing a specially crafted Lua bytecode file in configuration directories, allowing arbitrary code execution with the privileges of the application using libinput.

libinput code-injection lua cve-2026-35093
3r 6t 1c
low advisory

Kubectl Network Configuration Modification

This rule detects potential kubectl network configuration modification activity by monitoring for process events where the kubectl command is executed with arguments that suggest an attempt to modify network configurations in Kubernetes, potentially leading to unauthorized access or data exfiltration.

kubectl kubernetes command_and_control network_configuration linux macos
3r 2t
medium advisory

WebServer Access Logs Deleted

Detection of web server access log deletion across Windows, Linux, and macOS systems indicates potential defense evasion and destruction of forensic evidence by threat actors.

defense-evasion indicator-removal file-deletion
2r 1t
high advisory

Dell AppSync 4.6.0 Incorrect Permission Assignment Vulnerability

Dell AppSync version 4.6.0 contains an incorrect permission assignment vulnerability that allows a low-privileged attacker with local access to elevate privileges on the system.

dell appsync privilege-escalation cve-2026-22768
2r 1t 1c
medium advisory

Dell AppSync 4.6.0 UNIX Symbolic Link Following Vulnerability (CVE-2026-22767)

Dell AppSync version 4.6.0 is vulnerable to a UNIX Symbolic Link (Symlink) Following vulnerability (CVE-2026-22767) that allows a low-privileged local attacker to tamper with information.

symlink dell appsync privilege-escalation
2r 1t 1c
critical advisory

CrewAI Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in CrewAI, an open-source multi-agent orchestration framework, can be exploited by attackers through prompt injection to execute arbitrary code and perform other malicious activities, potentially leading to system compromise.

ai rce prompt-injection
3r 3t 4c
critical threat

F5 BIG-IP APM CVE-2025-53521 Reclassified as Actively Exploited Unauthenticated RCE

F5 has reclassified CVE-2025-53521, a vulnerability in BIG-IP APM, as a critical unauthenticated remote code execution vulnerability and reports it is being actively exploited in the wild.

exploited f5 big-ip apm cve-2025-53521 rce vulnerability
2r 1t 1c
high advisory

Right-to-Left Override Character Used for Defense Evasion

Adversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.

defense-evasion obfuscation
2r 1t
high advisory

BPFDoor Lock File Access

BPFDoor, an evasive Linux backdoor, is detected via the unusual access of process ID and lock files in the /var/run/ directory, indicating potential malicious activity.

bpfdoor linux backdoor ebpf
2r 2t
high advisory

gdk-pixbuf Vulnerability Allows Denial of Service and Potential Code Execution

A remote, anonymous attacker can exploit a vulnerability in gdk-pixbuf to cause a denial of service and potentially execute arbitrary code.

gdk-pixbuf denial-of-service code-execution
2r 1t
high advisory

SonicWall Email Security Appliance Multiple Vulnerabilities

A remote, authenticated attacker with administrator rights can exploit multiple vulnerabilities in SonicWall Email Security Appliance to perform cross-site scripting, manipulate data, or cause a denial-of-service.

sonicwall email security xss dos data manipulation
2r 2t
high advisory

cPanel/WHM Local Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in cPanel/WHM to escalate their privileges.

privilege-escalation cpanel whm
2r 1t
high advisory

7-Zip Multiple Vulnerabilities Allow Remote Code Execution

Multiple vulnerabilities in 7-Zip allow an attacker to execute arbitrary program code with the privileges of the service, potentially leading to system compromise.

7-zip code-execution vulnerability windows
2r 1t
high advisory

Multiple Vulnerabilities in PowerDNS

Multiple vulnerabilities in PowerDNS could be exploited by an attacker to disclose information, bypass security measures, cause a denial of service, and potentially execute code.

powerdns vulnerability dos information-disclosure code-execution
1r
medium advisory

HTTP/2 Implementations Vulnerability Enables Denial of Service

A remote, anonymous attacker can exploit a vulnerability in various HTTP/2 implementations to perform a denial-of-service attack.

http/2 denial-of-service webserver
2r 1t
critical advisory

Multiple Vulnerabilities in libpng Allow Remote Code Execution and Denial of Service

A remote, anonymous attacker can exploit multiple vulnerabilities in libpng to execute arbitrary program code or cause a denial of service.

libpng vulnerability remote-code-execution denial-of-service
2r 2t
medium advisory

7-Zip Vulnerability Allows File Manipulation

A remote, anonymous attacker can exploit a vulnerability in 7-Zip to manipulate files, leading to potential data integrity issues.

7-zip file-manipulation vulnerability
2r 2t
high advisory

IBM App Connect Enterprise Multiple Vulnerabilities

A remote, anonymous attacker can exploit multiple vulnerabilities in IBM App Connect Enterprise to cause a denial-of-service condition or bypass security measures, enabling cross-site scripting attacks.

vulnerability dos xss ibm
2r 2t
critical advisory

Red Hat Enterprise Linux libxslt Vulnerability Allows DoS and Code Execution

A local attacker can exploit a vulnerability in libxslt on Red Hat Enterprise Linux to cause a denial of service or execute arbitrary program code.

libxslt rhel vulnerability code-execution denial-of-service linux
2r 2t