Skip to content
Threat Feed

March 2026 (30)

high advisory

Apache CXF Vulnerability Allows DoS and Information Disclosure

An anonymous remote attacker can exploit a vulnerability in Apache CXF to perform a denial of service attack and disclose sensitive information.

apache-cxf denial-of-service information-disclosure webserver
2r 2t
high advisory

Blinko Pre-1.8.4 OS Command Injection Vulnerability

Blinko versions before 1.8.4 are vulnerable to OS Command Injection (CWE-78), where the MCP server creation function allows specifying arbitrary commands and arguments that are executed when testing the connection, potentially leading to code execution for attackers with high privileges.

cve-2026-23882 command-injection blinko
2r 1t
high advisory

CODESYS Control Runtime System Audit Log DoS Vulnerability (CVE-2026-3509)

An unauthenticated remote attacker can exploit CVE-2026-3509 in the CODESYS Control runtime system to control the format string of messages processed by the Audit Log, leading to a denial-of-service (DoS) condition.

codesys dos cve-2026-3509 ics ot
2r 1t
medium advisory

CPython Zipfile Module Vulnerability Allows File Manipulation

A remote, anonymous attacker can exploit a vulnerability in the zipfile module of CPython to manipulate files on affected systems.

cpython zipfile file-manipulation vulnerability
2r 1t
high advisory

CVE-2026-4675: Google Chrome WebGL Heap Buffer Overflow Vulnerability

A heap buffer overflow vulnerability (CVE-2026-4675) exists in Google Chrome's WebGL implementation prior to version 146.0.7680.165, allowing a remote attacker to perform an out-of-bounds memory read via a specially crafted HTML page, potentially leading to information disclosure or arbitrary code execution.

cve-2026-4675 heap-buffer-overflow webgl chrome remote-code-execution
2r 2t
high advisory

Device Code Phishing Campaign Targeting Cloud Platforms

A phishing campaign abuses Microsoft's Device Code OAuth flow to gain access to cloud-based file storage and document workflow platforms, bypassing traditional credential harvesting.

credential-access initial-access phishing oauth
2r 2t
critical advisory

Firefox and Thunderbird Memory Safety Vulnerability (CVE-2026-4720)

A memory safety vulnerability (CVE-2026-4720) in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 could lead to memory corruption and potential arbitrary code execution if successfully exploited.

cve-2026-4720 firefox thunderbird memory-corruption arbitrary-code-execution
2r 2t
critical advisory

GoHarbor Harbor v2.15.0 and Below Vulnerable to Hardcoded Credentials

GoHarbor Harbor version 2.15.0 and below is vulnerable to the use of hard-coded credentials, allowing an attacker to use the default password and gain unauthorized access to the web UI.

vulnerability hardcoded-credentials goharbor
2r 1t
critical advisory

Google Chrome WebAudio Heap Buffer Overflow Vulnerability (CVE-2026-4673)

A remote attacker can exploit a heap buffer overflow vulnerability (CVE-2026-4673) in Google Chrome's WebAudio component before version 146.0.7680.165 by crafting a malicious HTML page, potentially leading to an out-of-bounds memory write and arbitrary code execution.

cve-2026-4673 chrome webaudio heap overflow code execution
2r 1t
critical advisory

Langflow GitHub Actions Shell Injection Vulnerability

Unauthenticated remote shell injection vulnerability exists in Langflow GitHub Actions workflows prior to version 1.9.0, enabling attackers to execute arbitrary shell commands via malicious branch names or pull request titles due to unsanitized GitHub context variable interpolation, leading to potential secret exfiltration and supply chain compromise.

shell-injection github-actions supply-chain
2r 2t 1i
high advisory

Langflow Path Traversal Vulnerability (CVE-2026-33497)

A path traversal vulnerability in Langflow versions before 1.7.1 allows unauthenticated attackers to read sensitive files via the download_profile_picture endpoint due to insufficient filtering of the folder_name and file_name parameters.

path-traversal vulnerability web-application
2r 1t
critical advisory

LiteLLM Package Compromised with Credential-Stealing Code via Trivy

The LiteLLM package was compromised and infected with credential-stealing code through a supply chain attack leveraging the Trivy vulnerability scanner.

supply-chain credential-theft llm trivy
2r 1t
critical advisory

Multiple Vulnerabilities in GnuPG and Gpg4win Allow for Arbitrary Code Execution and Denial of Service

Multiple vulnerabilities exist in GnuPG and Gpg4win that could allow a remote attacker to execute arbitrary code or cause a denial-of-service condition.

gnupg gpg4win vulnerability code-execution denial-of-service
2r 2t
high advisory

Palo Alto Networks Recruiting Impersonation Phishing Campaign

Since August 2025, threat actors have been impersonating Palo Alto Networks talent acquisition staff in a sophisticated phishing campaign targeting senior professionals, using social engineering tactics to solicit fraudulent resume fees.

phishing recruiting social-engineering scam
2r 2t 6i
high advisory

IBM WebSphere Application Server Liberty Multiple Vulnerabilities

A remote, authenticated attacker can exploit multiple vulnerabilities in IBM WebSphere Application Server Liberty to escalate privileges, bypass security measures, and disclose information.

websphere vulnerability privilege-escalation defense-evasion information-disclosure
2r 3t
high advisory

TIBCO ActiveMatrix Vulnerability Allows Information Disclosure and Data Manipulation

A remote, authenticated attacker can exploit a vulnerability in TIBCO ActiveMatrix and TIBCO Administrator to disclose information and manipulate data, potentially leading to unauthorized access and control.

tibco vulnerability information-disclosure data-manipulation
2r 2t
critical advisory

Langflow Vulnerability Allows Arbitrary Code Execution

A vulnerability in Langflow allows an attacker to execute arbitrary code, potentially leading to system compromise.

langflow code-execution vulnerability
2r 1t
high threat

M-Trends 2026: Evolving Threat Landscape

The M-Trends 2026 report highlights the increasing sophistication of threat actors, including voice phishing attacks targeting SaaS environments, ransomware groups actively destroying recovery capabilities, and espionage groups exploiting edge devices for persistent access, revealing a shift towards faster hand-offs between initial access brokers and ransomware deployers.

Scattered Spider +10 threat-report ransomware phishing saas
3r 10t
high threat

NICKEL ALLEY Targeting Developers with Fake Job Opportunities

NICKEL ALLEY, a North Korean threat group, is targeting technology professionals with fake job opportunities and malicious code repositories to deliver malware like PyLangGhost RAT and BeaverTail, aiming to steal cryptocurrency.

NICKEL ALLEY North Korea cryptocurrency supply-chain
2r 5t 4i
critical advisory

Multiple Vulnerabilities in Redis

Multiple vulnerabilities in Redis allow an attacker to execute arbitrary program code and perform a denial-of-service attack.

redis vulnerability code execution denial of service
2r 2t
critical advisory

Multiple Vulnerabilities in Red Hat Developer Hub

Multiple vulnerabilities in Red Hat Developer Hub allow a remote attacker to perform denial of service, execute arbitrary code, bypass security measures, and manipulate data.

redhat developer hub vulnerability denial of service code execution
2r 8t
high advisory

Red Hat JBoss Enterprise Application Platform Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat JBoss Enterprise Application Platform to cause a denial-of-service condition, manipulate data, and conduct further attacks such as cache poisoning and session hijacking.

jboss undertow denial-of-service cache-poisoning session-hijacking webserver
2r 3t
high advisory

Multiple Vulnerabilities in Grub Bootloader

Multiple vulnerabilities in the Grub bootloader allow attackers to execute arbitrary code and cause denial-of-service conditions.

bootloader grub2 vulnerability denial-of-service arbitrary-code-execution
2r 2t
high advisory

RedHat Multicluster Engine for Kubernetes Privilege Escalation Vulnerability

A local attacker can exploit a vulnerability in RedHat Multicluster Engine for Kubernetes to escalate privileges.

kubernetes privilege-escalation cloud
2r 1t
critical advisory

Multiple Vulnerabilities in Apache Tomcat Allow for Remote Code Execution and Data Manipulation

Multiple vulnerabilities in Apache Tomcat can be exploited by a remote, authenticated or anonymous attacker to execute arbitrary code, bypass security measures, manipulate data, and cause a denial of service.

apache-tomcat vulnerability remote-code-execution data-manipulation denial-of-service
2r 3t
medium advisory

Red Hat OpenShift GitOps Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in Red Hat OpenShift GitOps to manipulate data, misrepresent information, or cause a denial of service.

openshift gitops vulnerability cloud
2r 1t
critical advisory

Asterisk and Digium Certified Asterisk Vulnerabilities

An authenticated remote attacker can exploit vulnerabilities in Asterisk and Digium Certified Asterisk to achieve arbitrary code execution, denial of service, or information disclosure.

asterisk voip code-execution dos information-disclosure
2r 8t
critical advisory

IBM Tivoli Netcool/OMNIbus Multiple Vulnerabilities

An anonymous remote attacker can exploit multiple vulnerabilities in IBM Tivoli Netcool/OMNIbus to achieve arbitrary code execution, information disclosure, file manipulation, or denial of service.

ibm tivoli netcool omnibus vulnerability code-execution dos
2r 3t
high advisory

Uncontrolled VM Growth Leading to Security Gaps in Cloud Environments

Uncontrolled growth of virtual machines (VM sprawl) in cloud environments allows attackers to exploit unmonitored VMs with overly permissive access for lateral movement, data exfiltration, and ransomware deployment.

cloud vm-sprawl identity-abuse
2r 7t
critical advisory

Red Hat Enterprise Linux Vulnerability Leads to Code Execution and Potential DoS

A remote, authenticated attacker can exploit a vulnerability in Red Hat Enterprise Linux (specifically 389-ds-base) to achieve arbitrary code execution and potentially cause a denial of service.

rhel code-execution denial-of-service linux
2r 3t