SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals


Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsISC provides a free analysis and warning service to thousands of Internet users and organizations, and is actively working with Internet Service Providers to fight back against the most malicious attackers. https://isc.sans.edu/about.html
TeamPCP Supply Chain Campaign: Update 008 - 26-Day Pause Ends with Three Concurrent Compromises (Checkmarx KICS, Bitwarden CLI Cascade, xinference PyPI), CanisterSprawl npm Worm Identified, and Tier 1 Coverage Returns
Published: 2026-04-27
Last Updated: 2026-04-27 14:01:17 UTC
by Kenneth Hartman (Version: 1)
This update succeeds TeamPCP Supply Chain Campaign Update 007, published April 8, 2026, which left the campaign in credential-monetization mode following the Cisco source code theft via Trivy-linked credentials, Google GTIG's formal designation of the operators as UNC6780 (with their credential stealer named SANDCLOCK), and the lapsed CISA KEV remediation deadline for CVE-2026-33634 with no standalone federal advisory. The Sportradar publication deadline flagged in Update 007 (approximately April 10 to 11) lapsed without a public CipherForce dump, and CipherForce's leak infrastructure has remained offline. Twelve days after Update 007, the technical compromise picture changed sharply across the W17 window (April 20 through April 26).
The most significant development of the week was the end of TeamPCP's 26-day supply chain compromise pause, with three concurrent package compromises landing across npm, PyPI, and Docker Hub between April 21 and 22. The Checkmarx KICS Docker Hub repository was compromised on April 22 (claimed by TeamPCP via @pcpcats), the xinference PyPI package was poisoned the same day with a TeamPCP marker that the group publicly denied, and a self-propagating npm worm tracked as CanisterSprawl was identified by Socket and StepSecurity beginning April 21. The KICS Docker compromise then cascaded into a downstream compromise of @bitwarden/cli version 2026.4.0 the same evening when Bitwarden's Dependabot automation pulled the malicious checkmarx/kics:latest image into the Bitwarden CI/CD pipeline. Reporting suggests the campaign has visibly returned to its technical-discovery and active-compromise phase after spending most of April in credential-monetization mode; analysts assess the operators retain full operational capability despite the prior month's monetization failures ...
Apple Patches Exploited Notification Flaw
Published: 2026-04-23
Last Updated: 2026-04-23 10:18:30 UTC
by Johannes Ullrich (Version: 1)
Apple yesterday released iOS/iPadOS 26.4.2 and iOS/iPadOS 18.7.8. This update fixes a single Notification Services vulnerability, CVE-2026-28950:
Impact: Notifications marked for deletion could be unexpectedly retained on the device Description: A logging issue was addressed with improved data redaction.
Apple did not mark the vulnerability as exploited. However, recent news articles reported that the FBI used this vulnerability to extract Signal messages from a device seized in a criminal case. The suspect in the case used Signal to communicate. Signal is encrypted end-to-end and attempts not to store retrievable data on the device itself. However, Signal may display a notification on the screen whenever a new message is received. These notifications may include the sender's username and some of the message's content. Signal used Apple's Notification Services framework to generate these notifications, and iOS did not delete their contents even when they were marked for deletion.
The use of OS libraries and APIs like that has caused problems before, as they may not be designed with the same threat model in mind as the one used to create secure messaging applications.
Read the full entry: https://isc.sans.edu/diary/Apple+Patches+Exploited+Notification+Flaw/32922/ HTTP
Requests with X-Vercel-Set-Bypass-Cookie Header
Published: 2026-04-28
Last Updated: 2026-04-28 13:28:45 UTC
by Johannes Ullrich (Version: 1)
This weekend, we saw a few requests to our honeypot that included an "X-Vercel-Set-Bypass-Cookie" header. A sample request ...
Vercel documents the "x-vercel-protection-bypass" header(note: no "Cookie" part) as a secret that can be configured to disable certain protections during testing. This type of bypass feature is common in various platforms. In particular, web application firewall features often need to be disabled to allow higher request rates during CI/CD pipeline operations. The value set in the header is a user-configurable secret ...
Read the full entry: https://isc.sans.edu/diary/HTTP+Requests+with+XVercelSetBypassCookie+Header/32930/
Researcher Jakob Wolffhechel wrote a blog post outlining 89 vulnerabilities he discovered in Citrix XenServer. There are currently no patches available for these vulnerabilities. Hopefully there will be an update available soon but at this point really the best thing you can do is to limit access to the API to reduce the likelihood of being compromised. Jakob's blog post points out that you should assume compromise as these vulnerabilities have been around since the beginning of Citrix XenServer. As Citrix has not yet responded and there are no CVEs for these vulnerabilities, they are not included in our list below.
SANS Internet Storm Center Podcast, Tuesday, April 28, 2026.
Danger of Libredtail [Guest Diary] (2026.04.29)
https://isc.sans.edu/diary/Danger+of+Libredtail+Guest+Diary/32936/
Today's Odd Web Requests (2026.04.29)
The list is assembled by pulling recent vulnerabilities from NIST NVD, Microsoft, Twitter mentions of vulnerabilities, ISC Diaries and Podcast, and the CISA list of known exploited vulnerabilities. There are also some unscored, but significant, vulnerabilities at the end. This includes vulnerabilities that have not been added to the NVD yet.
CVE-2026-40372 - ASP.NET Core Elevation of Privilege Vulnerability
Product: Microsoft Asp.Net Core
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40372
ISC Podcast: https://isc.sans.edu/podcastdetail/9906
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40372
NVD References: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40372
CVE-2026-33634 - Trivy was compromised on March 19, 2026, allowing a threat actor to replace version tags with malicious commits, potentially exposing sensitive data.
Product: Aqua Security Trivy
CVSS Score: 0
** KEV since 2026-03-26 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33634
ISC Diary: https://isc.sans.edu/diary/32926
CVE-2026-41651 - PackageKit versions 1.0.2 to 1.3.4 allows local unprivileged users to escalate privileges and install malicious RPM packages as root due to a TOCTOU race condition in transaction flags, which is fixed in version 1.3.5.
Product: PackageKit Project
CVSS Score: 8.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41651
ISC Podcast: https://isc.sans.edu/podcastdetail/9908
NVD References: https://github.com/PackageKit/PackageKit/security/advisories/GHSA-f55j-vvr9-69xv
CVE-2026-32202 - Windows Shell Spoofing Vulnerability
Product: Microsoft Windows Shell
CVSS Score: 4.3
** KEV since 2026-04-28 **
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-32202
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32202
CVE-2026-31478 - ksmbd: replace hardcoded hdr2_len with offsetof() in smb2_calc_max_out_buf_len()
Product: Linux Kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31478
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-31478
CVE-2026-31657 - batman-adv: hold claim backbone gateways by reference
Product: Linux Kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31657
CVE-2026-31659 - batman-adv: reject oversized global TT response buffers
Product: Linux Kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31659
CVE-2026-31668 - seg6: separate dst_cache for input and output paths in seg6 lwtunnel
Product: Linux Kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31668
CVE-2026-31669 - mptcp: fix slab-use-after-free in __inet_lookup_established
Product: Linux Kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31669
CVE-2026-5450 - scanf %mc off-by-one heap buffer overflow
Product: GNU C Library
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-5450
CVE-2026-26149 - Microsoft Power Apps Desktop Client Spoofing Vulnerability
Product: Microsoft Power Apps Desktop Client
CVSS Score: 9.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-26149
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26149
CVE-2026-3854 - GitHub Enterprise Server was vulnerable to remote code execution due to improper neutralization of special elements during a git push operation.
Product: GitHub Enterprise Server
CVSS Score: 0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-3854
ISC Podcast: https://isc.sans.edu/podcastdetail/9910
CVE-2026-41329 - OpenClaw before 2026.3.31 is vulnerable to a sandbox bypass allowing attackers to escalate privileges by manipulating parameters and context inheritance.
Product: OpenClaw
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41329
NVD References:
- https://github.com/openclaw/openclaw/security/advisories/GHSA-g5cg-8x5w-7jpm
- https://www.vulncheck.com/advisories/openclaw-sandbox-bypass-via-heartbeat-context-inheritance-and-senderisowner-escalation
CVE-2026-41386 - OpenClaw before 2026.3.22 is susceptible to privilege escalation through unauthorized device roles and scopes during initial pairing.
Product: OpenClaw bootstrap setup codes
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41386
NVD References:
- https://github.com/openclaw/openclaw/security/advisories/GHSA-gg9v-mgcp-v6m7
- https://www.vulncheck.com/advisories/openclaw-privilege-escalation-via-unbound-bootstrap-setup-codes
CVE-2026-39861 - Claude Code allowed sandbox escape via symlinks prior to version 2.1.64, enabling potential code execution outside the workspace.
Product: Anthropic Claude Code
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-39861
NVD References: https://github.com/anthropics/claude-code/security/advisories/GHSA-vp62-r36r-9xqp
CVE-2026-40496 - FreeScout prior to version 1.8.213 allows unauthenticated attackers to download private attachments due to a weak and predictable token generation formula.
Product: FreeScout
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40496
NVD References: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-2783-wxmm-wmwr
CVE-2026-40498 - FreeScout prior to version 1.8.213 allows unauthenticated attackers to access sensitive server information and trigger resource exhaustion through the /system/cron endpoint due to a static MD5 hash derived from the exposed APP_KEY.
Product: FreeScout
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40498
NVD References: https://github.com/freescout-help-desk/freescout/security/advisories/GHSA-5jw5-q9j7-4rxc
CVE-2026-5965 - NewSoftOA, developed by NewSoft, is vulnerable to OS Command Injection, enabling local attackers to inject and execute arbitrary OS commands without authentication.
Product: NewSoftOA
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-5965
NVD References: https://www.twcert.org.tw/en/cp-139-10857-c46f7-2.html
CVE-2026-6748, CVE-2026-6760, CVE-2026-6768, CVE-2026-6771, CVE-2026-7321 - Vulnerabilities in Mozilla Firefox and Firefox ESR
Product: Mozilla Firefox and Firefox ESR
CVSS Scores: 9.6 - 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6748
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6760
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6768
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6771
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-7321
NVD References:
- https://www.mozilla.org/security/advisories/mfsa2026-30/
- https://www.mozilla.org/security/advisories/mfsa2026-32/
- https://www.mozilla.org/security/advisories/mfsa2026-33/
- https://www.mozilla.org/security/advisories/mfsa2026-34/
- https://www.mozilla.org/security/advisories/mfsa2026-36/
CVE-2017-20230 - Storable versions before 3.05 for Perl is vulnerable to a stack overflow due to a mismatch in how class name lengths are handled.
Product: Storable
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2017-20230
CVE-2025-15638 - Net::Dropbear versions before 0.14 for Perl contain a vulnerable version of libtomcrypt, exposing users to CVE-2016-6129 and CVE-2018-12437.
Product: Atrodo Net\\
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-15638
CVE-2026-38835 - Tenda W30E V2.0 V16.01.0.21 is vulnerable to command injection through the usbPartitionName parameter, enabling attackers to execute arbitrary commands.
Product: Tenda W30E
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-38835
CVE-2026-31255 - Tenda AC18 V15.03.05.05_multi is vulnerable to command injection through improper handling of the guestuser parameter in the /goform/SetSambaCfg interface.
Product: Tenda AC18
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31255
CVE-2026-40050 - LogScale has a critical unauthenticated path traversal vulnerability that can allow remote attackers to read files from the server filesystem.
Product: CrowdStrike LogScale
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40050
NVD References: https://www.crowdstrike.com/en-us/security-advisories/cve-2026-40050/
CVE-2026-5652 - Crafty Controller has an insecure direct object reference vulnerability in its Users API component, allowing authenticated attackers to modify user data.
Product: Crafty Controller
CVSS Score: 9.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-5652
CVE-2026-40884 - Goshs is a SimpleHTTPServer written in Go vulnerable to an SFTP authentication bypass allowing unauthenticated attackers to access files without a password prior to version 2.0.0-beta.6.
Product: Goshs
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40884
NVD References: https://github.com/patrickhener/goshs/security/advisories/GHSA-c29w-qq4m-2gcv
CVE-2026-40903 - Goshs, a SimpleHTTPServer written in Go, had an ArtiPACKED vulnerability that could lead to leaking the GITHUB_TOKEN through workflow artifacts prior to version 2.0.0-beta.6.
Product: Goshs
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40903
NVD References: https://github.com/patrickhener/goshs/security/advisories/GHSA-hpxj-9fgp-fhhf
CVE-2026-33518, CVE-2026-33519 - Incorrect privilege assignment vulnerabilities in Esri Portal for ArcGIS
Product: Esri Portal for ArcGIS
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33518
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33519
NVD References: https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/april2026_security_bulletin
CVE-2026-34275 - Oracle Advanced Inbound Telephony in Oracle E-Business Suite (Setup and Administration component) versions 12.2.3-12.2.15 is vulnerable to an easily exploitable attack allowing unauthenticated attackers to compromise the system and potentially take over.
Product: Oracle Advanced Inbound Telephony
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-34275
NVD References: https://www.oracle.com/security-alerts/cpuapr2026.html
CVE-2026-34279 - Oracle Enterprise Manager Base Platform product is susceptible to an easily exploitable vulnerability allowing a high privileged attacker to compromise the system via HTTP and potentially impact additional products.
Product: Oracle Enterprise Manager Base Platform
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-34279
NVD References: https://www.oracle.com/security-alerts/cpuapr2026.html
CVE-2026-34285, CVE-2026-34286, CVE-2026-34287 - The Oracle Identity Manager Connector product of Oracle Fusion Middleware (component: Core) version 12.2.1.4.0 has critical vulnerabilities that allows an unauthenticated attacker to compromise the system and gain unauthorized access to sensitive data.
Product: Oracle Identity Manager Connector
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-34285
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-34286
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-34287
NVD References: https://www.oracle.com/security-alerts/cpuapr2026.html
CVE-2026-40892 - PJSIP is vulnerable to a stack buffer overflow in versions 2.16 and earlier, due to a lack of upper-bound check when copying credential data.
Product: PJSIP
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40892
NVD References: https://github.com/pjsip/pjproject/security/advisories/GHSA-2wcg-w3c4-48r7
CVE-2026-41415 - PJSIP versions 2.16 and earlier have an out-of-bounds read vulnerability when parsing a malformed Content-ID URI in SIP multipart message body, fixed in version 2.17.
Product: PJSIP
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41415
NVD References: https://github.com/pjsip/pjproject/security/advisories/GHSA-935m-fmf5-j4pm
CVE-2026-40906 - Electric's Postgres sync engine is vulnerable to error-based SQL injection through the order_by parameter in the ElectricSQL /v1/shape API from version 1.1.12 to before 1.5.0, which allows authenticated users to potentially access and manipulate the entire PostgreSQL database.
Product: Electric Postgres sync engine
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40906
NVD References: https://github.com/electric-sql/electric/security/advisories/GHSA-h5rg-pxx7-r2hj
CVE-2026-40911, CVE-2026-41064, CVE-2026-41304 - Vulnerabilities in WWBN AVideo.
Product: WWBN AVideo
CVSS Scores: 9.3 - 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40911 (code injection)
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41064 (OS command injection)
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41304 (command injection)
NVD References:
- https://github.com/WWBN/AVideo/security/advisories/GHSA-gph2-j4c9-vhhr
- https://github.com/WWBN/AVideo/security/advisories/GHSA-3fpm-8rjr-v5mc
- https://github.com/WWBN/AVideo/security/advisories/GHSA-pq8p-wc4f-vg7j
- https://github.com/WWBN/AVideo/security/advisories/GHSA-xr6f-h4x7-r6qp
CVE-2026-40933, CVE-2026-41264, CVE-2026-41265, CVE-2026-41268, CVE-2026-41276 - Multiple vulnerabilities in Flowise.
Product: Flowise
CVSS Scores: 9.8 - 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40933
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41264
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41265
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41268
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41276
NVD References:
- https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-c9gw-hvqq-f33r
- https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-3hjv-c53m-58jj
- https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-v38x-c887-992f
- https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-cvrr-qhgw-2mm6
- https://github.com/FlowiseAI/Flowise/security/advisories/GHSA-f6hc-c5jr-878p
CVE-2026-40575 - OAuth2 Proxy versions 7.5.0 through 7.15.1 allows unauthenticated remote attackers to bypass authentication and access protected routes by spoofing the client-supplied `X-Forwarded-Uri` header.
Product: OAuth2 Proxy
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40575
NVD References: https://github.com/oauth2-proxy/oauth2-proxy/security/advisories/GHSA-7x63-xv5r-3p2x
CVE-2026-31436 - Linux kernel: The idxd dmaengine vulnerability can cause issues like NULL pointer dereferences, double completion, or descriptor leaks.
Product: Linux kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31436
CVE-2026-31463 - The Linux kernel is vulnerable due to improper handling of invalid folio access in the iomap feature.
Product: Linux kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31463
CVE-2026-31501 - The Linux kernel has resolved a vulnerability in net: ti: icssg-prueth related to a use-after-free of CPPI descriptor in the RX path.
Product: Linux Kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31501
CVE-2026-6356 - Augmentt Web Application is vulnerable to privilege escalation through parameter manipulation, granting standard users super administrator privileges and access to sensitive information.
Product: Augmentt Web Application
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6356
CVE-2018-25270 - ThinkPHP 5.0.23 allows unauthenticated attackers to execute arbitrary PHP code through the routing parameter.
Product: ThinkPHP
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2018-25270
NVD References: https://www.vulncheck.com/advisories/thinkphp-remote-code-execution-via-invokefunction
CVE-2018-25272 - ELBA5 5.8.0 is vulnerable to remote code execution, enabling attackers to steal database credentials and run commands with SYSTEM level access.
Product: ELBA5 5.8.0
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2018-25272
NVD References: https://www.vulncheck.com/advisories/elba5-remote-code-execution-via-database-access
CVE-2026-33471 - Nimiq-block in Nimiq's Rust implementation prior to version 1.3.0 is vulnerable to a quorum inflation attack where an attacker can manipulate MultiSignature.signers to pass skip block proof verification with fewer than 2f+1 real signer slots.
Product: Nimiq
CVSS Score: 9.6
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33471
NVD References: https://github.com/nimiq/core-rs-albatross/security/advisories/GHSA-6973-8887-87ff
CVE-2026-33656 - EspoCRM's vulnerability in versions prior to 9.3.4 allows an authenticated admin to overwrite the `sourceId` field on `Attachment` entities and potentially redirect file operations to an arbitrary path within the web server's `open_basedir` scope.
Product: EspoCRM
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33656
NVD References: https://github.com/espocrm/espocrm/security/advisories/GHSA-7922-x7cf-j54x
CVE-2026-41167 - Jellystat allows authenticated users to inject arbitrary SQL and execute commands on the PostgreSQL host in versions prior to 1.1.10.
Product: Jellystat
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41167
NVD References: https://github.com/CyferShepard/Jellystat/security/advisories/GHSA-fj7c-2p5q-g56m
CVE-2026-29198 - Rocket.Chat is vulnerable to a NoSQL injection flaw, allowing attackers to take over the first user account with a generated token if an OAuth app is set up.
Product: Rocket.Chat
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-29198
CVE-2026-41176 - Rclone allows unauthenticated attackers to disable authorization gates and gain unauthorized access to sensitive administrative functionality on reachable RC servers.
Product: Rclone
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41176
NVD References: https://github.com/rclone/rclone/security/advisories/GHSA-25qr-6mpr-f7qx
CVE-2026-41179 - Rclone allows unauthenticated attackers to execute local commands through an exposed RC endpoint in versions prior to 1.73.5.
Product: Rclone
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41179
NVD References: https://github.com/rclone/rclone/security/advisories/GHSA-jfwf-28xr-xw6q
CVE-2026-41679 - Paperclip, a Node.js server and React UI orchestrating AI agents to run a business, is vulnerable to unauthenticated remote code execution prior to version 2026.416.0, allowing attackers to exploit any network-accessible instance running in `authenticated` mode with default settings via a fully automated six-API-call chain.
Product: Paperclip
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41679
NVD References: https://github.com/paperclipai/paperclip/security/advisories/GHSA-68qg-g8mg-6pr7
CVE-2026-41228 - Froxlor is vulnerable to a path traversal attack via the `Customers.update` endpoint prior to version 2.3.6, allowing authenticated customers to achieve arbitrary PHP code execution.
Product: Froxlor
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41228
NVD References: https://github.com/froxlor/froxlor/security/advisories/GHSA-w59f-67xm-rxx7
CVE-2026-41229 - Froxlor prior to version 2.3.6 allows remote attackers to execute arbitrary PHP code as the web server user through unescaped input in the `privileged_user` parameter.
Product: Froxlor
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41229
NVD References: https://github.com/froxlor/froxlor/security/advisories/GHSA-gc9w-cc93-rjv8
CVE-2026-6885, CVE-2026-6886, CVE-2026-6887 - Multiple vulnerabilities in Borg SPM 2007 (Sales Ended in 2008).
Product: BorG Technology Corporation Borg SPM 2007
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6885 (arbitrary file upload)
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6886 (authentication bypass)
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6887 (SQL injection)
NVD References: https://www.twcert.org.tw/en/cp-139-10863-2f48e-2.html
CVE-2026-41460 - SocialEngine versions 7.8.0 and prior are vulnerable to SQL injection via the /activity/index/get-memberall endpoint, allowing unauthenticated attackers to read data, reset passwords, and access the Packages Manager.
Product: SocialEngine
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41460
NVD References: https://www.vulncheck.com/advisories/socialengine-sql-injection-via-activity-index-get-memberall
CVE-2025-62373 - Pipecat, an open-source Python framework for building real-time voice and multimodal conversational agents, has a vulnerability in `LivekitFrameSerializer` allowing for remote code execution.
Product: Pipecat LivekitFrameSerializer
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2025-62373
NVD References: https://github.com/pipecat-ai/pipecat/security/advisories/GHSA-c2jg-5cp7-6wc7
CVE-2026-23751 - Kofax Capture, now referred to as Tungsten Capture, version 6.0.0.0 exposes a deprecated .NET Remoting HTTP channel on port 2424, allowing unauthenticated remote attackers to read, write, or manipulate files on the server.
Product: Kofax Capture / Tungsten Capture
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-23751
NVD References: https://www.vulncheck.com/advisories/kofax-capture-unauthenticated-file-read-write-smb-coercion-via-net-remoting
CVE-2026-39087 - An issue in Ntfy ntfy.sh before v.2.21 allows a remote attacker to execute arbitrary code via the parseActions function
Product: Ntfy ntfy.sh
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-39087
CVE-2026-40470, CVE-2026-40471, CVE-2026-40472 - Multiple vulnerabilties in Hackage-server.
Product: hackage-server hackage.haskell.org
CVSS Scores: 9.6 - 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40470
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40471
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40472
NVD References:
- https://osv.dev/vulnerability/HSEC-2024-0004
- https://osv.dev/vulnerability/HSEC-2026-0002
- https://osv.dev/vulnerability/HSEC-2026-0004
CVE-2026-31175, CVE-2026-31177, CVE-2026-31178, CVE-2026-31181 - Multiple arbitrary command execution vulnerabilities in TOTOLINK A3300R firmware v17.0.0cu.557_B20221024 is vulnerable to arbitrary command execution through the stunEnable parameter in /cgi-bin/cstecgi.cgi.
Product: TOTOLINK A3300R Firmware
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31175
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31177
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31178
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31181
NVD References:
- https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-stun-enable-cmd-injection
- https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-stun-min-alive-cmd-injection
- https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-stun-max-alive-cmd-injection
- https://github.com/Svigo-o/TOTOLINK-Vul/tree/main/totolink-a3300r-stun-server-addr-cmd-injection
CVE-2026-31533 - The Linux Kernel resolved a vulnerability in net/tls, fixing a use-after-free in the -EBUSY error path of tls_do_encryption due to double cleanup of encrypt_pending and the scatterlist entry.
Product: Linux kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31533
CVE-2026-41247 - elFinder version prior to 2.1.67 is vulnerable to command injection in the resize command, allowing arbitrary command execution by passing a crafted bg parameter.
Product: elFinder
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41247
NVD References: https://github.com/Studio-42/elFinder/security/advisories/GHSA-8q4h-8crm-5cvc
CVE-2026-25874 - LeRobot through 0.5.1 has an unsafe deserialization vulnerability allowing unauthenticated attackers to execute arbitrary code through crafted pickle payloads.
Product: LeRobot
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-25874
NVD References: https://www.vulncheck.com/advisories/lerobot-unsafe-deserialization-remote-code-execution-via-grpc
CVE-2026-6942 - Radare2-mcp version 1.6.0 and earlier is vulnerable to an OS command injection flaw that enables remote code execution without authentication.
Product: Radare2-mcp
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6942
NVD References: https://www.vulncheck.com/advisories/radare2-mcp-os-command-injection-via-shell-metacharacter-bypass
CVE-2026-26210 - KTransformers through 0.5.3 is vulnerable to a remote code execution exploit due to unsafe deserialization in the balance_serve backend mode.
Product: KTransformers
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-26210
NVD References: https://www.vulncheck.com/advisories/ktransformers-unsafe-deserialization-rce-via-balance-serve
CVE-2026-33076, CVE-2026-33078 - Vulnerabilities in Roxy-WI.
Product: Roxy-WI
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33076 (path traversal)
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33078 (SQL injection)
NVD References:
- https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-mmgm-p9x9-h33j
- https://github.com/roxy-wi/roxy-wi/security/advisories/GHSA-jmj9-2c4q-849j
CVE-2026-1949 through CVE-2026-1952 - Multiple vulnerabilities in Delta Electronics AS320T has a buffer overflow vulnerability in the GET/PUT request handler of the web service due to an incorrect calculation in the stack size allocation.
Product: Delta Electronics AS320T
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-1949
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-1950
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-1951
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-1952
NVD References: https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2026-00006_AS320T%20Multiple%20vulnerabilities%20(CVE-2026-1949,%201950,%201951,%201952).pdf
CVE-2026-25660 - CodeChecker is vulnerable to authentication bypass through version 6.27.3, allowing arbitrary permissions to be assigned to any user in CodeChecker by manipulating the URL with certain function calls.
Product: CodeChecker
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-25660
NVD References: https://github.com/Ericsson/codechecker/security/advisories/GHSA-4v9x-cqc5-j645
CVE-2026-31633 - Linux kernel was vulnerable to an integer overflow in rxgk_verify_response(), allowing length check bypass.
Product: Linux Kernel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31633
CVE-2026-31636 - The Linux kernel vulnerability fixed in rxrpc allows for an out-of-bounds read in the RESPONSE authenticator parser.
Product: Linux Kernel
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-31636
CVE-2026-6911 - AWS Ops Wheel is vulnerable to missing JWT signature verification, allowing unauthenticated attackers to forge tokens and gain unintended administrative access, including the ability to modify application data and manage Cognito user accounts.
Product: AWS Ops Wheel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6911
NVD References: https://github.com/aws/aws-ops-wheel/security/advisories/GHSA-v5vr-8w3c-37x2
CVE-2026-41327, CVE-2026-41328 - Dgraph prior to 25.3.3 contains vulnerabilities that allow an unauthenticated attacker full read access to all database data.
Product: Dgraph
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41327
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41328
NVD References:
- https://github.com/dgraph-io/dgraph/security/advisories/GHSA-mrxx-39g5-ph77
- https://github.com/dgraph-io/dgraph/security/advisories/GHSA-x92x-px7w-4gx4
CVE-2026-41492 - Dgraph is vulnerable to an unauthenticated attacker being able to retrieve and replay the admin token through the /debug/vars endpoint on Alpha prior to version 25.3.3, which could grant access to admin-only endpoints.
Product: Dgraph
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41492
NVD References: https://github.com/dgraph-io/dgraph/security/advisories/GHSA-vvf7-6rmr-m29q
CVE-2026-41428 - Budibase, an open-source low-code platform, had a vulnerability in its authenticated middleware that allowed attackers to access protected endpoints by appending a public endpoint path as a query parameter prior to version 3.35.4.
Product: Budibase
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41428
NVD References: https://github.com/Budibase/budibase/security/advisories/GHSA-8783-3wgf-jggf
CVE-2026-41475 - BACnet Stack is vulnerable to an out-of-bounds read issue prior to version 1.4.3, allowing unauthenticated remote attackers to read past allocated buffer boundaries.
Product: BACnet Stack
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41475
NVD References: https://github.com/bacnet-stack/bacnet-stack/security/advisories/GHSA-cvv4-v3g6-4jmv
CVE-2026-41248 - Clerk JavaScript's createRouteMatcher can be bypassed by crafted requests, potentially skipping middleware gating and reaching downstream handlers.
Product: Clerk JavaScript
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41248
NVD References: https://github.com/clerk/javascript/security/advisories/GHSA-vqx2-fgx2-5wq9
CVE-2026-41473 - CyberPanel versions prior to 2.4.4 have an authentication bypass vulnerability that allows unauthenticated attackers to write arbitrary data to the database and cause denial of service.
Product: Cyberpanel
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41473
NVD References: https://www.vulncheck.com/advisories/cyberpanel-unauthenticated-api-access-via-ai-scanner-endpoints
CVE-2026-41478 - Saltcorn prior to versions 1.4.6, 1.5.6, and 1.6.0-beta.5 is vulnerable to SQL injection through mobile-sync routes, allowing authenticated low-privilege users to potentially exfiltrate data, access admin passwords, and modify or destroy the database.
Product: Saltcorn
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41478
NVD References: https://github.com/saltcorn/saltcorn/security/advisories/GHSA-jp74-mfrx-3qvh
CVE-2026-6951 - Simple-git before version 3.36.0 is vulnerable to Remote Code Execution (RCE) allowing attackers to exploit untrusted input in the options argument.
Product: Simple-git
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-6951
CVE-2026-42363 - GeoVision GV-IP Device Utility 9.0.5 allows for credentials leak through insufficient encryption in Device Authentication functionality.
Product: GeoVision GV-IP Device Utility
CVSS Score: 9.3
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-42363
CVE-2026-40453 - Apache Camel versions 3.0.0 through 4.20.0 are vulnerable to remote code execution and arbitrary file write due to a lack of case-sensitive filtering in certain HeaderFilterStrategy implementations.
Product: Apache Camel
CVSS Score: 9.9
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40453
NVD References: https://camel.apache.org/security/CVE-2026-40453.html
CVE-2026-40860 - Camel-jms and camel-sjms are vulnerable to remote code execution due to deserialization of incoming JMS ObjectMessage values without any class filtering, fixed in version 4.20.0.
Product: Apache Camel
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40860
NVD References: https://camel.apache.org/security/CVE-2026-40860.html
CVE-2026-33454 - Camel-Mail component is vulnerable to message header injection, allowing attackers to manipulate the behavior of Camel components downstream when consuming emails through camel-mail without proper inbound filter configuration.
Product: Apache Camel
CVSS Score: 9.4NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33454
NVD References: https://camel.apache.org/security/CVE-2026-33454.html
CVE-2026-41409 - Apache MINA AbstractIoBuffer.getObject() vulnerability allows deserialization of unauthorized classes, impacting versions 2.0.0 to 2.2.5.
Product: Apache MINA
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41409
NVD References: https://lists.apache.org/thread/9ddvsq6c4l5bhwq8l14sob4f8qjvx5c9
CVE-2026-33453 - Apache Camel's camel-coap component vulnerability allows for unauthenticated attackers to inject arbitrary Camel internal headers into the Exchange, leading to remote code execution when interacting with header-sensitive producers.
Product: Apache Camel
CVSS Score: 10.0
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33453
NVD References: https://camel.apache.org/security/CVE-2026-33453.html
CVE-2026-41635 - Apache MINA's AbstractIoBuffer.resolveClass() vulnerability allows arbitrary code execution by bypassing the classname allowlist.
Product: Apache MINA
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41635
NVD References: https://lists.apache.org/thread/1l91w1mqsb3lwfd504fs045ylxntt2tm
CVE-2026-41873 - Pony Mail has an inconsistent interpretation of HTTP requests vulnerability leading to admin account takeover, affecting all versions of the Lua implementation.
Product: Apache Pony_Mail
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-41873
NVD References: https://lists.apache.org/thread/1c7jtxjobh280kqc13fzw1cg57xrz951
CVE-2026-35903 - The MERCURY MIPC252W IP camera is vulnerable to unauthorized RTSP control commands due to an improper authentication vulnerability in the RTSP service.
Product: MERCURY MIPC252W IP camera
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-35903
CVE-2024-46636 - NASA Earth Observing System Data and Information System (EOSDIS) MODAPS v8.1 is vulnerable to SQL injection via the category parameter.
Product: NASA Earth Observing System Data and Information System (EOSDIS) MODAPS v8.1
CVSS Score: 9.4
NVD: https://nvd.nist.gov/vuln/detail/CVE-2024-46636
CVE-2026-40976 - Spring Boot's default web security can be ineffective, allowing unauthorized access to all endpoints in certain circumstances.
Product: Spring Spring Boot
CVSS Score: 9.1
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-40976
CVE-2026-32644 - Specific firmware versions of Milesight AIOT cameras use SSL certificates with default private keys.
Product: Milesight AIOT cameras
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-32644
NVD References: https://www.cisa.gov/news-events/ics-advisories/icsa-26-113-03
CVE-2026-7248 - D-Link DI-8100 16.07.26A1 is vulnerable to a remote buffer overflow in the tgfile_htm function of the file tgfile.htm, due to manipulation of the fn argument, with a public exploit available.
Product: D-Link DI-8100
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-7248
CVE-2026-24178 - NVIDIA NVFlare Dashboard is vulnerable to authorization bypass and privilege escalation due to a flaw in the user management system allowing unauthenticated attackers to manipulate user-controlled keys.
Product: NVIDIA NVFlare Dashboard
CVSS Score: 9.8
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-24178
** The following vulnerability needs a manual review **
CVE-2026-41489 - Local privilege escalation via config-controlled path in root-executed service hooks
Product: Pi-hole CVSS Score: 8.8 NVD: N/A ISC Podcast: https://isc.sans.edu/podcastdetail/9908 References:
- https://github.com/pi-hole/pi-hole/security/advisories/GHSA-6w8x-p785-6pm4
- https://www.cybersecurity-help.cz/vdb/SB20260425197
** NO CUSTOMER ACTION REQUIRED FOR THE FOLLOWING VULNERABILITIES **
CVE-2026-24303 - Microsoft Partner Center Elevation of Privilege Vulnerability
Product: Microsoft Partner Center
CVSS Score: 9.6
NO CUSTOMER ACTION REQUIRED
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-24303
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-24303
CVE-2026-32210 - Microsoft Dynamics 365 (online) Spoofing Vulnerability
Product: Microsoft Dynamics 365
CVSS Score: 9.3
NO CUSTOMER ACTION REQUIRED
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-32210
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-32210
CVE-2026-33102 - Microsoft 365 Copilot Elevation of Privilege Vulnerability
Product: M365 Copilot
CVSS Score: 9.3
NO CUSTOMER ACTION REQUIRED
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33102
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33102
CVE-2026-33819 - Microsoft Bing Remote Code Execution Vulnerability
Product: Microsoft Bing
CVSS Score: 10.
NO CUSTOMER ACTION REQUIRED
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-33819
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33819
CVE-2026-35431 - Microsoft Entra ID Entitlement Management Spoofing Vulnerability
Product: Microsoft Entra ID
CVSS Score: 10.0
NO CUSTOMER ACTION REQUIRED
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-35431
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-35431
CVE-2026-21515 - Azure IoT Central Elevation of Privilege Vulnerability
Product: Microsoft Azure IoT Central
CVSS Score: 9.9
NO CUSTOMER ACTION REQUIRED
NVD: https://nvd.nist.gov/vuln/detail/CVE-2026-21515
MSFT Details: https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21515
Spring Cyber Solutions Fest | May 5-7, 2026. Learn from SANS experts and build skills in emerging technologies, cloud security, detection and response, exposure management, and insider threats, malware, and ransomware.
Webinar | Risk-Adaptive DLP Strategy Guide | Monday, May 18 at 3:30PM ET. Learn modern DLP strategies using behavioral context, AI visibility, and adaptive policies to protect data while enabling productivity and reducing risk.
Webinar | 2026 SANS CTI Survey Insights: From Indicators to Insights: How CTI Empowers Both Practitioners and Decision-Maker | Thursday, May 21 at 10:30AM ET.
2026 SANS Survey on Unstructured Data | Take this survey to benchmark your organization, share insights, and influence better tools, strategies, and security for unstructured data risks.