LIVE THREAT FEED

Threat Intelligence

CISA Known Exploited Vulnerabilities + real-time security news. Updated every 30 minutes.

Last refreshed: May 5, 2026, 12:49 a.m. PT

CISA KEVKnown Exploited Vulnerabilities
cisa.gov ↗
CVE-2026-31431
Added May 1, 2026

Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability

LinuxKernel

Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.

Required Action: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 15, 2026
CVE-2026-41940
Added Apr 30, 2026

WebPros cPanel & WHM and WP2 (WordPress Squared) Missing Authentication for Critical Function Vulnerability

WebProscPanel & WHM and WP2 (WordPress Squared)

WebPros cPanel & WHM (WebHost Manager) and WP2 (WordPress Squared) contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 3, 2026
CVE-2024-1708
Added Apr 28, 2026

ConnectWise ScreenConnect Path Traversal Vulnerability

ConnectWiseScreenConnect

ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 12, 2026
CVE-2026-32202
Added Apr 28, 2026

Microsoft Windows Protection Mechanism Failure Vulnerability

MicrosoftWindows

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 12, 2026
CVE-2025-29635
Added Apr 24, 2026

D-Link DIR-823X Command Injection Vulnerability

D-LinkDIR-823X

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 8, 2026
CVE-2024-7399
Added Apr 24, 2026

Samsung MagicINFO 9 Server Path Traversal Vulnerability

SamsungMagicINFO 9 Server

Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 8, 2026
CVE-2024-57728
Added Apr 24, 2026

SimpleHelp Path Traversal Vulnerability

SimpleHelp SimpleHelp

SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 8, 2026
CVE-2024-57726
Added Apr 24, 2026

SimpleHelp Missing Authorization Vulnerability

SimpleHelp SimpleHelp

SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 8, 2026
CVE-2026-39987
Added Apr 23, 2026

Marimo Remote Code Execution Vulnerability

MarimoMarimo

Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 7, 2026
CVE-2026-33825
Added Apr 22, 2026

Microsoft Defender Insufficient Granularity of Access Control Vulnerability

MicrosoftDefender

Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 6, 2026
CVE-2026-20122
Added Apr 20, 2026

Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability

CiscoCatalyst SD-WAN Manger

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.

Required Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
Remediation due: Apr 23, 2026
CVE-2026-20133
Added Apr 20, 2026

Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability

CiscoCatalyst SD-WAN Manager

Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems.

Required Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
Remediation due: Apr 23, 2026
CVE-2025-2749
Added Apr 20, 2026

Kentico Xperience Path Traversal Vulnerability

KenticoKentico Xperience

Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 4, 2026
CVE-2023-27351
🔴 RansomwareAdded Apr 20, 2026

PaperCut NG/MF Improper Authentication Vulnerability

PaperCutNG/MF

PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 4, 2026
CVE-2025-48700
Added Apr 20, 2026

Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability

SynacorZimbra Collaboration Suite (ZCS)

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 23, 2026
CVE-2026-20128
Added Apr 20, 2026

Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability

CiscoCatalyst SD-WAN Manager

Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user.

Required Action: Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt & Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.
Remediation due: Apr 23, 2026
CVE-2025-32975
Added Apr 20, 2026

Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability

QuestKACE Systems Management Appliance (SMA)

Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 4, 2026
CVE-2024-27199
🔴 RansomwareAdded Apr 20, 2026

JetBrains TeamCity Relative Path Traversal Vulnerability

JetBrainsTeamCity

JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: May 4, 2026
CVE-2026-34197
Added Apr 16, 2026

Apache ActiveMQ Improper Input Validation Vulnerability

ApacheActiveMQ

Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 30, 2026
CVE-2009-0238
Added Apr 14, 2026

Microsoft Office Remote Code Execution

MicrosoftOffice

Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 28, 2026
CVE-2026-32201
Added Apr 14, 2026

Microsoft SharePoint Server Improper Input Validation Vulnerability

MicrosoftSharePoint Server

Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 28, 2026
CVE-2012-1854
Added Apr 13, 2026

Microsoft Visual Basic for Applications Insecure Library Loading Vulnerability

MicrosoftVisual Basic for Applications (VBA)

Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 27, 2026
CVE-2025-60710
Added Apr 13, 2026

Microsoft Windows Link Following Vulnerability

MicrosoftWindows

Microsoft Windows contains a link following vulnerability that allows for privilege escalation

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 27, 2026
CVE-2023-21529
🔴 RansomwareAdded Apr 13, 2026

Microsoft Exchange Server Deserialization of Untrusted Data Vulnerability

MicrosoftExchange Server

Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 27, 2026
CVE-2023-36424
Added Apr 13, 2026

Microsoft Windows Out-of-Bounds Read Vulnerability

MicrosoftWindows

Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 27, 2026
CVE-2020-9715
Added Apr 13, 2026

Adobe Acrobat Use-After-Free Vulnerability

AdobeAcrobat

Adobe Acrobat contains a use-after-free vulnerability that allows for code execution

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 27, 2026
CVE-2026-21643
Added Apr 13, 2026

Fortinet FortiClient EMS SQL Injection Vulnerability

FortinetFortiClient EMS

Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 16, 2026
CVE-2026-34621
Added Apr 13, 2026

Adobe Acrobat and Reader Prototype Pollution Vulnerability

AdobeAcrobat and Reader

Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 27, 2026
CVE-2026-1340
Added Apr 8, 2026

Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability

IvantiEndpoint Manager Mobile (EPMM)

Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 11, 2026
CVE-2026-35616
Added Apr 6, 2026

Fortinet FortiClient EMS Improper Access Control Vulnerability

FortinetFortiClient EMS

Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 9, 2026
CVE-2026-3502
Added Apr 2, 2026

TrueConf Client Download of Code Without Integrity Check Vulnerability

TrueConfClient

TrueConf Client contains a download of code without integrity check vulnerability. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 16, 2026
CVE-2026-5281
Added Apr 1, 2026

Google Dawn Use-After-Free Vulnerability

GoogleDawn

Google Dawn contains an use-after-free vulnerability that could allow a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. This vulnerability could affect multiple Chromium-based products including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 15, 2026
CVE-2026-3055
Added Mar 30, 2026

Citrix NetScaler Out-of-Bounds Read Vulnerability

CitrixNetScaler

Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 2, 2026
CVE-2025-53521
Added Mar 27, 2026

F5 BIG-IP Stack-Based Buffer Overflow Vulnerability

F5BIG-IP

F5 BIG-IP APM contains a stack-based buffer overflow vulnerability that could allow a threat actor to achieve remote code execution.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 30, 2026
CVE-2026-33634
Added Mar 26, 2026

Aquasecurity Trivy Embedded Malicious Code Vulnerability

AquasecurityTrivy

Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 9, 2026
CVE-2026-33017
Added Mar 25, 2026

Langflow Code Injection Vulnerability

LangflowLangflow

Langflow contains a code injection vulnerability that could allow building public flows without requiring authentication.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 8, 2026
CVE-2025-32432
Added Mar 20, 2026

Craft CMS Code Injection Vulnerability

Craft CMSCraft CMS

Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 3, 2026
CVE-2025-54068
Added Mar 20, 2026

Laravel Livewire Code Injection Vulnerability

LaravelLivewire

Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 3, 2026
CVE-2025-43510
Added Mar 20, 2026

Apple Multiple Products Improper Locking Vulnerability

AppleMultiple Products

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 3, 2026
CVE-2025-43520
Added Mar 20, 2026

Apple Multiple Products Classic Buffer Overflow Vulnerability

AppleMultiple Products

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 3, 2026
CVE-2025-31277
Added Mar 20, 2026

Apple Multiple Products Buffer Overflow Vulnerability

AppleMultiple Products

Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 3, 2026
CVE-2026-20131
🔴 RansomwareAdded Mar 19, 2026

Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability

CiscoSecure Firewall Management Center (FMC)

Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 22, 2026
CVE-2025-66376
Added Mar 18, 2026

Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting Vulnerability

SynacorZimbra Collaboration Suite (ZCS)

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Apr 1, 2026
CVE-2026-20963
Added Mar 18, 2026

Microsoft SharePoint Deserialization of Untrusted Data Vulnerability

MicrosoftSharePoint

Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 21, 2026
CVE-2025-47813
Added Mar 16, 2026

Wing FTP Server Information Disclosure Vulnerability

Wing FTP ServerWing FTP Server

Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 30, 2026
CVE-2026-3910
Added Mar 13, 2026

Google Chromium V8 Improper Restriction of Operations Within the Bounds of a Memory Buffer Vulnerability

GoogleChromium V8

Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 27, 2026
CVE-2026-3909
Added Mar 13, 2026

Google Skia Out-of-Bounds Write Vulnerability

GoogleSkia

Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 27, 2026
CVE-2025-68613
Added Mar 11, 2026

n8n Improper Control of Dynamically-Managed Code Resources Vulnerability

n8nn8n

n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 25, 2026
CVE-2021-22054
Added Mar 9, 2026

Omnissa Workspace ONE Server-Side Request Forgery

OmnissaWorkspace One UEM

Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 23, 2026
CVE-2025-26399
Added Mar 9, 2026

SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

SolarWindsWeb Help Desk

SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine.

Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Remediation due: Mar 12, 2026
LIVEVulnerability News
SANS ISCMay 5, 2026

ISC Stormcast For Tuesday, May 5th, 2026 https://isc.sans.edu/podcastdetail/9918, (Tue, May 5th)

BleepingComputerMay 4, 2026

Weaver E-cology critical bug exploited in attacks since March

Hackers have been exploiting a critical vulnerability (CVE-2026-22679) in the Weaver E-cology office automation since mid-March to run discovery commands. [...]…

BleepingComputerMay 4, 2026

Amazon SES increasingly abused in phishing to evade detection

The Amazon Simple Email Service (SES) is being increasingly abused to send convincing phishing emails that can bypass standard security filters and render reputation-based blocks ineffective. [...]…

The Hacker NewsMay 4, 2026

Phishing Campaign Hits 80+ Orgs Using SimpleHelp and ScreenConnect RMM Tools

An active phishing campaign has been observed targeting multiple vectors since at least April 2025 with legitimate Remote Monitoring and Management (RMM) software as a way to establish persistent remote access to comprom…

BleepingComputerMay 4, 2026

Backdoored PyTorch Lightning package drops credential stealer

A malicious version of the PyTorch Lightning package published on the Python Package Index (PyPI) delivers a credential-stealing payload targeting browsers, environment files, and cloud services. [...]…

SANS ISCMay 4, 2026

TeamPCP Weekly Analysis: 2026-W18 (2026-04-27 through 2026-05-03), (Mon, May 4th)

Summary
…

The Hacker NewsMay 4, 2026

Progress Patches Critical MOVEit Automation Bug Enabling Authentication Bypass

Progress Software has released updates to address two security flaws in MOVEit Automation, including a critical bug that could result in an authentication bypass. MOVEit Automation (formerly Central) is a secure, server-…

BleepingComputerMay 4, 2026

Trellix discloses data breach after source code repository hack

Cybersecurity firm Trellix disclosed a data breach after attackers gained access to "a portion" of its source code repository. [...]…

SANS ISCMay 4, 2026

DShield Honeypot Update, (Mon, May 4th)

This week, I will release a few updates to our DShield honeypot. The update should happen automatically if you have "automatic updates" enabled on your system. There will be two major changes:
…

The Hacker NewsMay 4, 2026

⚡ Weekly Recap: AI-Powered Phishing, Android Spying Tool, Linux Exploit, GitHub RCE More

This week, the shadows moved faster than the patches. While most teams were still triaging last month’s alerts, attackers had already turned control panels into kill switches, kernels into open doors, and open-source pip…

BleepingComputerMay 4, 2026

They don’t hack, they borrow: How fraudsters target credit unions

Fraudsters aren't hacking credit unions, they are exploiting normal business processes. Flare reveals how structured loan fraud methods use stolen identities to pass verification and secure funds. [...]…

BleepingComputerMay 4, 2026

Progress warns of critical MOVEit Automation auth bypass flaw

Progress Software warned customers to patch a critical authentication bypass vulnerability in its MOVEit Automation enterprise-grade managed file transfer (MFT) application. [...]…

BleepingComputerMay 4, 2026

Webinar: Why MSPs must rethink security and backup strategies

Security breaches don't just test your defenses—they test your recovery. Join Kaseya in our upcoming webinar to learn how MSPs strengthen resilience with SaaS backups and BCDR to stay operational after attacks. [...]…

The Hacker NewsMay 4, 2026

2026: The Year of AI-Assisted Attacks

On December 4, 2025, a 17-year-old was arrested in Osaka under Japan’s Unauthorized Access Prohibition Act. The young man had run malicious code to extract the personal data of over 7 million users of Kaikatsu Club, Japa…

The Hacker NewsMay 4, 2026

Silver Fox Deploys ABCDoor Malware via Tax-Themed Phishing in India and Russia

The China-based cybercrime group known as Silver Fox has been linked to a new campaign targeting organizations in Russia and India with a new malware called ABCDoor. The activity involved using phishing emails that mimic…

BleepingComputerMay 4, 2026

CISA says ‘Copy Fail’ flaw now exploited to root Linux systems

CISA has warned that threat actors have started exploiting the "Copy Fail" Linux security vulnerability in the wild, one day after Theori researchers disclosed it and shared a proof-of-concept (PoC) exploit. [...]…

The Hacker NewsMay 4, 2026

Critical cPanel Vulnerability Weaponized to Target Government and MSP Networks

A previously unknown threat actor has been observed targeting government and military entities in Southeast Asia, alongside a smaller cluster of managed service providers (MSPs) and hosting providers in the Philippines, …

The Hacker NewsMay 4, 2026

Global Crackdown Arrests 276, Shuts 9 Crypto Scam Centers, Seizes $701M

A coordinated international operation involving U.S. and Chinese authorities has arrested at least 276 suspects and shut down nine scam centers used for cryptocurrency investment fraud schemes targeting Americans, result…

SANS ISCMay 4, 2026

ISC Stormcast For Monday, May 4th, 2026 https://isc.sans.edu/podcastdetail/9916, (Mon, May 4th)

SANS ISCMay 3, 2026

Wireshark 4.6.5 Released, (Sun, May 3rd)

Wireshark release 4.6.5 fixes 43 vulnerabilities (38 CVEs) and 35 bugs.
…

The Hacker NewsMay 3, 2026

CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed security flaw impacting various Linux distributions to its Known Exploited Vulnerabilities (KEV) catalog, citing evide…

SANS ISCMay 1, 2026

Malicious Ad for Homebrew Leads to MacSync Stealer, (Fri, May 1st)

Introduction
…

Krebs on SecurityApr 30, 2026

Anti-DDoS Firm Heaped Attacks on Brazilian ISPs

A Brazilian tech firm that specializes in protecting networks from distributed denial-of-service (DDoS) attacks has been enabling a botnet responsible for an extended campaign of massive DDoS attacks against other networ…

Krebs on SecurityApr 21, 2026

‘Scattered Spider’ Member ‘Tylerb’ Pleads Guilty

A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series o…

Krebs on SecurityApr 14, 2026

Patch Tuesday, April 2026 Edition

Microsoft today pushed software updates to fix a staggering 167 security vulnerabilities in its Windows operating systems and related software, including a SharePoint Server zero-day and a publicly disclosed weakness in …

Krebs on SecurityApr 7, 2026

Russia Hacked Routers to Steal Microsoft Office Tokens

Hackers linked to Russia's military intelligence units are using known flaws in older Internet routers to mass harvest authentication tokens from Microsoft Office users, security experts warned today. The spying campaign…

Krebs on SecurityApr 6, 2026

Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab

An elusive hacker who went by the handle "UNKN" and ran the early Russian ransomware groups GandCrab and REvil now has a name and a face. Authorities in Germany say 31-year-old Russian Daniil Maksimovich Shchukin headed …

Krebs on SecurityMar 23, 2026

‘CanisterWorm’ Springs Wiper Attack Targeting Iran

A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Ir…