CVE Feed
- CVE-2026-33005 – Apache OpenMeetings: Insufficient checks in FileWebService April 9, 2026
- CVE-2026-33266 – Apache OpenMeetings: Hardcoded Remember-Me Cookie Encryption Key and Salt April 9, 2026
- CVE-2026-34020 – Apache OpenMeetings: Login Credentials Passed via GET Query Parameters April 9, 2026
- CVE-2026-5959 – GL.iNet GL-RM1/GL-RM10/GL-RM10RC/GL-RM1PE Factory Reset improper authentication April 9, 2026
- CVE-2026-5440 – Memory Exhaustion via Unbounded Content-Length April 9, 2026
- CVE-2026-5441 – Out-of-Bounds Read in DicomImageDecoder (PMSCT_RLE1 Decompression) April 9, 2026
- CVE-2026-5442 – Heap Buffer Overflow in DICOM Image Decoder via VR UL Dimensions April 9, 2026
- CVE-2026-5443 – Heap Buffer Overflow in DICOM Image Decoder (Palette Color Decode) April 9, 2026
- CVE-2026-5444 – Heap Buffer Overflow in PAM Image Buffer Allocation April 9, 2026
- CVE-2026-5445 – Out-of-Bounds Read in DicomImageDecoder (DecodeLookupTable) April 9, 2026
- CVE-2026-5438 – Gzip Decompression Bomb via Content-Encoding Header April 9, 2026
- CVE-2026-5439 – Memory Exhaustion via Forged ZIP Metadata April 9, 2026
- CVE-2026-5437 – Out-of-Bounds Read in DicomStreamReader April 9, 2026
- CVE-2026-4116 – SonicWall SMA1000 Unicode Encoding Bypass April 9, 2026
- CVE-2026-4112 – SonicWall SMA1000 SQL Injection Privilege Escalation April 9, 2026
- CVE-2026-4113 – SonicWall SSL VPN User Credentials Enumeration Vulnerability April 9, 2026
- CVE-2026-4114 – SonicWall SMA1000 Remote Authentication Bypass April 9, 2026
- CVE-2026-34757 – LIBPNG has a yse-after-free in png_set_PLTE, png_set_tRNS and png_set_hIST leading to corrupted chunk data and potential heap information disclosure April 9, 2026
- CVE-2026-34578 – OPNsense has an LDAP Injection via Unsanitized Username in Authentication April 9, 2026
Microsoft Security
- Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees April 9, 2026Microsoft Incident Response – Detection and Response Team (DART) researchers observed an emerging, financially motivated threat actor, tracked as Storm-2755, compromising Canadian employee accounts to gain unauthorized access to employee profiles and divert salary payments to attacker-controlled accounts. The post Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees appeared first on Microsoft Security Blog.Microsoft Incident Response
- Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk April 9, 2026A severe Android intent‑redirection vulnerability in a widely deployed SDK exposed sensitive user data across millions of apps. Microsoft researchers detail how the flaw works, why it matters, and how developers can mitigate similar risks by updating affected SDKs. The post Intent redirection vulnerability in third-party SDK exposed millions of Android wallets to potential risk […]Microsoft Defender Security Research Team
- SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks April 7, 2026Executive summary Forest Blizzard, a threat actor linked to the Russian military, has been compromising insecure home and small-office internet equipment like routers, then modifying their settings in ways that turn them into part of the actor’s malicious infrastructure. The post SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks appeared first on Microsoft […]Microsoft Threat Intelligence
- Inside an AI‑enabled device code phishing campaign April 6, 2026A new wave of device code phishing shows how threat actors are scaling account compromise using AI and end‑to‑end automation. This campaign goes beyond traditional phishing by generating live authentication codes on demand, enabling higher success rates and sustained post‑compromise access. The post Inside an AI‑enabled device code phishing campaign appeared first on Microsoft Security […]Microsoft Defender Security Research Team
- Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations April 6, 2026The financially motivated cybercriminal threat actor Storm-1175 operates high-velocity ransomware campaigns that weaponize recently disclosed vulnerabilities to obtain initial access, exfiltrate data, and deploy Medusa ransomware. The post Storm-1175 focuses gaze on vulnerable web-facing assets in high-tempo Medusa ransomware operations appeared first on Microsoft Security Blog.Microsoft Threat Intelligence



