theinfosecnews
CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634CISA KEVCVE-2026-3502CVE-2026-5281CVE-2026-3055CVE-2025-53521CVE-2026-33634
Allvulnerability71malware15policy14breach6apt4ransomware1

vulnerability

Clear filter
Vvulnerability

CVE-2025-XXXX: Code Injection Vulnerability Exploited Within Hours of Disclosure

A critical code injection vulnerability was actively exploited within hours of public disclosure, giving organizations almost no remediation window before attacks began. The flaw enables remote code execution and affects internet-facing deployments of the targeted product. Organizations should apply vendor patches immediately, isolate unpatched systems, and treat any exposed instance as potentially compromised.

Dark Reading·7d ago·3 min read
Vvulnerability

CVE-2026-33634: Aqua Security Trivy Contains Embedded Malicious Code Targeting CI/CD Secrets

CVE-2026-33634 is an embedded malicious code vulnerability in Aqua Security's Trivy scanner that exfiltrates CI/CD secrets—including cloud credentials, SSH keys, API tokens, and database passwords—from any pipeline where affected versions execute. The flaw operates with the permissions Trivy already holds during normal pipeline execution, requiring no privilege escalation. CISA has added this to the Known Exploited Vulnerabilities catalog with a federal remediation deadline of April 9, 2026.

CISA KEV·8d ago·4 min read
Vvulnerability

CVE-2026-33017: Unauthenticated Code Injection in Langflow Exposes AI Pipeline Infrastructure

CVE-2026-33017 is an unauthenticated code injection vulnerability in Langflow that allows a remote attacker to execute arbitrary code through the public flow-building interface without credentials. Successful exploitation can result in credential theft, data exfiltration, and lateral movement into connected infrastructure. CISA has added the vulnerability to its Known Exploited Vulnerabilities catalog with a federal agency patch deadline of April 8, 2026.

CISA KEV·9d ago·3 min read
Vvulnerability

CVE-2025-43520: Apple Multi-Platform Kernel Buffer Overflow Allows Memory Corruption Across Six Operating Systems

CVE-2025-43520 is a classic buffer overflow vulnerability affecting Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS that allows a malicious application to write to kernel memory or crash the system. Exploitation requires local code execution via a malicious app and cannot be triggered remotely without a separate delivery vector. CISA has added this flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of April 3, 2026; all organizations should apply Apple's latest OS updates immediately.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2025-32432: Unauthenticated Remote Code Execution in Craft CMS Demands Immediate Patching

CVE-2025-32432 is an unauthenticated remote code execution vulnerability in Craft CMS that allows attackers to execute arbitrary code on affected servers without any credentials. CISA has added it to the Known Exploited Vulnerabilities catalog with a federal remediation deadline of April 3, 2026. Organizations should update Craft CMS to the patched version immediately and apply WAF rules and network isolation if patching cannot be completed at once.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2025-43510: Apple Improper Locking Flaw Exposes Shared Memory Across Six Platforms

CVE-2025-43510 is an improper locking vulnerability in Apple's shared memory subsystem affecting iOS, iPadOS, macOS, watchOS, tvOS, and visionOS. A malicious local application can exploit the flaw to corrupt inter-process shared memory, enabling privilege escalation or system service disruption. CISA has added the vulnerability to its KEV catalog with a mandatory federal patch deadline of April 3, 2026.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2025-54068: Unauthenticated Code Injection in Laravel Livewire Enables Remote Command Execution

CVE-2025-54068 is an unauthenticated code injection vulnerability in Laravel Livewire that allows remote attackers to execute arbitrary code on affected servers under specific application configurations. No credentials are required to exploit the flaw, and successful attacks can result in full server compromise, credential theft, and persistent access. CISA has added the vulnerability to its Known Exploited Vulnerabilities catalog with a federal remediation deadline of April 3, 2026.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2025-31277: Buffer Overflow in Apple Safari and OS Platforms Enables Remote Code Execution via Malicious Web Content

CVE-2025-31277 is a buffer overflow vulnerability in Apple Safari and across iOS, iPadOS, macOS, watchOS, visionOS, and tvOS that allows an attacker to corrupt memory and achieve remote code execution when a user processes maliciously crafted web content. No authentication or user interaction beyond visiting a malicious URL is required. CISA has added the flaw to its Known Exploited Vulnerabilities catalog with a federal patch deadline of April 3, 2026; all organizations should apply Apple security updates immediately.

CISA KEV·14d ago·3 min read
Vvulnerability

CVE-2026-20131: Unauthenticated RCE via Java Deserialization in Cisco FMC and Security Cloud Control

CVE-2026-20131 is an unauthenticated remote code execution vulnerability in Cisco Secure Firewall Management Center (FMC) and Security Cloud Control (SCC) caused by unsafe deserialization of Java objects in the web management interface. Successful exploitation grants root-level access to the management appliance and full control over all managed firewalls. CISA has mandated federal agency patching by March 22, 2026; organizations should immediately isolate management interfaces and monitor for patches.

CISA KEV·15d ago·4 min read
Vvulnerability

CVE-2026-20963: Microsoft SharePoint Remote Code Execution via Unsafe Deserialization Demands Immediate Patching

CVE-2026-20963 is a deserialization of untrusted data vulnerability in Microsoft SharePoint that allows unauthenticated remote attackers to execute arbitrary code in the context of the SharePoint service account. Successful exploitation can lead to lateral movement, credential theft, and persistent access across connected Microsoft environments. CISA mandates federal agency patching by March 21, 2026, and all organizations should treat this as a critical priority remediation.

CISA KEV·16d ago·3 min read