SignalSec: Vulns & Hacks

Known Exploited Vulnerabilities and latest CVEs

Exploited in wild

CVE-2026-42208

CRITICAL (9.8)
Vendor: BerriAIProduct: LiteLLM5/8/2026

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example POST /chat/completions) and reach this query through the proxy's error-handling path. An attacker could read data from the proxy's database and may be able to modify it, leading to unauthorised access to the proxy and the credentials it manages. This issue has been patched in version 1.83.7.

CISA KEV Alert: Added on 5/8/2026. Action due: 5/11/2026.

Exploited in wild

CVE-2026-6973

HIGH (7.2)
Vendor: IvantiProduct: Endpoint Manager Mobile (EPMM)5/7/2026

An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution.

CISA KEV Alert: Added on 5/7/2026. Action due: 5/10/2026.

Exploited in wild

CVE-2026-0300

CRITICAL (9.8)
Vendor: Palo Alto NetworksProduct: PAN-OS5/6/2026

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

CISA KEV Alert: Added on 5/6/2026. Action due: 5/9/2026.

AI/MLCloud Security
View CISA Alert
Exploited in wild

CVE-2026-41940

CRITICAL (9.8)
Vendor: WebProsProduct: cPanel & WHM and WP2 (WordPress Squared)4/30/2026

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

CISA KEV Alert: Added on 4/30/2026. Action due: 5/3/2026.

Exploited in wild

CVE-2026-32202

MEDIUM (4.3)
Vendor: MicrosoftProduct: Windows4/28/2026

Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.

CISA KEV Alert: Added on 4/28/2026. Action due: 5/12/2026.

AI/MLPhishingMicrosoft
View CISA Alert
Exploited in wild

CVE-2024-1708

HIGH (8.4)
Vendor: ConnectWiseProduct: ScreenConnect4/28/2026

ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.

CISA KEV Alert: Added on 4/28/2026. Action due: 5/12/2026.

Exploited in wild

CVE-2024-57726

CRITICAL (9.9)
Vendor: SimpleHelp Product: SimpleHelp4/24/2026

SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.

CISA KEV Alert: Added on 4/24/2026. Action due: 5/8/2026.

Exploited in wild

CVE-2024-7399

HIGH (8.8)
Vendor: SamsungProduct: MagicINFO 9 Server4/24/2026

Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.

CISA KEV Alert: Added on 4/24/2026. Action due: 5/8/2026.

Exploited in wild

CVE-2025-29635

HIGH (7.2)
Vendor: D-LinkProduct: DIR-823X4/24/2026

D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

CISA KEV Alert: Added on 4/24/2026. Action due: 5/8/2026.

AI/MLRansomware
View CISA Alert
Exploited in wild

CVE-2024-57728

HIGH (7.2)
Vendor: SimpleHelp Product: SimpleHelp4/24/2026

SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.

CISA KEV Alert: Added on 4/24/2026. Action due: 5/8/2026.

Exploited in wild

CVE-2026-31431

HIGH (7.8)
4/22/2026

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

CISA KEV Alert: Added on 5/1/2026. Action due: 5/15/2026.

Exploited in wild

CVE-2026-33825

HIGH (7.8)
Vendor: MicrosoftProduct: Defender4/22/2026

Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.

CISA KEV Alert: Added on 4/22/2026. Action due: 5/6/2026.

AI/MLMicrosoft
View CISA Alert
Exploited in wild

CVE-2024-27199

HIGH (7.3)
Vendor: JetBrainsProduct: TeamCity4/20/2026

JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.

CISA KEV Alert: Added on 4/20/2026. Action due: 5/4/2026.

Exploited in wild

CVE-2025-2749

HIGH (7.2)
Vendor: KenticoProduct: Kentico Xperience4/20/2026

Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations.

CISA KEV Alert: Added on 4/20/2026. Action due: 5/4/2026.

Exploited in wild

CVE-2026-20122

MEDIUM (5.4)
Vendor: CiscoProduct: Catalyst SD-WAN Manger4/20/2026

Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.

CISA KEV Alert: Added on 4/20/2026. Action due: 4/23/2026.

Exploited in wild

CVE-2026-20133

MEDIUM (6.5)
Vendor: CiscoProduct: Catalyst SD-WAN Manager4/20/2026

Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems.

CISA KEV Alert: Added on 4/20/2026. Action due: 4/23/2026.

Exploited in wild

CVE-2025-32975

CRITICAL (10)
Vendor: QuestProduct: KACE Systems Management Appliance (SMA)4/20/2026

Quest KACE Systems Management Appliance (SMA) contains an improper authentication vulnerability that could allow attackers to impersonate legitimate users without valid credentials.

CISA KEV Alert: Added on 4/20/2026. Action due: 5/4/2026.

Exploited in wild

CVE-2023-27351

HIGH (7.5)
Vendor: PaperCutProduct: NG/MF4/20/2026

PaperCut NG/MF contains an improper authentication vulnerability that could allow remote attackers to bypass authentication on affected installations via the SecurityRequestFilter class.

CISA KEV Alert: Added on 4/20/2026. Action due: 5/4/2026.

Exploited in wild

CVE-2025-48700

MEDIUM (6.1)
Vendor: SynacorProduct: Zimbra Collaboration Suite (ZCS)4/20/2026

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability that could allow attackers to execute arbitrary JavaScript within the user's session, potentially leading to unauthorized access to sensitive information.

CISA KEV Alert: Added on 4/20/2026. Action due: 4/23/2026.

Exploited in wild

CVE-2026-20128

HIGH (7.5)
Vendor: CiscoProduct: Catalyst SD-WAN Manager4/20/2026

Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user.

CISA KEV Alert: Added on 4/20/2026. Action due: 4/23/2026.

Exploited in wild

CVE-2026-32201

MEDIUM (6.5)
Vendor: MicrosoftProduct: SharePoint Server4/14/2026

Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.

CISA KEV Alert: Added on 4/14/2026. Action due: 4/28/2026.

AI/MLPhishingMicrosoft
View CISA Alert
Exploited in wild

CVE-2009-0238

CRITICAL (9.3)
Vendor: MicrosoftProduct: Office4/14/2026

Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.

CISA KEV Alert: Added on 4/14/2026. Action due: 4/28/2026.

AI/MLMicrosoft
View CISA Alert
Exploited in wild

CVE-2012-1854

MEDIUM (6.9)
Vendor: MicrosoftProduct: Visual Basic for Applications (VBA)4/13/2026

Microsoft Visual Basic for Applications (VBA) contains an insecure library loading vulnerability that could allow for remote code execution.

CISA KEV Alert: Added on 4/13/2026. Action due: 4/27/2026.

AI/MLMicrosoft
View CISA Alert
Exploited in wild

CVE-2025-60710

HIGH (7.8)
Vendor: MicrosoftProduct: Windows4/13/2026

Microsoft Windows contains a link following vulnerability that allows for privilege escalation

CISA KEV Alert: Added on 4/13/2026. Action due: 4/27/2026.

AI/MLMicrosoft
View CISA Alert
Exploited in wild

CVE-2023-21529

HIGH (8.8)
Vendor: MicrosoftProduct: Exchange Server4/13/2026

Microsoft Exchange Server contains a deserialization of untrusted data that allows an authenticated attacker to achieve remote code execution.

CISA KEV Alert: Added on 4/13/2026. Action due: 4/27/2026.

AI/MLMicrosoft
View CISA Alert
Exploited in wild

CVE-2026-34621

HIGH (8.6)
Vendor: AdobeProduct: Acrobat and Reader4/13/2026

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

CISA KEV Alert: Added on 4/13/2026. Action due: 4/27/2026.

Exploited in wild

CVE-2026-21643

CRITICAL (9.8)
Vendor: FortinetProduct: FortiClient EMS4/13/2026

Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.

CISA KEV Alert: Added on 4/13/2026. Action due: 4/16/2026.

Exploited in wild

CVE-2023-36424

HIGH (7.8)
Vendor: MicrosoftProduct: Windows4/13/2026

Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation

CISA KEV Alert: Added on 4/13/2026. Action due: 4/27/2026.

AI/MLMicrosoft
View CISA Alert
Exploited in wild

CVE-2020-9715

HIGH (7.8)
Vendor: AdobeProduct: Acrobat4/13/2026

Adobe Acrobat contains a use-after-free vulnerability that allows for code execution

CISA KEV Alert: Added on 4/13/2026. Action due: 4/27/2026.

Exploited in wild

CVE-2026-39987

CRITICAL (9.8)
4/9/2026

marimo is a reactive Python notebook. Prior to 0.23.0, Marimo has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint /terminal/ws lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., /ws) that correctly call validate_auth() for authentication, the /terminal/ws endpoint only checks the running mode and platform support before accepting connections, completely skipping authentication verification. This vulnerability is fixed in 0.23.0.

CISA KEV Alert: Added on 4/23/2026. Action due: 5/7/2026.

Exploited in wild

CVE-2026-1340

CRITICAL (9.8)
Vendor: IvantiProduct: Endpoint Manager Mobile (EPMM)4/8/2026

Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution.

CISA KEV Alert: Added on 4/8/2026. Action due: 4/11/2026.

Exploited in wild

CVE-2026-34197

HIGH (8.8)
4/7/2026

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

CISA KEV Alert: Added on 4/16/2026. Action due: 4/30/2026.

Exploited in wild

CVE-2026-35616

CRITICAL (9.8)
Vendor: FortinetProduct: FortiClient EMS4/6/2026

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

CISA KEV Alert: Added on 4/6/2026. Action due: 4/9/2026.

Exploited in wild

CVE-2026-5281

HIGH (8.8)
Vendor: GoogleProduct: Dawn4/1/2026

Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

CISA KEV Alert: Added on 4/1/2026. Action due: 4/15/2026.

Data Breach
View CISA Alert
Exploited in wild

CVE-2026-3502

HIGH (7.8)
3/30/2026

TrueConf Client downloads application update code and applies it without performing verification. An attacker who is able to influence the update delivery path can substitute a tampered update payload. If the payload is executed or installed by the updater, this may result in arbitrary code execution in the context of the updating process or user.

CISA KEV Alert: Added on 4/2/2026. Action due: 4/16/2026.

Exploited in wild

CVE-2025-53521

CRITICAL (9.8)
Vendor: F5Product: BIG-IP3/27/2026

F5 BIG-IP AMP contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution.

CISA KEV Alert: Added on 3/27/2026. Action due: 3/30/2026.

Exploited in wild

CVE-2026-33634

HIGH (8.8)
Vendor: AquasecurityProduct: Trivy3/26/2026

Aquasecurity Trivy contains an embedded malicious code vulnerability that could allow an attacker to gain access to everything in the CI/CD environment, including all tokens, SSH keys, cloud credentials, database passwords, and any sensitive configuration in memory.

CISA KEV Alert: Added on 3/26/2026. Action due: 4/9/2026.

AI/MLCloud Security
View CISA Alert
Exploited in wild

CVE-2026-3055

CRITICAL (9.8)
3/23/2026

Insufficient input validation in NetScaler ADC and NetScaler Gateway when configured as a SAML IDP leading to memory overread

CISA KEV Alert: Added on 3/30/2026. Action due: 4/2/2026.

Exploited in wild

CVE-2026-33017

CRITICAL (9.8)
3/20/2026

Langflow is a tool for building and deploying AI-powered agents and workflows. In versions prior to 1.9.0, the POST /api/v1/build_public_tmp/{flow_id}/flow endpoint allows building public flows without requiring authentication. When the optional data parameter is supplied, the endpoint uses attacker-controlled flow data (containing arbitrary Python code in node definitions) instead of the stored flow data from the database. This code is passed to exec() with zero sandboxing, resulting in unauthenticated remote code execution. This is distinct from CVE-2025-3248, which fixed /api/v1/validate/code by adding authentication. The build_public_tmp endpoint is designed to be unauthenticated (for public flows) but incorrectly accepts attacker-supplied flow data containing arbitrary executable code. This issue has been fixed in version 1.9.0.

CISA KEV Alert: Added on 3/25/2026. Action due: 4/8/2026.

Exploited in wild

CVE-2025-54068

CRITICAL (9.8)
Vendor: LaravelProduct: Livewire3/20/2026

Laravel Livewire contain a code injection vulnerability that could allow unauthenticated attackers to achieve remote command execution in specific scenarios.

CISA KEV Alert: Added on 3/20/2026. Action due: 4/3/2026.

Exploited in wild

CVE-2025-43510

HIGH (7.8)
Vendor: AppleProduct: Multiple Products3/20/2026

Apple watchOS, iOS, iPadOS, macOS, visionOS, and tvOS contain an improper locking vulnerability that could allow a malicious application to cause unexpected changes in memory shared between processes.

CISA KEV Alert: Added on 3/20/2026. Action due: 4/3/2026.

Exploited in wild

CVE-2025-43520

HIGH (7.1)
Vendor: AppleProduct: Multiple Products3/20/2026

Apple watchOS, iOS, iPadOS, macOS, visionOS, tvOS, and iPadOS contain a classic buffer overflow vulnerability which could allow a malicious application to cause unexpected system termination or write kernel memory.

CISA KEV Alert: Added on 3/20/2026. Action due: 4/3/2026.

AI/MLAppleLinux
View CISA Alert
Exploited in wild

CVE-2025-32432

CRITICAL (10)
Vendor: Craft CMSProduct: Craft CMS3/20/2026

Craft CMS contains a code injection vulnerability that allows a remote attacker to execute arbitrary code.

CISA KEV Alert: Added on 3/20/2026. Action due: 4/3/2026.

Exploited in wild

CVE-2025-31277

HIGH (8.8)
Vendor: AppleProduct: Multiple Products3/20/2026

Apple Safari, iOS, watchOS, visionOS, iPadOS, macOS, and tvOS contain a buffer overflow vulnerability that could allow the processing of maliciously crafted web content which may lead to memory corruption.

CISA KEV Alert: Added on 3/20/2026. Action due: 4/3/2026.

Exploited in wild

CVE-2026-20131

CRITICAL (10)
Vendor: CiscoProduct: Secure Firewall Management Center (FMC)3/19/2026

Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device.

CISA KEV Alert: Added on 3/19/2026. Action due: 3/22/2026.

AI/MLCloud Security
View CISA Alert
Exploited in wild

CVE-2026-20963

HIGH (8.8)
Vendor: MicrosoftProduct: SharePoint3/18/2026

Microsoft SharePoint contains a deserialization of untrusted data vulnerability that allows an unauthorized attacker to execute code over a network.

CISA KEV Alert: Added on 3/18/2026. Action due: 3/21/2026.

AI/MLMicrosoft
View CISA Alert
Exploited in wild

CVE-2025-66376

HIGH (7.2)
Vendor: SynacorProduct: Zimbra Collaboration Suite (ZCS)3/18/2026

Synacor Zimbra Collaboration Suite (ZCS) contains a cross-site scripting vulnerability in the Classic UI where attackers could abuse Cascading Style Sheets (CSS) @import directives in email HTML.

CISA KEV Alert: Added on 3/18/2026. Action due: 4/1/2026.

Exploited in wild

CVE-2025-47813

MEDIUM (4.3)
Vendor: Wing FTP ServerProduct: Wing FTP Server3/16/2026

Wing FTP Server contains a generation of error message containing sensitive information vulnerability when using a long value in the UID cookie.

CISA KEV Alert: Added on 3/16/2026. Action due: 3/30/2026.

Exploited in wild

CVE-2026-3909

HIGH (8.8)
Vendor: GoogleProduct: Skia3/13/2026

Google Skia contains an out-of-bounds write vulnerability that could allow a remote attacker to perform out of bounds memory access via a crafted HTML page. This vulnerability affects Google Chrome and ChromeOS, Android, Flutter, and possibly other products.

CISA KEV Alert: Added on 3/13/2026. Action due: 3/27/2026.

Exploited in wild

CVE-2026-3910

HIGH (8.8)
Vendor: GoogleProduct: Chromium V83/13/2026

Google Chromium V8 contains an improper restriction of operations within the bounds of a memory buffer vulnerability that could allow a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. This vulnerability could affect multiple web browsers that utilize Chromium, including, but not limited to, Google Chrome, Microsoft Edge, and Opera.

CISA KEV Alert: Added on 3/13/2026. Action due: 3/27/2026.

AI/MLMicrosoft
View CISA Alert