// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 17 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 2
HIGH (page) 2
MEDIUM (page) 1
LOW (page) 0
MEDIUM 95% confidence cve

ZDI-26-045: Cisco Snort OOB Read Info Disclosure Vulnerability

Affected installations of Cisco Snort are vulnerable to remote attackers disclosing sensitive information. No auth required. Includes severity, confidence, and

['Exploit may result in unauthorized access to sensitive information', 'No user interaction required to trigger the vulnerability']

Cisco Snort users and administrators
action items (2)
  • Deploy updates for Cisco Snort to address CVE-2026-20027
  • Monitor network traffic for signs of exploitation attempts

Zero Day Initiative ·

CRITICAL 95% confidence cve

ZDI-26-050: GIMP ICO File Parsing Heap-based Buffer Overflow RCE

ZDI warns of a critical vulnerability in GIMP's ICO file parsing. A heap-based buffer overflow could lead to remote code execution. Includes severity, confidenc

['Remote code execution possible when users open malicious files', 'Exploits require user interaction but no authentication']

LinuxmacOSWindows
action items (2)
  • Immediately patch all systems running vulnerable versions of GIMP
  • Monitor for suspicious activity related to ICO files

Zero Day Initiative ·

CRITICAL 95% confidence cve

Exploiting CVE-2024-54529: Sound Barrier II

['In-depth exploration of exploiting a type confusion vulnerability in macOS coreaudiod process.', 'Details on turning a crash into an exploit through. Read ful

['Understanding exploitation methods helps in crafting better defensive strategies.', 'Detailed insights are crucial for enhancing security assessments and remediation efforts.']

macOS
action items (3)
  • Review system configurations to ensure only necessary services are enabled.
  • Update affected systems with latest security updates from Apple.
  • Conduct thorough penetration testing focusing on newly identified vulnerabilities.

Google Project Zero ·

HIGH 90% confidence cve

ZDI-26-055: Progress Software Kemp LoadMaster addapikey Command Injection RCE Vulnerability

Exploitable via command injection in addapikey API of Progress Software Kemp LoadMaster, requiring authentication. CVSS rating 6.4. Includes severity, confidenc

['Allows network-adjacent actors to execute arbitrary commands on target systems', 'Potentially leads to full system compromise if exploited successfully']

Kemp LoadMaster usersNetwork administrators responsible for API security
action items (3)
  • Review system configurations and network policies
  • Update Kemp LoadMaster to latest version with fixes
  • Increase monitoring of addapikey related activities

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-054 Kemp LoadMaster delapikey OS Command Injection RCE

Progress Software Kemp LoadMaster suffers from a remote code execution vulnerability requiring authentication. Includes severity, confidence, and actionable res

['This flaw enables authenticated users to inject and run arbitrary system commands on affected systems remotely, potentially leading to full control']

Kemp LoadMaster usersNetwork administrators
action items (2)
  • Update Kemp LoadMaster to the latest version
  • Review and restrict access permissions for sensitive functions

Zero Day Initiative ·