// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 38 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 0
HIGH (page) 5
MEDIUM (page) 0
LOW (page) 0
HIGH 90% confidence cve

ZDI-26-099 Oracle VirtualBox VMSVGA Race Condition Vulnerability

Local attackers can escalate privileges on affected Oracle VirtualBox installations through a race condition in the VMSVGA driver, rated CVSS 7.5. Includes seve

['Allows for unauthorized privilege elevation', 'Increases risk of lateral movement and data exfiltration']

System administratorsSecurity professionals
action items (2)
  • Patch affected systems immediately
  • Review and restrict privileges granted to VM users

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-098: Oracle VirtualBox VMSVGA Use-After-Free Local Privilege Escalation Vulnerability

Local attackers can escalate privileges on affected Oracle VirtualBox installations through a use-after-free vulnerability. CVE-2026-21955, CVSS rating 8.2.

['Enables unauthorized access and privilege elevation', 'Affects system integrity and confidentiality']

Oracle VirtualBox usersIT administrators
action items (2)
  • Apply available security patches immediately
  • Monitor for suspicious activities in affected environments

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-097 Oracle VirtualBox VMSVGA Vulnerability

Local attackers can escalate privileges on affected Oracle VirtualBox installations through a heap-based buffer overflow. CVE-2026-21983 assigned. Includes seve

['Allows unauthorized access and control over guest systems', 'Increases risk of data breaches, system compromise']

Oracle VirtualBox usersSystem administrators managing virtualized environments
action items (2)
  • Patch systems immediately with the latest Oracle VirtualBox update
  • Review system logs for suspicious activity

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-096 Dassault eDrawings Viewer Vulnerability

['Remote code execution vulnerability in Dassault Systèmes eDrawings Viewer allows attackers to execute arbitrary code via malicious EPRT files. Requires user.

['Operators must address this vulnerability because it enables attackers to remotely execute arbitrary code, potentially leading to system compromise and data exfiltration. User interaction requirement lowers but does no

Dassault Systèmes eDrawings Viewer
action items (2)
  • Immediately update eDrawings Viewer to the latest version when a patch is released.
  • Implement network monitoring and intrusion detection systems (IDS) to detect and block malicious EPRT files.

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-095 Dassault eDrawings Viewer Vulnerability

Remote attackers can execute code on Dassault Systèmes eDrawings Viewer installations due to EPRT file parsing issue. CVSS rating: 7.8, CVE-2026-1284. Includes

['User interaction required for exploit', 'High CVSS score indicating significant risk']

WindowsMacOS
action items (2)
  • Install available software updates
  • Monitor for unusual activity

Zero Day Initiative ·