// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 44 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 1
HIGH (page) 4
MEDIUM (page) 0
LOW (page) 0
HIGH 90% confidence cve

ZDI-26-116 TensorFlow HDF5 Library Vulnerability

A local privilege escalation vulnerability in TensorFlow's HDF5 library. Affected installations must address this CVSS-rated 7.0 flaw. Includes severity, confid

['Ensures systems running TensorFlow applications are secure from potential local attacks aiming for elevated privileges.', 'Improves overall system integrity and security posture by addressing known vulnerabilities in c

TensorFlow usersData scientistsMachine learning engineers
action items (2)
  • Review systems running TensorFlow with HDF5 library
  • Update to patched versions of TensorFlow and/or HDF5

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-115 Fortinet FortiClient FCConfig Privilege Escalation Vulnerability

['Fortinet FortiClient FCConfig Utility suffers from a local privilege escalation vulnerability. Affected versions must be updated immediately to prevent. Read

['The exploit enables attackers with low-privileged user access to escalate their privileges on the system.', 'This can lead to unauthorized access and control over affected systems, potentially compromising data integri

Fortinet FortiClient usersNetwork administrators
action items (2)
  • Update to non-vulnerable version immediately if patch is available.
  • Review and enhance security policies around least privilege access principles.

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-114 eDrawings Viewer Vulnerability

Remote code execution flaw in Dassault Systèmes' eDrawings Viewer affects EPRT file parsing. CVSS rating of 7.8. Includes severity, confidence, and actionable r

['Requires user interaction for exploitation, but poses risk to users opening suspicious attachments or visiting compromised sites', 'CVSS rating indicates high severity impact and ease of exploit']

WindowsmacOSLinux
action items (2)
  • Update Dassault Systèmes eDrawings Viewer software to the latest version
  • Deploy intrusion detection systems to monitor for unusual file parsing activities

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-113: eDrawings Viewer EPRT File Parsing Vulnerability

Remote code execution vulnerability in Dassault Systèmes eDrawings Viewer allows attackers to execute arbitrary code via malicious EPRT files, requiring user.

['Requires user interaction, such as opening a malicious file', 'Can be exploited remotely by sending specially crafted EPRT files', 'Has been assigned CVSS rating of 7.8 indicating high severity']

WindowsmacOSLinux
action items (3)
  • Patch affected systems immediately
  • Review network traffic for signs of exploitation
  • Inform users about the potential risks and safe handling practices

Zero Day Initiative ·

CRITICAL 90% confidence cve

Dassault Systèmes eDrawings Viewer EPRT File Parsing Vulnerability

A critical RCE flaw in Dassault Systèmes eDrawings Viewer allows remote code execution via EPRT files. CVE-2026-1333. Includes severity, confidence, and actiona

['Remote code execution possible with user interaction', 'Malicious EPRT files can exploit the flaw']

WindowsmacOSLinux
action items (2)
  • Apply security updates provided by Dassault Systèmes
  • Restrict use of EPRT files in environments

Zero Day Initiative ·