// LIVE
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
INTELCritical Citrix NetScaler memory flaw actively exploited in attacks
INTELTelnyx joins LiteLLM in latest PyPI package poisoning tied to Trivy breach
INTELStorm Brews Over Critical, No-Click Telegram Flaw
INTELFTC Action Against Match and OkCupid for Deceiving Users, Sharing Personal Data
INTELTeamPCP Supply Chain Campaign: Update 004 - Databricks Investigating Alleged Com
INTELHealthcare IT Platform CareCloud Probing Potential Data Breach
INTELSecurity updates for Monday
INTEL'When intelligence and trust move together, AI stops being an experiment and sta
INTELRussian APT Star Blizzard Adopts DarkSword iOS Exploit Kit
INTELDisclosure of Replay Attack Vulnerability in Signed References
INTELHackers now exploit critical F5 BIG-IP flaw in attacks, patch now
INTELTelnyx Targeted in Growing TeamPCP Supply Chain Attack
CVE(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code
CVEZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability
CVEZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerabi
nsysops@ops-intel:~$ ls -lt --range live

OPS INTEL

266 items · ARIA-monitored · page 1 of 54
266
TOTAL
CRITICAL
HIGH
ACTIONABLE
WALLBOARD ↗
AUTO-APPROVED TODAY
LLM STATUS
CRITICAL (page) 3
HIGH (page) 2
MEDIUM (page) 0
LOW (page) 0
CRITICAL 95% confidence cve

(Pwn2Own) Canon imageCLASS MF654Cdw TTF Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability

Critical CVE-2025-14235 allows network-adjacent attackers to execute code on Canon MF654Cdw printers without authentication. CVSS rating: 8.8. Includes severity

Exploitation allows remote, network-adjacent attackers to execute arbitrary code without authentication Potential for sensitive data exposure and control of the device

Network-adjacent attackersCanon imageCLASS MF654Cdw owners/operators
action items (3)
  • Apply Canon's official patch or workaround immediately
  • Review network segmentation policies for printer infrastructure
  • Conduct security audit on print server and client systems

Zero Day Initiative ·

HIGH 90% confidence cve

ZDI-26-205: Canon MF654Cdw Printer Vulnerability

Network-adjacent attackers can execute arbitrary code on Canon imageCLASS MF654Cdw printers without requiring authentication due to a heap-based buffer. Read fu

Risk of unauthorized execution of arbitrary code on network-connected printers Potential for data exfiltration and operational disruption

Network administratorsIT security professionalsPrinter fleet managers
action items (3)
  • Update printer firmware immediately
  • Review network segmentation practices
  • Implement logging and monitoring for suspicious activity

Zero Day Initiative ·

CRITICAL 95% confidence cve

ZDI-26-204: Canon imageCLASS MF654Cdw XPS Parser Vulnerability

Network-adjacent attackers can execute remote code on Canon imageCLASS MF654Cdw printers without authentication, rated CVSS 8.8. Includes severity, confidence,

Lack of authentication for exploit Severe impact on security posture

Enterprise networks with Canon printers
action items (2)
  • Verify device versions and apply patches
  • Monitor for exploitation attempts

Zero Day Initiative ·

HIGH 95% confidence cve

ZDI-26-203: Canon MF654Cdw XML SOAP Buffer Overflow RCE

Network-adjacent attackers can execute arbitrary code on Canon imageCLASS MF654Cdw printers without authentication due to a heap-based buffer overflow. Read ful

Remote attackers can execute arbitrary code Potential for unauthorized access and data theft

Network operatorsPrinter administrators
action items (2)
  • Update printer firmware immediately
  • Review and restrict network exposure

Zero Day Initiative ·

CRITICAL 95% confidence cve

ZDI-26-202: QNAP TS-453E Hyper Data Protector Plugin SQL Injection RCE Vulnerability

Network-adjacent attackers can execute arbitrary code on QNAP TS-453E with the Hyper Data Protector Plugin due to a bypassable authentication flaw, rated CVSS.

Risk of unauthorized access and data theft Potential for service disruption

QNAP TS-453E usersNetwork administrators
action items (2)
  • Update to the latest firmware version
  • Conduct a security audit of network-accessible devices

Zero Day Initiative ·