<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Freedom Coder</title>
    <description>The latest articles on DEV Community by Freedom Coder (@freedom-coder).</description>
    <link>https://dev.to/freedom-coder</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3057520%2F80e0c6d9-1160-4c3a-9af3-cdf5c163c85b.png</url>
      <title>DEV Community: Freedom Coder</title>
      <link>https://dev.to/freedom-coder</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/freedom-coder"/>
    <language>en</language>
    <item>
      <title>CVE-2026-42208: BerriAI LiteLLM SQL Injection Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Fri, 08 May 2026 19:01:07 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-42208-berriai-litellm-sql-injection-vulnerability-4oma</link>
      <guid>https://dev.to/freedom-coder/cve-2026-42208-berriai-litellm-sql-injection-vulnerability-4oma</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-42208&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;BerriAI LiteLLM SQL Injection Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;BerriAI&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;LiteLLM&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-05-08&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-11&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;BerriAI LiteLLM contains a SQL injection vulnerability that allows an attacker to read data from the proxy's database and potentially modify it, leading to unauthorised access to the proxy and the credentials it manages.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc" rel="noopener noreferrer"&gt;https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-42208" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-42208&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>berriai</category>
      <category>litellm</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-0300: Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Thu, 07 May 2026 16:01:07 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-0300-palo-alto-networks-pan-os-out-of-bounds-write-vulnerability-4boe</link>
      <guid>https://dev.to/freedom-coder/cve-2026-0300-palo-alto-networks-pan-os-out-of-bounds-write-vulnerability-4boe</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-0300&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Palo Alto Networks&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;PAN-OS&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-05-06&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-09&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.    Until the vendor releases an official fix, the following workaround should be implemented:  - Restrict User-ID Authentication Portal access to only trusted zones.  - Disable User-ID Authentication Portal if not required.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://security.paloaltonetworks.com/CVE-2026-0300" rel="noopener noreferrer"&gt;https://security.paloaltonetworks.com/CVE-2026-0300&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-0300" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-0300&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>paloaltonetworks</category>
      <category>panos</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-31431: Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Sat, 02 May 2026 10:01:05 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-31431-linux-kernel-incorrect-resource-transfer-between-spheres-vulnerability-72c</link>
      <guid>https://dev.to/freedom-coder/cve-2026-31431-linux-kernel-incorrect-resource-transfer-between-spheres-vulnerability-72c</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-31431&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Linux&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Kernel&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-05-01&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-15&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Linux Kernel contains an incorrect resource transfer between spheres vulnerability that could allow for privilege escalation.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/" rel="noopener noreferrer"&gt;https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/&lt;/a&gt;; &lt;a href="https://xint.io/blog/copy-fail-linux-distributions#the-fix-6" rel="noopener noreferrer"&gt;https://xint.io/blog/copy-fail-linux-distributions#the-fix-6&lt;/a&gt; ; &lt;a href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/" rel="noopener noreferrer"&gt;https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-31431" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-31431&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/dirty-frag-unpatched-linux-vulnerability-delivers-root-access/" rel="noopener noreferrer"&gt;Dirty Frag: Unpatched Linux vulnerability delivers root access&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/linux-kernel-dirty-frag-lpe-exploit-enables-root-access-across-major-distributions/" rel="noopener noreferrer"&gt;Linux Kernel Dirty Frag LPE Exploit Enables Root Access Across Major Distributions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-says-copy-fail-flaw-now-exploited-to-root-linux-systems/" rel="noopener noreferrer"&gt;CISA says ‘Copy Fail’ flaw now exploited to root Linux systems&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-actively-exploited-linux-root-access-bug-cve-2026-31431-to-kev/" rel="noopener noreferrer"&gt;CISA Adds Actively Exploited Linux Root Access Bug CVE-2026-31431 to KEV&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>kernel</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Thu, 30 Apr 2026 14:30:04 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2022-0847-linux-kernel-privilege-escalation-vulnerability-2b45</link>
      <guid>https://dev.to/freedom-coder/cve-2022-0847-linux-kernel-privilege-escalation-vulnerability-2b45</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2022-0847&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Linux Kernel Privilege Escalation Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Linux&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Kernel&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2022-04-25&lt;/li&gt;
&lt;li&gt;Due Date: 2022-05-16&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Linux kernel contains an improper initialization vulnerability where an unprivileged local user could escalate their privileges on the system. This vulnerability has the moniker of "Dirty Pipe."&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply updates per vendor instructions.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2022-0847" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2022-0847&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/new-linux-copy-fail-vulnerability-enables-root-access-on-major-distributions/" rel="noopener noreferrer"&gt;New Linux 'Copy Fail' Vulnerability Enables Root Access on Major Distributions&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/pakistani-hackers-use-disgomoji-malware-in-indian-government-cyber-attacks/" rel="noopener noreferrer"&gt;Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>linux</category>
      <category>kernel</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-32202: Microsoft Windows Protection Mechanism Failure Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Wed, 29 Apr 2026 22:06:09 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-32202-microsoft-windows-protection-mechanism-failure-vulnerability-3d80</link>
      <guid>https://dev.to/freedom-coder/cve-2026-32202-microsoft-windows-protection-mechanism-failure-vulnerability-3d80</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-32202&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Microsoft Windows Protection Mechanism Failure Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Microsoft&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Windows&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-28&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-12&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Microsoft Windows Shell contains a protection mechanism failure vulnerability that allows an unauthorized attacker to perform spoofing over a network.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32202" rel="noopener noreferrer"&gt;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32202&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32202" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-32202&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-orders-feds-to-patch-windows-flaw-exploited-as-zero-day/" rel="noopener noreferrer"&gt;CISA orders feds to patch Windows flaw exploited as zero-day&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-microsoft-warn-of-active-exploitation-of-windows-shell-vulnerability-cve-2026-32202/" rel="noopener noreferrer"&gt;CISA, Microsoft warn of active exploitation of Windows Shell vulnerability (CVE-2026-32202)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/" rel="noopener noreferrer"&gt;CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/microsoft-confirms-active-exploitation-of-windows-shell-cve-2026-32202/" rel="noopener noreferrer"&gt;Microsoft Confirms Active Exploitation of Windows Shell CVE-2026-32202&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>microsoft</category>
      <category>windows</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2024-1708: ConnectWise ScreenConnect Path Traversal Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Wed, 29 Apr 2026 22:01:08 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2024-1708-connectwise-screenconnect-path-traversal-vulnerability-4668</link>
      <guid>https://dev.to/freedom-coder/cve-2024-1708-connectwise-screenconnect-path-traversal-vulnerability-4668</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2024-1708&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;ConnectWise ScreenConnect Path Traversal Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;ConnectWise&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;ScreenConnect&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-28&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-12&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;ConnectWise ScreenConnect contains a path traversal vulnerability which could allow an attacker to execute remote code or directly impact confidential data and critical systems.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8" rel="noopener noreferrer"&gt;https://www.connectwise.com/company/trust/security-bulletins/connectwise-screenconnect-23.9.8&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-1708" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-1708&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-actively-exploited-connectwise-and-windows-flaws-to-kev/" rel="noopener noreferrer"&gt;CISA Adds Actively Exploited ConnectWise and Windows Flaws to KEV&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>connectwise</category>
      <category>screenconnect</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2024-57726: SimpleHelp Missing Authorization Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Fri, 24 Apr 2026 22:08:37 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2024-57726-simplehelp-missing-authorization-vulnerability-3m55</link>
      <guid>https://dev.to/freedom-coder/cve-2024-57726-simplehelp-missing-authorization-vulnerability-3m55</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2024-57726&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;SimpleHelp Missing Authorization Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: *&lt;em&gt;SimpleHelp *&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;SimpleHelp&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-24&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-08&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;SimpleHelp contains a missing authorization vulnerability that could allow low-privileged technicians to create API keys with excessive permissions. These API keys can be used to escalate privileges to the server admin role.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier" rel="noopener noreferrer"&gt;https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57726" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-57726&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/" rel="noopener noreferrer"&gt;CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>simplehelp</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2024-57728: SimpleHelp Path Traversal Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Fri, 24 Apr 2026 22:06:07 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2024-57728-simplehelp-path-traversal-vulnerability-107l</link>
      <guid>https://dev.to/freedom-coder/cve-2024-57728-simplehelp-path-traversal-vulnerability-107l</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2024-57728&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;SimpleHelp Path Traversal Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: *&lt;em&gt;SimpleHelp *&lt;/em&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;SimpleHelp&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-24&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-08&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;SimpleHelp contains a path traversal vulnerability that allows admin users to upload arbitrary files anywhere on the file system by uploading a crafted zip file (i.e. zip slip). This can be exploited to execute arbitrary code on the host in the context of the SimpleHelp server user.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier" rel="noopener noreferrer"&gt;https://simple-help.com/kb---security-vulnerabilities-01-2025#security-vulnerabilities-in-simplehelp-5-5-7-and-earlier&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-57728" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-57728&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/" rel="noopener noreferrer"&gt;CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>simplehelp</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2024-7399: Samsung MagicINFO 9 Server Path Traversal Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Fri, 24 Apr 2026 22:03:36 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2024-7399-samsung-magicinfo-9-server-path-traversal-vulnerability-4n1</link>
      <guid>https://dev.to/freedom-coder/cve-2024-7399-samsung-magicinfo-9-server-path-traversal-vulnerability-4n1</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2024-7399&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Samsung MagicINFO 9 Server Path Traversal Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Samsung&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;MagicINFO 9 Server&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-24&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-08&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Samsung MagicINFO 9 Server contains a path traversal vulnerability that could allow an attacker to write arbitrary files as system authority.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://security.samsungtv.com/securityUpdates" rel="noopener noreferrer"&gt;https://security.samsungtv.com/securityUpdates&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-7399" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-7399&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/" rel="noopener noreferrer"&gt;CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>samsung</category>
      <category>magicinfo9server</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2025-29635: D-Link DIR-823X Command Injection Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Fri, 24 Apr 2026 22:01:05 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2025-29635-d-link-dir-823x-command-injection-vulnerability-45hb</link>
      <guid>https://dev.to/freedom-coder/cve-2025-29635-d-link-dir-823x-command-injection-vulnerability-45hb</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2025-29635&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;D-Link DIR-823X Command Injection Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;D-Link&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;DIR-823X&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-24&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-08&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;D-Link DIR-823X contains a command injection vulnerability that allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469" rel="noopener noreferrer"&gt;https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10469&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2025-29635" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2025-29635&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-4-exploited-flaws-to-kev-sets-may-2026-federal-deadline/" rel="noopener noreferrer"&gt;CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>dlink</category>
      <category>dir823x</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-39987: Marimo Remote Code Execution Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Fri, 24 Apr 2026 01:01:05 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-39987-marimo-remote-code-execution-vulnerability-4m9j</link>
      <guid>https://dev.to/freedom-coder/cve-2026-39987-marimo-remote-code-execution-vulnerability-4m9j</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-39987&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Marimo Remote Code Execution Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Marimo&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Marimo&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-23&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-07&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Marimo contains an pre-authorization remote code execution vulnerability, allowing an unauthenticated attacked to shell access and execute arbitrary system commands.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc" rel="noopener noreferrer"&gt;https://github.com/marimo-team/marimo/security/advisories/GHSA-2679-6mx9-h9xc&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-39987" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-39987&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>marimo</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-33825: Microsoft Defender Insufficient Granularity of Access Control Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Wed, 22 Apr 2026 22:01:55 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-33825-microsoft-defender-insufficient-granularity-of-access-control-vulnerability-5d3f</link>
      <guid>https://dev.to/freedom-coder/cve-2026-33825-microsoft-defender-insufficient-granularity-of-access-control-vulnerability-5d3f</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-33825&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Microsoft Defender Insufficient Granularity of Access Control Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Microsoft&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Defender&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-22&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-06&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Microsoft Defender contains an insufficient granularity of access control vulnerability that could allow an authorized attacker to escalate privileges locally.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825" rel="noopener noreferrer"&gt;https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-33825&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-33825" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-33825&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-orders-feds-to-patch-bluehammer-flaw-exploited-as-zero-day/" rel="noopener noreferrer"&gt;CISA orders feds to patch BlueHammer flaw exploited as zero-day&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>microsoft</category>
      <category>defender</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
  </channel>
</rss>
