<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Freedom Coder</title>
    <description>The latest articles on DEV Community by Freedom Coder (@freedom-coder).</description>
    <link>https://dev.to/freedom-coder</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3057520%2F80e0c6d9-1160-4c3a-9af3-cdf5c163c85b.png</url>
      <title>DEV Community: Freedom Coder</title>
      <link>https://dev.to/freedom-coder</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/freedom-coder"/>
    <language>en</language>
    <item>
      <title>CVE-2024-27199: JetBrains TeamCity Relative Path Traversal Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Tue, 21 Apr 2026 01:09:19 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2024-27199-jetbrains-teamcity-relative-path-traversal-vulnerability-4amb</link>
      <guid>https://dev.to/freedom-coder/cve-2024-27199-jetbrains-teamcity-relative-path-traversal-vulnerability-4amb</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2024-27199&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;JetBrains TeamCity Relative Path Traversal Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;JetBrains&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;TeamCity&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-20&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-04&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;JetBrains TeamCity contains a relative path traversal vulnerability that could allow limited admin actions to be performed.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.jetbrains.com/privacy-security/issues-fixed/" rel="noopener noreferrer"&gt;https://www.jetbrains.com/privacy-security/issues-fixed/&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-27199" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2024-27199&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>jetbrains</category>
      <category>teamcity</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-20128: Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Tue, 21 Apr 2026 01:06:48 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-20128-cisco-catalyst-sd-wan-manager-storing-passwords-in-a-recoverable-format-3b7p</link>
      <guid>https://dev.to/freedom-coder/cve-2026-20128-cisco-catalyst-sd-wan-manager-storing-passwords-in-a-recoverable-format-3b7p</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-20128&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Cisco&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Catalyst SD-WAN Manager&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-20&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-23&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp;amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;CISA Mitigation Instructions: &lt;a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems" rel="noopener noreferrer"&gt;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&lt;/a&gt; ; &lt;a href="https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" rel="noopener noreferrer"&gt;https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems&lt;/a&gt; ; &lt;a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v" rel="noopener noreferrer"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20128" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-20128&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cisco</category>
      <category>catalystsdwanmanager</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2025-2749: Kentico Xperience Path Traversal Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Tue, 21 Apr 2026 01:03:41 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2025-2749-kentico-xperience-path-traversal-vulnerability-iak</link>
      <guid>https://dev.to/freedom-coder/cve-2025-2749-kentico-xperience-path-traversal-vulnerability-iak</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2025-2749&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Kentico Xperience Path Traversal Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Kentico&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Kentico Xperience&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-20&lt;/li&gt;
&lt;li&gt;Due Date: 2026-05-04&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Kentico Xperience contains a path traversal vulnerability that could allow an authenticated user's Staging Sync Server to upload arbitrary data to path relative locations.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://devnet.kentico.com/download/hotfixes" rel="noopener noreferrer"&gt;https://devnet.kentico.com/download/hotfixes&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2749" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2025-2749&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>kentico</category>
      <category>kenticoxperience</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-20133: Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Tue, 21 Apr 2026 01:02:23 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-20133-cisco-catalyst-sd-wan-manager-exposure-of-sensitive-information-to-an-unauthorized-1243</link>
      <guid>https://dev.to/freedom-coder/cve-2026-20133-cisco-catalyst-sd-wan-manager-exposure-of-sensitive-information-to-an-unauthorized-1243</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-20133&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Cisco&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Catalyst SD-WAN Manager&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-20&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-23&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp;amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;CISA Mitigation Instructions: &lt;a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems" rel="noopener noreferrer"&gt;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&lt;/a&gt; ; &lt;a href="https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" rel="noopener noreferrer"&gt;https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems&lt;/a&gt; ; &lt;a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v" rel="noopener noreferrer"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-20133" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-20133&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cisco</category>
      <category>catalystsdwanmanager</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-20122: Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Tue, 21 Apr 2026 01:01:06 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-20122-cisco-catalyst-sd-wan-manager-incorrect-use-of-privileged-apis-vulnerability-hbn</link>
      <guid>https://dev.to/freedom-coder/cve-2026-20122-cisco-catalyst-sd-wan-manager-incorrect-use-of-privileged-apis-vulnerability-hbn</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-20122&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Cisco&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Catalyst SD-WAN Manger&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-20&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-23&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Please adhere to CISA’s guidelines to assess exposure and mitigate risks associated with Cisco SD-WAN devices as outlines in CISA’s Emergency Directive 26-03 (URL listed below in Notes) and CISA’s “Hunt &amp;amp; Hardening Guidance for Cisco SD-WAN Devices (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;CISA Mitigation Instructions: &lt;a href="https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems" rel="noopener noreferrer"&gt;https://www.cisa.gov/news-events/directives/ed-26-03-mitigate-vulnerabilities-cisco-sd-wan-systems&lt;/a&gt; ; &lt;a href="https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems" rel="noopener noreferrer"&gt;https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems&lt;/a&gt; ; &lt;a href="https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v" rel="noopener noreferrer"&gt;https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-authbp-qwCX8D4v&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/&lt;/a&gt; CVE-2026-20122&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cisco</category>
      <category>catalystsdwanmanger</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-34197: Apache ActiveMQ Improper Input Validation Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Fri, 17 Apr 2026 16:01:10 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-34197-apache-activemq-improper-input-validation-vulnerability-41f5</link>
      <guid>https://dev.to/freedom-coder/cve-2026-34197-apache-activemq-improper-input-validation-vulnerability-41f5</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-34197&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Apache ActiveMQ Improper Input Validation Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Apache&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;ActiveMQ&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-16&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-30&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Apache ActiveMQ contains an improper input validation vulnerability that allows for code injection.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt" rel="noopener noreferrer"&gt;https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34197" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-34197&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>apache</category>
      <category>activemq</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-32201: Microsoft SharePoint Server Improper Input Validation Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Tue, 14 Apr 2026 22:06:07 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-32201-microsoft-sharepoint-server-improper-input-validation-vulnerability-3586</link>
      <guid>https://dev.to/freedom-coder/cve-2026-32201-microsoft-sharepoint-server-improper-input-validation-vulnerability-3586</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-32201&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Microsoft SharePoint Server Improper Input Validation Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Microsoft&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;SharePoint Server&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-14&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-28&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Microsoft SharePoint Server contains an improper input validation vulnerability that allows an unauthorized attacker to perform spoofing over a network.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201" rel="noopener noreferrer"&gt;https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-32201&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-32201" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-32201&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/" rel="noopener noreferrer"&gt;April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/microsoft-issues-patches-for-sharepoint-zero-day-and-168-other-new-vulnerabilities/" rel="noopener noreferrer"&gt;Microsoft Issues Patches for SharePoint Zero-Day and 168 Other New Vulnerabilities&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/microsoft-april-2026-patch-tuesday-fixes-167-flaws-2-zero-days/" rel="noopener noreferrer"&gt;Microsoft April 2026 Patch Tuesday fixes 167 flaws, 2 zero-days&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>microsoft</category>
      <category>sharepointserver</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2009-0238: Microsoft Office Remote Code Execution</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Tue, 14 Apr 2026 22:01:06 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2009-0238-microsoft-office-remote-code-execution-2haf</link>
      <guid>https://dev.to/freedom-coder/cve-2009-0238-microsoft-office-remote-code-execution-2haf</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2009-0238&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Microsoft Office Remote Code Execution&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Microsoft&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Office&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-14&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-28&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Microsoft Office Excel contains a remote code execution vulnerability that could allow an attacker to take complete control of an affected system if a user opens a specially crafted Excel file that includes a malformed object.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009" rel="noopener noreferrer"&gt;https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-009&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2009-0238" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2009-0238&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>microsoft</category>
      <category>office</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-34621: Adobe Acrobat and Reader Prototype Pollution Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Mon, 13 Apr 2026 19:09:46 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-34621-adobe-acrobat-and-reader-prototype-pollution-vulnerability-3pi6</link>
      <guid>https://dev.to/freedom-coder/cve-2026-34621-adobe-acrobat-and-reader-prototype-pollution-vulnerability-3pi6</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-34621&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Adobe Acrobat and Reader Prototype Pollution Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Adobe&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Acrobat and Reader&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-13&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-27&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Adobe Acrobat and Reader contain a prototype pollution vulnerability that allows for arbitrary code execution.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb26-43.html" rel="noopener noreferrer"&gt;https://helpx.adobe.com/security/products/acrobat/apsb26-43.html&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-34621" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-34621&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/april-patch-tuesday-fixes-critical-flaws-across-sap-adobe-microsoft-fortinet-and-more/" rel="noopener noreferrer"&gt;April Patch Tuesday Fixes Critical Flaws Across SAP, Adobe, Microsoft, Fortinet, and More&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/adobe-rolls-out-emergency-fix-for-acrobat-reader-zero-day-flaw/" rel="noopener noreferrer"&gt;Adobe rolls out emergency fix for Acrobat, Reader zero-day flaw&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>adobe</category>
      <category>acrobatandreader</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2026-21643: Fortinet SQL Injection Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Mon, 13 Apr 2026 19:08:20 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2026-21643-fortinet-sql-injection-vulnerability-9ld</link>
      <guid>https://dev.to/freedom-coder/cve-2026-21643-fortinet-sql-injection-vulnerability-9ld</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2026-21643&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Fortinet SQL Injection Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Fortinet&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;FortiClient EMS&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-13&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-16&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests.&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://fortiguard.fortinet.com/psirt/FG-IR-25-1142" rel="noopener noreferrer"&gt;https://fortiguard.fortinet.com/psirt/FG-IR-25-1142&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2026-21643" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2026-21643&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software/" rel="noopener noreferrer"&gt;CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>fortinet</category>
      <category>forticlientems</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2020-9715: Adobe Acrobat Use-After-Free Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Mon, 13 Apr 2026 19:06:53 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2020-9715-adobe-acrobat-use-after-free-vulnerability-248f</link>
      <guid>https://dev.to/freedom-coder/cve-2020-9715-adobe-acrobat-use-after-free-vulnerability-248f</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2020-9715&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Adobe Acrobat Use-After-Free Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Adobe&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Acrobat&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-13&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-27&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Adobe Acrobat contains a use-after-free vulnerability that allows for code execution&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://helpx.adobe.com/security/products/acrobat/apsb20-48.html" rel="noopener noreferrer"&gt;https://helpx.adobe.com/security/products/acrobat/apsb20-48.html&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2020-9715" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2020-9715&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software/" rel="noopener noreferrer"&gt;CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>adobe</category>
      <category>acrobat</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
    <item>
      <title>CVE-2023-36424: Microsoft Windows Out-of-Bounds Read Vulnerability</title>
      <dc:creator>Freedom Coder</dc:creator>
      <pubDate>Mon, 13 Apr 2026 19:05:27 +0000</pubDate>
      <link>https://dev.to/freedom-coder/cve-2023-36424-microsoft-windows-out-of-bounds-read-vulnerability-3gef</link>
      <guid>https://dev.to/freedom-coder/cve-2023-36424-microsoft-windows-out-of-bounds-read-vulnerability-3gef</guid>
      <description>&lt;h3&gt;
  
  
  CVE ID
&lt;/h3&gt;

&lt;p&gt;CVE-2023-36424&lt;/p&gt;

&lt;h3&gt;
  
  
  Vulnerability Name
&lt;/h3&gt;

&lt;p&gt;Microsoft Windows Out-of-Bounds Read Vulnerability&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Project: &lt;strong&gt;Microsoft&lt;/strong&gt;
&lt;/li&gt;
&lt;li&gt;Product: &lt;strong&gt;Windows&lt;/strong&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Date
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Date Added: 2026-04-13&lt;/li&gt;
&lt;li&gt;Due Date: 2026-04-27&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  Description
&lt;/h3&gt;

&lt;p&gt;Microsoft Windows Common Log File System Driver contains an out-of-bounds read vulnerability that could allow a threat actor for privileges escalation&lt;/p&gt;

&lt;h3&gt;
  
  
  Known To Be Used in Ransomware Campaigns?
&lt;/h3&gt;

&lt;p&gt;Unknown&lt;/p&gt;

&lt;h3&gt;
  
  
  Action
&lt;/h3&gt;

&lt;p&gt;Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.&lt;/p&gt;

&lt;h3&gt;
  
  
  Additional Notes
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424" rel="noopener noreferrer"&gt;https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2023-36424&lt;/a&gt; ; &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-36424" rel="noopener noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2023-36424&lt;/a&gt;&lt;/p&gt;

&lt;h3&gt;
  
  
  Related Security News
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;&lt;a href="https://www.scyscan.com/news/cisa-adds-6-known-exploited-flaws-in-fortinet-microsoft-and-adobe-software/" rel="noopener noreferrer"&gt;CISA Adds 6 Known Exploited Flaws in Fortinet, Microsoft, and Adobe Software&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  More CVEs Info
&lt;/h3&gt;

&lt;p&gt;&lt;a href="https://www.scyscan.com/cves/" rel="noopener noreferrer"&gt;Common Vulnerabilities &amp;amp; Exposures (CVE) List&lt;/a&gt;&lt;/p&gt;

</description>
      <category>microsoft</category>
      <category>windows</category>
      <category>cybersecurity</category>
      <category>vulnerability</category>
    </item>
  </channel>
</rss>
