Drivetrain Solutions
Security Monitor

Cybersecurity Alerts

AI-classified threat intelligence from CISA KEV, NVD, and GitHub Advisory databases.

141 active alerts58 critical, 59 high
Monitored every 2 hours
RSS Feed
Impacted: Grav CMS (content management system)
How: A staff member with page-creation permissions can insert malicious code that executes when an admin visits that page, potentially exposing sensitive system information.
Action: Update Grav to the patched version immediately; review who has page-creation permissions and audit recent pages for suspicious SVG tags or embedded code.
Urgency: immediately
Confidence
60%
CVSS: 8.9/10CVE-2026-42611
Impacted: open-websearch MCP tool used for web content fetching
How: An attacker can trick the tool into accessing internal or private network resources by using IPv6 addresses or crafted hostnames, then receive the sensitive data back in responses.
Action: Update open-websearch to the latest patched version; review any integrations or systems using this tool for sensitive environments; restrict the tool's network access if possible.
Urgency: Within 24 hours — this is a network-based vulnerability that requires active exploitation but is now publicly known
Confidence
60%
CVSS: 8.2/10CVE-2026-42260
Impacted: PocketBase applications using OAuth2 social login
How: An attacker who knows your email address can pre-create a linked social-login account in advance, then potentially take it over if you later use that same OAuth provider to sign in.
Action: Update PocketBase when a patch is available; review linked OAuth accounts in your user settings; use a unique, strong password as backup authentication.
Urgency: Within the next update cycle — not immediately critical but should be prioritized
Confidence
35%
CVE-2026-44166
Impacted: Grav CMS with Direct Install plugin upload feature
How: An admin user can upload a disguised ZIP file containing hidden PHP code that bypasses file-type checks, allowing them to run arbitrary commands on your server.
Action: Update Grav immediately to the patched version; disable the Direct Install feature if you cannot update right now; review who has admin access.
Urgency: Immediately — this is actively exploitable by insiders or compromised admin accounts
Confidence
60%
CVSS: 9.1/10CVE-2026-42607
Impacted: Applications using vm2 library version 3.10.4 with Node.js version 24
How: An attacker who can submit code to be executed inside vm2 can exploit a JavaScript error-handling feature to escape the sandbox and run any command on your server.
Action: Immediately stop using vm2 v3.10.4 on Node.js 24. Update vm2 to version 3.10.5 or later, or switch to an alternative sandboxing solution.
Urgency: Immediately — this is a confirmed active exploit with no workarounds
Confidence
60%
CVSS: 9.8/10CVE-2026-26332
Impacted: Applications using vm2 library version 3.10.4 with Node.js version 25
How: An attacker who can submit code to be executed inside vm2 can break out of the sandbox and run any command on your server with full access.
Action: Immediately stop using vm2 if you have Node.js 25 installed. Either downgrade to Node.js 24 or earlier, update vm2 to version 3.10.5 or later (when available), or switch to an alternative sandboxing solution.
Urgency: Immediately — this is a confirmed active exploit with no workarounds
Confidence
60%
CVSS: 9.8/10CVE-2026-26956
Impacted: Gotenberg document conversion service (all versions with the blocklist bypass vulnerability)
How: An attacker can rename or move files on your server by using alternative tag names that bypass Gotenberg's security filters.
Action: Update Gotenberg to the latest patched version immediately. If you run Gotenberg, check your version and apply the security update. Contact your vendor if you use a third-party service that runs Gotenberg.
Urgency: Within 24 hours
Confidence
60%
CVSS: 8.2/10CVE-2026-40893
Impacted: Adblock Plus extension for Chrome version 4.36.2 and earlier
How: An attacker could bypass access controls in the premium activation feature by manipulating messages sent to the extension.
Action: Update Adblock Plus to version 4.36.3 or later through the Chrome Web Store; check your current version in Chrome Settings > Extensions.
Urgency: Next time you update your browser or extensions; not urgent
Confidence
50%
CVSS: 5.3/10CVE-2026-7686
Impacted: Applications using Bandit (an Elixir web server) to handle HTTP requests
How: An attacker can send specially crafted HTTP requests with duplicate content-length headers to bypass security checks or inject malicious content that the server processes incorrectly.
Action: Update Bandit to the latest patched version immediately. Check your application dependencies to confirm you're using Bandit, then run your package manager's update command (e.g., mix deps.update bandit for Elixir projects).
Urgency: Within 24 hours
Confidence
35%
CVE-2026-39805
Impacted: Gotenberg (document conversion service), all versions before the fix
How: An attacker can inject malicious commands into document metadata (like titles or descriptions) that get executed when the document is processed, potentially allowing them to run arbitrary code on your server.
Action: Update Gotenberg immediately to the latest patched version; review any documents uploaded by untrusted users in the past 48 hours for suspicious metadata
Urgency: immediately
Confidence
60%
CVSS: 10/10CVE-2026-40281
Impacted: Gotenberg document conversion service (all versions using case-sensitive URL filtering)
How: An attacker can bypass the security blocklist by using uppercase letters in the URL scheme (like HTTP:// instead of http://) to force the server to access internal or private networks that should be restricted.
Action: Update Gotenberg to the latest version immediately—this is a confirmed bypass of existing protections. Verify your version and apply the patch today. Do not delay.
Urgency: Immediately
Confidence
60%
CVSS: 9.3/10CVE-2026-40280
Impacted: Gotenberg document conversion service (all versions with webhook feature)
How: An attacker can send a specially crafted request to the webhook URL feature without authentication, forcing the server to make requests to internal systems or restricted networks that should be blocked.
Action: Update Gotenberg to the latest patched version immediately. If you use Gotenberg, check your current version number and apply available security updates. Restrict network access to Gotenberg ports to trusted applications only.
Urgency: Within 24 hours
Confidence
60%
CVSS: 8.6/10CVE-2026-39383
Impacted: Admidio user management system (all versions with the vulnerability)
How: An attacker can send a malicious link to an Admidio user that runs hidden commands in their browser when clicked, potentially stealing their session or data.
Action: Update Admidio to the latest patched version immediately. Review any suspicious links received by staff. Check if your Admidio installation is exposed to the internet.
Urgency: Within 48 hours
Confidence
50%
CVSS: 6.1/10CVE-2026-41661
Impacted: n8n workflow automation platform with Python Task Runner enabled
How: An authenticated user can write malicious Python code in a workflow node to break out of the sandbox and run any command on the server.
Action: Update n8n to the latest patched version immediately; review who has permission to create/edit workflows with Python nodes; consider disabling Python Task Runner if not essential.
Urgency: Within 24 hours
Confidence
50%
CVSS: 7.5/10CVE-2026-42234
Impacted: Google Chrome on Android versions below 147.0.7727.138
How: A bad actor could escape Chrome's security sandbox and gain full control of your Android phone by tricking you into viewing a malicious webpage.
Action: Update Chrome on your Android phone to version 147.0.7727.138 or later within 24 hours — open Google Play Store, search Chrome, and tap Update.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7352
Impacted: Google Chrome versions below 147.0.7727.138
How: A bad actor could steal your private information from websites (like passwords or banking details) by convincing you to install a malicious Chrome extension.
Action: Update Chrome to version 147.0.7727.138 or later within 24 hours, and audit installed extensions — go to Chrome menu > More Tools > Extensions and remove anything unfamiliar.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7351
Impacted: Google Chrome versions below 147.0.7727.138
How: A bad actor could escape Chrome's security sandbox if they first compromise your browser, then exploit a flaw in the MIDI (musical instrument) feature.
Action: Update Chrome to version 147.0.7727.138 or later within 24 hours — go to Chrome menu > Help > About Google Chrome.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7350
Impacted: Google Chrome versions below 147.0.7727.138
How: A bad actor on your local network (like a shared office Wi-Fi) could execute code on your computer via Chrome's casting feature.
Action: Update Chrome to version 147.0.7727.138 or later within 24 hours — go to Chrome menu > Help > About Google Chrome.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7349
Impacted: Google Chrome versions below 147.0.7727.138
How: A bad actor could execute code on your computer by tricking you into visiting a webpage with malicious video or audio content.
Action: Update Chrome to version 147.0.7727.138 or later within 24 hours — go to Chrome menu > Help > About Google Chrome.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7348
Impacted: Google Chrome versions below 147.0.7727.138 (especially systems using Chrome Remote Desktop/Chromoting)
How: A bad actor on your network could execute malicious code on your computer by sending specially crafted network traffic to Chrome's remote desktop feature.
Action: Update Chrome to version 147.0.7727.138 or later within 24 hours — go to Chrome menu > Help > About Google Chrome.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7347
Impacted: Google Chrome versions below 147.0.7727.138
How: A bad actor could crash Chrome or potentially execute code by sending you a crafted webpage that exploits a memory flaw.
Action: Update Chrome to version 147.0.7727.138 or later within 24 hours — go to Chrome menu > Help > About Google Chrome.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7346
Impacted: Google Chrome versions below 147.0.7727.138
How: A bad actor could escape Chrome's security sandbox and gain full control of your computer by tricking you into viewing a malicious webpage.
Action: Update Chrome immediately to version 147.0.7727.138 or later — go to Chrome menu > Help > About Google Chrome and install the update now.
Urgency: Immediately
Confidence
35%
CVE-2026-7345
Impacted: Google Chrome on Windows versions below 147.0.7727.138
How: A bad actor could escape Chrome's security sandbox and gain full control of your computer by tricking you into viewing a malicious webpage.
Action: Update Chrome immediately to version 147.0.7727.138 or later — go to Chrome menu > Help > About Google Chrome and install the update now.
Urgency: Immediately
Confidence
35%
CVE-2026-7344
Impacted: Google Chrome on Windows versions below 147.0.7727.138
How: A bad actor could escape Chrome's security sandbox and gain full control of your computer by tricking you into viewing a malicious webpage.
Action: Update Chrome immediately to version 147.0.7727.138 or later — go to Chrome menu > Help > About Google Chrome and install the update now.
Urgency: Immediately
Confidence
35%
CVE-2026-7343
Impacted: Google Chrome on Android, versions before 147.0.7727.138
How: A malicious webpage opened in Chrome on Android can exploit a memory flaw to execute malicious code inside the browser sandbox.
Action: Update Chrome on your Android device immediately to version 147.0.7727.138 or later through the Google Play Store.
Urgency: immediately
Confidence
35%
CVE-2026-7342
Impacted: Google Chrome on all platforms, versions before 147.0.7727.138
How: A malicious webpage can exploit a memory flaw in Chrome's WebRTC feature to execute malicious code inside the browser sandbox.
Action: Update Chrome immediately to version 147.0.7727.138 or later.
Urgency: immediately
Confidence
35%
CVE-2026-7341
Impacted: Google Chrome on Windows, versions before 147.0.7727.138
How: A malicious webpage can exploit a math overflow flaw in Chrome's graphics processing to read sensitive memory data from your computer.
Action: Update Chrome to version 147.0.7727.138 or later within 24 hours.
Urgency: within 24 hours
Confidence
35%
CVE-2026-7340
Impacted: Google Chrome on all platforms, versions before 147.0.7727.138
How: A malicious webpage can exploit a memory overflow bug in Chrome's WebRTC feature to potentially corrupt memory and crash or compromise the browser.
Action: Update Chrome to version 147.0.7727.138 or later within 24 hours.
Urgency: within 24 hours
Confidence
35%
CVE-2026-7339
Impacted: Google Chrome on all platforms, versions before 147.0.7727.138
How: An attacker on your local network (same WiFi) can send malicious network traffic to exploit Chrome's Cast feature and corrupt memory on your device.
Action: Update Chrome immediately to version 147.0.7727.138 or later. Avoid using public or untrusted WiFi networks until updated.
Urgency: immediately
Confidence
35%
CVE-2026-7338
Impacted: Google Chrome on all platforms, versions before 147.0.7727.138
How: A malicious webpage can exploit a flaw in Chrome's V8 JavaScript engine that confuses variable types, allowing attackers to run malicious code inside the browser sandbox.
Action: Update Chrome immediately to version 147.0.7727.138 or later through Chrome's automatic or manual update process.
Urgency: immediately
Confidence
35%
CVE-2026-7337
Impacted: Google Chrome on all platforms, versions before 147.0.7727.138
How: A malicious webpage can exploit a memory flaw in Chrome's WebRTC communication feature to execute malicious code inside the browser sandbox.
Action: Update Chrome immediately to version 147.0.7727.138 or later using the built-in update feature.
Urgency: immediately
Confidence
35%
CVE-2026-7336
Impacted: Google Chrome on all platforms, versions before 147.0.7727.138
How: A bad actor can create a malicious webpage that exploits a memory flaw in Chrome's media playback to run malicious code within the browser's restricted sandbox.
Action: Update Chrome immediately to version 147.0.7727.138 or later. Check your current version in Chrome menu > Help > About Google Chrome.
Urgency: immediately
Confidence
35%
CVE-2026-7335
Impacted: Google Chrome on macOS, versions before 147.0.7727.138
How: A malicious webpage can exploit a memory corruption bug in Chrome's interface layer on Mac to potentially crash your browser or execute malicious code.
Action: Update Chrome immediately to version 147.0.7727.138 or later through Chrome's built-in update feature.
Urgency: immediately
Confidence
35%
CVE-2026-7334
Impacted: Google Chrome on all platforms, versions before 147.0.7727.138
How: A bad actor can send you a malicious webpage that exploits a memory flaw in Chrome's graphics processor to potentially escape the browser's security sandbox and gain full control of your computer.
Action: Update Chrome immediately to version 147.0.7727.138 or later. Go to Chrome menu > Help > About Google Chrome and install the update now.
Urgency: immediately
Confidence
35%
CVE-2026-7333
Impacted: Firefox 150.0.0 and Thunderbird 150.0.0
How: Memory corruption issues in Firefox and Thunderbird could allow attackers to execute arbitrary code if they successfully exploit these flaws.
Action: Update Firefox to version 150.0.1 or later and Thunderbird to 150.0.1 or later.
Urgency: Within 24 hours
Confidence
50%
CVSS: 7.3/10CVE-2026-7324
Impacted: Firefox ESR 140.10.0, Thunderbird ESR 140.10.0, Firefox 150.0.0, and Thunderbird 150.0.0
How: Memory corruption bugs in Firefox and Thunderbird could potentially allow attackers to execute arbitrary code with sufficient effort.
Action: Update to the latest patched versions: Firefox 150.0.1 or later, Firefox ESR 140.10.1, and Thunderbird 150.0.1 or later.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7323
Impacted: Firefox ESR 115.35.0, Firefox ESR 140.10.0, Thunderbird ESR 140.10.0, Firefox 150.0.0, and Thunderbird 150.0.0
How: Memory flaws in Firefox and Thunderbird could allow attackers to execute arbitrary code if exploited, though no active attacks are known yet.
Action: Update to the latest patched versions: Firefox 150.0.1 or later, Firefox ESR 140.10.1 or 115.35.1, Thunderbird 150.0.1 or later.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-7322
Impacted: Firefox ESR (Extended Support Release)
How: An attacker can break out of Firefox's security sandbox and run malicious code with full system access by exploiting a flaw in the video conferencing (WebRTC) networking component.
Action: Update Firefox ESR to version 140.10.1 immediately. If you use the standard Firefox, ensure you are on version 150.0.1 or later.
Urgency: Immediately
Confidence
60%
CVSS: 9.6/10CVE-2026-7321
Impacted: Firefox, Firefox ESR, and Thunderbird on all operating systems
How: An attacker can extract sensitive information from audio or video streams due to a flaw in how Firefox handles data boundaries.
Action: Update Firefox to version 150.0.1 or later, or Firefox ESR to 140.10.1 or 115.35.1 depending on your version. Check Help > About Firefox to see your current version.
Urgency: Within 24 hours
Confidence
50%
CVSS: 7.5/10CVE-2026-7320
Impacted: Firefox ESR 140.9, Firefox 149, Thunderbird ESR 140.9, and Thunderbird 149
How: A memory safety issue in Firefox and Thunderbird could allow an attacker to execute arbitrary code on your computer through a malicious webpage or email attachment.
Action: Update Firefox and Thunderbird to the latest version immediately through Help > About or Check for Updates menu.
Urgency: Within 24 hours
Confidence
60%
CVSS: 8.1/10CVE-2026-6786
Impacted: Firefox ESR 115.34, Firefox ESR 140.9, Firefox 149, Thunderbird ESR 140.9, and Thunderbird 149
How: A flaw in how Firefox and Thunderbird handle memory could allow an attacker to run malicious code on your computer if you visit a hostile website or open a malicious email.
Action: Update Firefox and Thunderbird to the latest version immediately through Help > About or Check for Updates menu.
Urgency: Within 24 hours
Confidence
60%
CVSS: 8.1/10CVE-2026-6785
Impacted: Budibase (all versions with this configuration)
How: If a hacker injects malicious code into a Budibase page, they can steal your login session cookie and take over your account completely.
Action: Update Budibase to the latest version immediately. Contact your Budibase administrator or hosting provider to ensure httpOnly cookie protection is enabled. If you use Budibase, change your password after updating.
Urgency: Within 24 hours
Confidence
30%
CVSS: 8.1/10
Impacted: OpenLearnX code execution environment and any platform using it for online learning or code execution features
How: An attacker can break out of the sandbox designed to safely run user code and execute arbitrary commands on the server, potentially stealing data or disrupting service.
Action: If you use or deploy OpenLearnX, update to the patched version immediately. Contact your OpenLearnX vendor or hosting provider to confirm you're running the latest secure version.
Urgency: immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-41900
Impacted: Google Chrome on Windows, versions before 147.0.7727.117
How: An attacker can craft a malicious video file that exploits a timing flaw in Chrome's GPU system to potentially escape the browser's security sandbox.
Action: Update Google Chrome to version 147.0.7727.117 or later. Go to Chrome menu > About Google Chrome to check your version and auto-update. Avoid playing untrusted video files until updated.
Urgency: within 24 hours
Confidence
50%
CVSS: 5.3/10CVE-2026-6921
Impacted: Google Chrome on Android, versions before 147.0.7727.117
How: An attacker can craft a malicious webpage that reads memory it shouldn't have access to in the GPU system, potentially breaking out of Chrome's security sandbox.
Action: Update Google Chrome on your Android device to version 147.0.7727.117 or later. Open the Google Play Store, search for Chrome, and tap Update if available.
Urgency: immediately
Confidence
50%
CVSS: 7.5/10CVE-2026-6920
Impacted: Google Chrome on all platforms, versions before 147.0.7727.117
How: An attacker can craft a malicious webpage that tricks Chrome's developer tools into using memory that has already been freed, potentially breaking out of Chrome's security sandbox.
Action: Update Google Chrome to version 147.0.7727.117 or later immediately. Go to Chrome menu > About Google Chrome to check your version and auto-update.
Urgency: immediately
Confidence
35%
CVE-2026-6919
Impacted: WebKitGTK and WPE WebKit (used in Linux applications and embedded systems)
How: A website can bypass your application's security controls and make unauthorized network connections, DNS lookups, and HTTP requests in the background without permission.
Action: Update WebKitGTK or WPE WebKit to the patched version; check your Linux system for available security updates and install them.
Urgency: Within the next week during your regular update cycle
Confidence
50%
CVSS: 4.7/10CVE-2025-66286
Impacted: Any application using the xmldom library to serialize or output XML data
How: An attacker can inject malicious XML code through comments, allowing them to manipulate or corrupt the XML output your application generates.
Action: Update xmldom to the latest patched version immediately. If you serialize user-controlled data to XML, audit that code after updating.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-41672
Impacted: Any application using the xmldom library to serialize or output XML data
How: An attacker can inject malicious XML code into processing instructions, allowing them to manipulate or corrupt the XML output your application generates.
Action: Update xmldom to the latest patched version immediately. If you serialize user-controlled data to XML, audit that code after updating.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-41675
Impacted: Any application using the xmldom library to process XML documents
How: An attacker can craft a deeply nested XML file that crashes your application when processed, causing a denial of service.
Action: Update xmldom to the latest patched version immediately. Check your project's dependencies for xmldom and run npm update or yarn upgrade.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-41673
Impacted: Web applications using DOMPurify library versions 3.0.1 through 3.3.3
How: An attacker can inject malicious code that escapes DOMPurify's content filtering through a prototype pollution technique, potentially allowing them to execute scripts in a user's browser.
Action: Update DOMPurify to version 3.4.0 or later immediately; check your application's dependencies to confirm the version in use.
Urgency: Within 24 hours
Confidence
50%
CVSS: 6.9/10CVE-2026-41238
Impacted: Raindrop.io Bookmark Manager Web App version 5.6.76.0
How: An attacker can send a specially crafted request to bypass security checks and access your saved bookmarks and personal data stored in the app.
Action: Update Raindrop.io to the latest version immediately; check your account for any unusual access or bookmark changes.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-31192
Impacted: DeepL Chrome extension versions 1.22.0 through 1.23.0
How: A malicious website could trick the extension into running harmful code in your browser or altering what you see on web pages.
Action: Update the DeepL extension to version 1.23.1 or later through Chrome's extension settings, or uninstall it if you don't actively use it.
Urgency: Within the next few days — this only affects older versions of an optional extension, not your core browser.
Confidence
50%
CVSS: 6.1/10CVE-2026-40451
Impacted: Claude Code (Anthropic's code editor extension)
How: An attacker can trick Claude Code into writing files anywhere on your computer outside its intended workspace, potentially overwriting critical system or application files.
Action: Stop using Claude Code immediately until Anthropic releases a patched version. Check Anthropic's security advisories for the fix, then update as soon as it's available.
Urgency: Immediately — do not use this tool until patched
Confidence
35%
CVE-2026-39861
Impacted: October CMS versions before 3.7.16 and 4.1.16
How: A backend user with editor access could potentially perform file operations they shouldn't be allowed to do on assets and blueprints.
Action: Update October CMS to version 3.7.16 or 4.1.16 or later when convenient during your next maintenance window.
Urgency: Next time you update — no rush
Confidence
50%
CVSS: 3.3/10CVE-2026-29179
Impacted: Firefox and Firefox ESR (all platforms)
How: The browser's autofill feature can leak saved passwords, payment information, or addresses to attackers.
Action: Update to Firefox 150 or Firefox ESR 140.10 or later immediately.
Urgency: Immediately
Confidence
35%
CVE-2026-6765
Impacted: Firefox and Firefox ESR (all platforms)
How: A boundary error in device interaction code can allow attackers to access hardware features (camera, microphone, location) without permission.
Action: Update to Firefox 150 or Firefox ESR 140.10 or later immediately.
Urgency: Immediately
Confidence
35%
CVE-2026-6764
Impacted: Firefox and Firefox ESR (all platforms)
How: File handling security protections can be bypassed, potentially allowing malicious files to execute without warning.
Action: Update to Firefox 150 or Firefox ESR 140.10 or later immediately.
Urgency: Immediately
Confidence
35%
CVE-2026-6763
Impacted: Firefox, Firefox ESR 115, and Firefox ESR 140 (all platforms)
How: An attacker can disguise a malicious website to appear as a legitimate one, tricking users into entering sensitive information.
Action: Update to Firefox 150, Firefox ESR 115.35, or Firefox ESR 140.10 or later at your next update.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-6762
Impacted: Firefox and Firefox ESR (all platforms)
How: An attacker can gain elevated privileges within the browser, potentially compromising all user data and system access.
Action: Update to Firefox 150 or Firefox ESR 140.10 or later immediately — do not delay.
Urgency: Immediately
Confidence
35%
CVE-2026-6761
Impacted: Firefox (all platforms)
How: Cookie security protections can be bypassed, potentially allowing attackers to steal or manipulate your saved login credentials.
Action: Update Firefox to version 150 or later via Help > About Firefox.
Urgency: Immediately
Confidence
35%
CVE-2026-6760
Impacted: Firefox and Firefox ESR on macOS
How: A memory error specific to macOS can be exploited to crash the browser or execute unauthorized code.
Action: Update to Firefox 150 or Firefox ESR 140.10 or later immediately.
Urgency: Immediately
Confidence
35%
CVE-2026-6759
Impacted: Firefox (all desktop platforms)
How: A memory error in the JavaScript engine allows attackers to crash the browser or run malicious code with browser privileges.
Action: Update Firefox to version 150 or later via Help > About Firefox.
Urgency: Immediately
Confidence
35%
CVE-2026-6758
Impacted: Firefox and Firefox ESR (all desktop platforms)
How: A memory error in the JavaScript engine can cause the browser to crash or potentially execute malicious code.
Action: Update to Firefox 150 or Firefox ESR 140.10 or later through your browser's update menu.
Urgency: Immediately
Confidence
35%
CVE-2026-6757
Impacted: Firefox for Android
How: A security protection in the browser can be bypassed, allowing attackers to circumvent built-in defenses.
Action: Update Firefox for Android to version 150 or later immediately through the Google Play Store.
Urgency: Immediately
Confidence
35%
CVE-2026-6756
Impacted: Firefox browser versions before 150
How: A bad actor could bypass Firefox's security protections for cross-window messaging to access data they should not.
Action: Update Firefox to version 150 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6755
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 115.35 and 140.10
How: A bad actor could crash your browser or potentially run malicious code by exploiting freed memory in Firefox's JavaScript engine.
Action: Update Firefox to version 150 or later; if using ESR, update to 115.35 or 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6754
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 140.10
How: A bad actor could crash your browser or trigger unexpected behavior by sending malformed data to Firefox's video calling component.
Action: Update Firefox to version 150 or later; if using ESR, update to 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6753
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 115.35 and 140.10
How: A bad actor could crash your browser or trigger unexpected behavior by sending malformed data to Firefox's video calling component.
Action: Update Firefox to version 150 or later; if using ESR, update to 115.35 or 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6752
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 140.10
How: A bad actor could read sensitive data from your browser's memory through uninitialized audio/video codec processing.
Action: Update Firefox to version 150 or later; if using ESR, update to 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6751
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 115.35 and 140.10
How: A bad actor could gain elevated privileges on your system by exploiting a flaw in Firefox's graphics rendering engine.
Action: Update Firefox to version 150 or later immediately; if using ESR, update to 115.35 or 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6750
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 115.35 and 140.10
How: A bad actor could extract confidential information by reading uninitialized memory through canvas graphics operations.
Action: Update Firefox to version 150 or later; if using ESR, update to 115.35 or 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6749
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 140.10
How: A bad actor could read sensitive data from your browser's memory through uninitialized audio/video codec processing.
Action: Update Firefox to version 150 or later; if using ESR, update to 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6748
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 140.10
How: A bad actor could crash your browser or potentially run malicious code by exploiting freed memory in Firefox's video calling features.
Action: Update Firefox to version 150 or later; if using ESR, update to 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6747
Impacted: Firefox browser versions before 150, and Firefox ESR versions before 115.35 and 140.10
How: A bad actor could crash your browser or potentially run malicious code by exploiting memory that was already freed in Firefox's core HTML processing.
Action: Update Firefox to version 150 or later immediately; if using ESR, update to 115.35 or 140.10 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6746
Impacted: NanoMQ MQTT Broker versions before 0.24.11
How: An attacker can send a specially crafted web request to NanoMQ's REST API to trigger a memory corruption bug that could crash the service or potentially run malicious code.
Action: Update NanoMQ immediately to version 0.24.11 or later; if you use NanoMQ, verify your installed version now.
Urgency: Immediately — this affects your messaging infrastructure and can be exploited remotely
Confidence
35%
CVE-2026-32135
Impacted: OpenClaw npm package versions before 2026.4.10
How: A bad actor could trick OpenClaw's security checks into allowing access to internal servers by manipulating DNS responses, bypassing the hostname validation that protects against internal network attacks.
Action: Update OpenClaw to version 2026.4.10 or later. This is less urgent than vulnerability #1 but should be done in your next maintenance window.
Urgency: Within 1 week — update at the same time as the critical fix
Confidence
10%
Impacted: OpenClaw npm package versions before 2026.4.10
How: A bad actor on your network could access the browser's debugging tools (DevTools protocol) because OpenClaw's sandbox relay listens on all network interfaces instead of just localhost.
Action: Update OpenClaw to version 2026.4.10 or later immediately. Check your package.json or npm list to verify your current version.
Urgency: Immediately — this exposes internal debugging capabilities to anyone on your network
Confidence
10%
Impacted: Google Chrome on Android prior to version 147.0.7727.101
How: A malicious website can trigger a memory error in Chrome's permission system on Android phones; if a user interacts with the page, an attacker can execute code.
Action: Update Chrome to version 147.0.7727.101 or later immediately. Open Google Play Store, search for Chrome, and tap Update.
Urgency: Immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-6315
Impacted: Google Chrome on all platforms prior to version 147.0.7727.101
How: If an attacker already compromised Chrome's graphics processor, they can use a memory error to fully escape the sandbox and access your system.
Action: Update Chrome to version 147.0.7727.101 or later immediately. Go to Menu > Help > About Google Chrome and let it auto-update, then restart.
Urgency: Immediately
Confidence
60%
CVSS: 8.3/10CVE-2026-6314
Impacted: Google Chrome on all platforms prior to version 147.0.7727.101
How: If an attacker compromised Chrome, they could use a CORS policy flaw to steal data from websites you visit simultaneously.
Action: Update Chrome to version 147.0.7727.101 or later at your next convenience; no immediate action required.
Urgency: Next time you update Chrome
Confidence
50%
CVSS: 3.1/10CVE-2026-6313
Impacted: Google Chrome on all platforms prior to version 147.0.7727.101
How: If an attacker compromised Chrome, they could potentially steal your stored passwords by bypassing Chrome's cross-site protections.
Action: Update Chrome to version 147.0.7727.101 or later at your next convenience; no immediate action required.
Urgency: Next time you update Chrome
Confidence
50%
CVSS: 3.1/10CVE-2026-6312
Impacted: Google Chrome on Windows prior to version 147.0.7727.101
How: If an attacker already compromised part of Chrome, they can use an uninitialized memory error in accessibility features to fully escape the sandbox on Windows systems.
Action: Update Chrome to version 147.0.7727.101 or later immediately. Go to Menu > Help > About Google Chrome and let it auto-update, then restart.
Urgency: Immediately
Confidence
60%
CVSS: 8.3/10CVE-2026-6311
Impacted: Google Chrome on all platforms prior to version 147.0.7727.101
How: If an attacker already compromised part of Chrome, they can use a memory error in Chrome's graphics layer to fully escape the sandbox and access your system.
Action: Update Chrome to version 147.0.7727.101 or later immediately. Go to Menu > Help > About Google Chrome and let it auto-update, then restart.
Urgency: Immediately
Confidence
60%
CVSS: 8.3/10CVE-2026-6310
Impacted: Google Chrome on all platforms prior to version 147.0.7727.101
How: If an attacker already compromised part of Chrome, they can use a memory error in the rendering system to fully escape Chrome's sandbox and access your system.
Action: Update Chrome to version 147.0.7727.101 or later immediately. Go to Menu > Help > About Google Chrome and let it auto-update, then restart.
Urgency: Immediately
Confidence
60%
CVSS: 8.3/10CVE-2026-6309
Impacted: Google Chrome on all platforms prior to version 147.0.7727.101
How: A malicious website can trigger a memory error in Chrome's media handling if a user clicks or interacts with specific page elements, allowing code execution.
Action: Update Chrome to version 147.0.7727.101 or later immediately. Go to Menu > Help > About Google Chrome and let it auto-update, then restart.
Urgency: Immediately
Confidence
35%
CVE-2026-6308
Impacted: Google Chrome on all platforms prior to version 147.0.7727.101
How: A specially crafted website can confuse Chrome's JavaScript engine into running malicious code within the browser's security sandbox.
Action: Update Chrome to version 147.0.7727.101 or later immediately. Go to Menu > Help > About Google Chrome and let it auto-update, then restart.
Urgency: Immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-6307
Impacted: Google Chrome on all platforms prior to version 147.0.7727.101
How: A malicious PDF file can cause a memory error in Chrome's PDF viewer, allowing an attacker to run malicious code within Chrome's restricted sandbox.
Action: Update Chrome to version 147.0.7727.101 or later immediately. Go to Menu > Help > About Google Chrome and let it auto-update, then restart.
Urgency: Immediately
Confidence
35%
CVE-2026-6306
Impacted: Google Chrome versions before 147.0.7727.101
How: A malicious PDF file can execute code inside Chrome's sandbox by crashing the PDF processor's memory buffer.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later. Avoid opening PDFs from untrusted sources until updated.
Urgency: Immediately
Confidence
35%
CVE-2026-6305
Impacted: Google Chrome versions before 147.0.7727.101
How: An attacker with control of the Chrome renderer can exploit freed memory in font handling to break out of the sandbox and take over your computer.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
60%
CVSS: 8.3/10CVE-2026-6304
Impacted: Google Chrome versions before 147.0.7727.101
How: A malicious website can execute malicious code inside Chrome's sandbox by exploiting freed memory in audio codec handling.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6303
Impacted: Google Chrome versions before 147.0.7727.101
How: A malicious website can execute malicious code inside Chrome's sandbox by exploiting freed memory in video playback.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-6302
Impacted: Google Chrome versions before 147.0.7727.101
How: A malicious website can execute malicious code inside Chrome's sandbox by confusing Chrome's JavaScript engine about data types.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-6301
Impacted: Google Chrome versions before 147.0.7727.101
How: A malicious website can execute malicious code inside Chrome's sandbox by exploiting freed memory in the CSS parser.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-6300
Impacted: Google Chrome versions before 147.0.7727.101
How: A malicious website can execute malicious code on your computer by exploiting freed memory in Chrome's preload feature.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-6299
Impacted: Google Chrome versions before 147.0.7727.101
How: A malicious website can crash Chrome's drawing system and read sensitive data from your computer's memory.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6298
Impacted: Google Chrome versions before 147.0.7727.101
How: An attacker with network access can trick Chrome into using freed memory in its proxy system and escape the browser sandbox.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
60%
CVSS: 8.3/10CVE-2026-6297
Impacted: Google Chrome versions before 147.0.7727.101
How: A malicious website can crash Chrome's graphics system and break out of the browser's safety sandbox, potentially taking over your computer.
Action: Update Chrome immediately — go to Settings > About Chrome and install version 147.0.7727.101 or later.
Urgency: Immediately
Confidence
35%
CVE-2026-6296
Impacted: goshs file-sharing application with authenticated users
How: An attacker can trick a logged-in user into deleting files or creating folders by sending them a specially crafted link, since the app doesn't prevent cross-site attacks on state-changing actions.
Action: Update goshs to the latest version; users should avoid clicking untrusted links while logged in to goshs.
Urgency: Next time you update, no immediate rush
Confidence
10%
Impacted: Applications using Go Markdown library with SmartypantsRenderer
How: An attacker can send malformed text with incomplete angle brackets to crash the application or read memory it shouldn't access.
Action: Update the Go Markdown library to the latest patched version; check your dependencies if you use this library.
Urgency: Within 24 hours
Confidence
20%
CVSS: 7.5/10
Impacted: Siemens Industrial Edge Management systems (Pro V1, Pro V2, and Virtual editions)
How: The management system fails to properly control access, potentially allowing an attacker to gain unauthorized access to critical industrial control systems and data.
Action: If you use Industrial Edge Management, update immediately to Pro V1 (V1.15.17+), Pro V2 (V2.1.1+), or Virtual (V2.8.0+). Contact your IT team or Siemens support if you are unsure of your version.
Urgency: Within 24 hours — this is a serious access control flaw in industrial systems
Confidence
50%
CVSS: 7.1/10CVE-2026-33892
Impacted: Siemens engineering software including Solid Edge, Simcenter 3D, Simcenter STAR-CCM+, and related tools
How: A flaw exists in these design and simulation tools, but the risk is minimal and unlikely to be exploited by attackers.
Action: Update affected Siemens products to the patched versions (Solid Edge SE2025 to Update 13 or later, Simcenter STAR-CCM+ to V2602 or later) during your next scheduled maintenance window.
Urgency: Next time you update — no immediate action required
Confidence
50%
CVSS: 3.7/10CVE-2025-40745
Impacted: phpseclib library (SSH2 component)
How: An attacker with network access could potentially forge SSH packet authentication through timing analysis, but only if your software uses this specific library.
Action: If you use phpseclib for SSH connections, update to the latest version. Most businesses do not use this library directly.
Urgency: no rush — this is a low-risk timing attack
Confidence
50%
CVSS: 3.7/10CVE-2026-40194
Impacted: Microsoft Edge (Chromium-based)
How: An attacker could disguise malicious information in Edge's user interface to deceive you into trusting a fake website or request.
Action: No immediate action needed — update Edge when prompted. Be cautious of unusual security warnings or prompts.
Urgency: next time you update
Confidence
50%
CVSS: 5.4/10CVE-2026-33119
Impacted: Microsoft Edge (Chromium-based)
How: An attacker could trick you by making a fake website or address bar look legitimate, but the underlying connection is not verified.
Action: No immediate action needed — this will be fixed in the next Edge update. Keep auto-updates enabled.
Urgency: next time you update
Confidence
50%
CVSS: 4.3/10CVE-2026-33118
Impacted: PraisonAI Browser Server (any installation running `praisonai browser start`)
How: An attacker on your network can connect to the unprotected WebSocket endpoint and take control of your browser automation sessions, potentially stealing data or executing malicious actions.
Action: Stop using PraisonAI Browser Server immediately until a patch is available; if you must use it, restrict network access to 127.0.0.1 only and never expose it to untrusted networks.
Urgency: Immediately
Confidence
30%
CVSS: 9.1/10
Impacted: Juniper Networks Junos OS on EX4k and QFX5k Series switches
How: An attacker on the same network can send packets that cause the packet forwarding engine to crash, completely disabling network traffic through the switch.
Action: Check which Juniper switch models you operate; if you have EX4k or QFX5k devices, request a security update from Juniper.
Urgency: Within the next maintenance window — prioritize if these switches are critical to your network
Confidence
50%
CVSS: 6.5/10CVE-2026-33781
Impacted: Juniper Networks Junos OS and Junos OS Evolved (Layer 2 networking)
How: An attacker on the same network can trigger a memory leak in the address learning service, eventually causing the device to run out of memory and stop working.
Action: Contact your Juniper support team to verify patch availability for your specific OS version and device model.
Urgency: Within the next maintenance window — schedule an update but not immediately critical
Confidence
50%
CVSS: 6.5/10CVE-2026-33780
Impacted: Juniper Networks Junos OS on MX Series routers
How: An attacker on the same network can send a specially crafted packet to crash the subscriber management service, disrupting service for customers.
Action: Contact your Juniper support team to check if your MX Series routers are affected and apply the security patch when available.
Urgency: Within the next maintenance window — not an emergency but should be scheduled soon
Confidence
50%
CVSS: 6.5/10CVE-2026-33775
Impacted: Wasmtime runtime on ARM64 (aarch64) processors running untrusted WebAssembly code
How: A malicious WebAssembly program can escape the sandbox and access memory it should not have access to, potentially allowing an attacker to take control of the system running Wasmtime.
Action: Update Wasmtime immediately to the latest patched version; if you run untrusted WebAssembly code (e.g., cloud functions, plugins), treat this as a security emergency
Urgency: Immediately
Confidence
35%
CVE-2026-34971
Impacted: Websites and applications using the Unhead library for head tag management
How: An attacker can inject malicious code into web pages by disguising dangerous links using hidden HTML entity encoding, bypassing safety checks meant to prevent this.
Action: Update Unhead to the patched version when available; if you maintain a website using Unhead, check with your development team immediately
Urgency: Within 24 hours if you use this library; otherwise no rush
Confidence
50%
CVSS: 6.1/10CVE-2026-39315
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage can access freed memory in Chrome's navigation system to run malicious code within the browser's security sandbox.
Action: Update Chrome to version 147.0.7727.55 or later. Go to Chrome menu > About Google Chrome to check for updates.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-5877
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage can analyze your browsing behavior to steal data from other websites you visit.
Action: Update Chrome to version 147.0.7727.55 or later. Go to Chrome menu > About Google Chrome to check for updates.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-5876
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage can fake Chrome interface elements to trick you into thinking you are seeing a legitimate dialog or button.
Action: Update Chrome to version 147.0.7727.55 or later. Go to Chrome menu > About Google Chrome to check for updates.
Urgency: Within 24 hours
Confidence
35%
CVE-2026-5875
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage combined with user clicks can potentially escape Chrome's security sandbox and affect the rest of your computer.
Action: Update Chrome to version 147.0.7727.55 or later immediately using Chrome menu > About Google Chrome. Avoid clicking unexpected dialogs or prompts on websites.
Urgency: Immediately
Confidence
35%
CVE-2026-5874
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage can read and modify data in Chrome's JavaScript engine to run malicious code within the browser's security sandbox.
Action: Update Chrome to version 147.0.7727.55 or later immediately using Chrome menu > About Google Chrome.
Urgency: Immediately
Confidence
35%
CVE-2026-5873
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage can access already-freed memory in Chrome's webpage engine to run malicious code within the browser's security sandbox.
Action: Update Chrome to version 147.0.7727.55 or later immediately using Chrome menu > About Google Chrome.
Urgency: Immediately
Confidence
35%
CVE-2026-5872
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage can trick Chrome's JavaScript engine into running malicious code within the browser's security sandbox.
Action: Update Chrome to version 147.0.7727.55 or later immediately using Chrome menu > About Google Chrome.
Urgency: Immediately
Confidence
35%
CVE-2026-5871
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage can exploit Chrome's graphics library to run malicious code within the browser's security sandbox.
Action: Update Chrome to version 147.0.7727.55 or later immediately using Chrome menu > About Google Chrome.
Urgency: Immediately
Confidence
35%
CVE-2026-5870
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious webpage can read sensitive data from your Chrome process memory, potentially exposing passwords, tokens, or personal information.
Action: Update Chrome to version 147.0.7727.55 or later immediately using Chrome menu > About Google Chrome.
Urgency: Immediately
Confidence
35%
CVE-2026-5869
Impacted: Google Chrome on Mac versions before 147.0.7727.55
How: A malicious webpage can crash Chrome's graphics system and run malicious code within the browser's security sandbox.
Action: Update Chrome to version 147.0.7727.55 or later immediately. Go to Chrome menu > About Google Chrome to check your version and auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5868
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can steal sensitive data from Chrome's memory via the WebML system.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5867
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can run malicious code within Chrome's restricted sandbox area via the media player.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5866
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can run malicious code within Chrome's restricted sandbox area by confusing the JavaScript engine about data types.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5865
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can steal sensitive data from Chrome's memory via the audio processing system.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5864
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can run malicious code within Chrome's restricted sandbox area via the JavaScript engine.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5863
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can run malicious code within Chrome's restricted sandbox area via the JavaScript engine.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5862
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can run malicious code within Chrome's restricted sandbox area via the JavaScript engine.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5861
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can run malicious code within Chrome's restricted sandbox area via video/audio handling.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5860
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can exploit a math error to corrupt Chrome's memory and potentially run malicious code.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5859
Impacted: Google Chrome versions before 147.0.7727.55
How: A malicious website can crash Chrome's memory system and run malicious code when you visit it.
Action: Update Chrome immediately to version 147.0.7727.55 or later. Go to Chrome menu > Help > About Google Chrome and it will auto-update.
Urgency: Immediately
Confidence
35%
CVE-2026-5858
Impacted: PraisonAI Python library (all versions with vulnerable execute_code function)
How: A bad actor can escape the sandbox protection and run unrestricted code on your server by exploiting exception frame traversal, potentially stealing data or taking control of the system.
Action: Immediately stop using PraisonAI or disable the execute_code function until the vendor releases a patched version. Check your PraisonAI version and upgrade as soon as a fix is available. Do not run untrusted code through PraisonAI.
Urgency: Immediately — this is a confirmed sandbox escape with CVSS 10
Confidence
60%
CVSS: 10/10CVE-2026-39888
Impacted: Firefox below version 149.0.2 and Thunderbird below version 149.0.2
How: A bad actor can exploit memory bugs to run malicious code on your computer with full control, potentially stealing passwords, files, or installing spyware.
Action: Update Firefox and Thunderbird to version 149.0.2 or later; go to Help > About to auto-update.
Urgency: immediately
Confidence
60%
CVSS: 9.8/10CVE-2026-5735
Impacted: Firefox versions below 149.0.2, Firefox ESR below 140.9.1, Thunderbird below 149.0.2, and Thunderbird ESR below 140.9.1
How: A bad actor can exploit memory bugs to run malicious code on your computer with full control, potentially stealing passwords, files, or installing spyware.
Action: Update Firefox and Thunderbird to the latest version now—go to Help > About and let it auto-update, or download the latest version from mozilla.org.
Urgency: immediately
Confidence
60%
CVSS: 9.8/10CVE-2026-5734
Impacted: Firefox below version 149.0.2 and Thunderbird below version 149.0.2
How: A flaw in the WebGPU graphics component could allow an attacker to crash your browser or run harmful code through a malicious website.
Action: Update Firefox and Thunderbird to version 149.0.2 or later; go to Help > About to auto-update.
Urgency: immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-5733
Impacted: Firefox versions below 149.0.2, Firefox ESR below 140.9.1, Thunderbird below 149.0.2, and Thunderbird ESR below 140.9.1
How: A flaw in how text is rendered could allow an attacker to crash your browser or execute malicious code through a specially crafted webpage.
Action: Update Firefox and Thunderbird to version 149.0.2 or later; check Help > About in each application.
Urgency: immediately
Confidence
60%
CVSS: 8.8/10CVE-2026-5732
Impacted: Firefox versions below 149.0.2, Firefox ESR versions below 140.9.1, Thunderbird versions below 149.0.2, and Thunderbird ESR below 140.9.1
How: A bad actor can exploit memory bugs to run malicious code on your computer with full control, potentially stealing passwords, files, or installing spyware.
Action: Update Firefox and Thunderbird to the latest version now—go to Help > About and let it auto-update, or download the latest version from mozilla.org.
Urgency: immediately
Confidence
60%
CVSS: 9.8/10CVE-2026-5731
Impacted: Pega Robotic Automation version 22.1 and R25 users running automations in Google Chrome or Microsoft Edge
How: A malicious website could trick the Pega Browser Extension into writing files to your computer, potentially installing harmful software or stealing data.
Action: Update Pega Robotic Automation to the latest patched version immediately; check your version in Pega settings.
Urgency: immediately
Confidence
35%
CVE-2026-1078
Impacted: Gotenberg document conversion service with extraHttpHeaders scope feature enabled
How: An attacker with access to Gotenberg can supply a specially crafted text pattern that causes the service to freeze indefinitely, effectively shutting down the server and blocking legitimate document conversions.
Action: Update Gotenberg to the patched version immediately; if you use Gotenberg, check your version against the security advisory and apply updates; restrict who can access the extraHttpHeaders feature to trusted users only
Urgency: Within 24 hours
Confidence
35%
CVE-2026-35458
Impacted: Any application using the Lupa library (Python-Lua integration tool) to run untrusted Lua code
How: An attacker can bypass security filters and gain direct access to sensitive Python functions and data, potentially executing arbitrary code on your server.
Action: Update Lupa to the latest patched version immediately. Check your dependencies list (requirements.txt, package.json, or equivalent) to confirm Lupa is listed and update it now. If you're unsure whether your application uses Lupa, contact your development team.
Urgency: Immediately — this is a sandbox escape with remote code execution risk
Confidence
35%
CVE-2026-34444