rescana.com
Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-19.
| Date Added | Resource | Excerpt |
|---|---|---|
| 2026-04-19 2026 | Critical Apache Tika CVE-2025-66516: XXE VulnerabilityXXE | Critical Apache Tika CVE-2025-66516: XXE Vulnerability |
| 2026-04-17 2026 | Critical Supply Chain Attack on EssentialPlugin WordPress Suite Exposes Over 400000 Websites to MalwareSupply Chain | Critical Supply Chain Attack on EssentialPlugin WordPress Suite Exposes Over 400,000 Websites to Malware https://ift.tt/M81ZeVc |
| 2026-04-17 2026 | April 2026 Patch Tuesday: Critical Vulnerabilities in SAP Adobe Microsoft SharePoint Fortinet and ColdFusion Threaten Enterprise SecuritySQLi | April 2026 Patch Tuesday: Critical Vulnerabilities in SAP, Adobe, Microsoft SharePoint, Fortinet, and ColdFusion Threaten Enterprise Security https://ift.tt/pSCZi9I |
| 2026-04-14 2026 | CPUID Supply Chain Attack: STX RAT Malware Distributed via Trojanized CPU-Z and HWMonitor DownloadsSupply Chain | CPUID Supply Chain Attack: STX RAT Malware Distributed via Trojanized CPU-Z and HWMonitor Downloads https://ift.tt/hWujPIn |
| 2026-04-12 2026 | Google Chrome 147 Security Update: Patches 60 Vulnerabilities Including Critical WebML Remote Code Execution FRCE | Google Chrome 147 Security Update: Patches 60 Vulnerabilities Including Critical WebML Remote Code Execution F https://ift.tt/yJBTPwY |
| 2026-04-12 2026 | Critical Marimo Python Notebook RCE Vulnerability (CVE-2026-39987) Exploited Within 10 Hours of DisclosureRCE | Critical Marimo Python Notebook RCE Vulnerability (CVE-2026-39987) Exploited Within 10 Hours of Disclosure https://ift.tt/OU9auKp |
| 2026-01-19 2026 | Critical XSS Vulnerability in StealC Malware Admin Panel Allows Researchers to Infiltrate and Monitor Threat Actor OperationsXSS | A critical XSS vulnerability in the StealC malware admin panel has been discovered, enabling researchers to infiltrate and monitor threat actor operations. This vulnerability allows for unauthorized access and surveillance of malicious activities. Researchers can exploit this flaw to gain insights into the operations of threat actors using the StealC malware. This discovery highlights the importance of addressing security vulnerabilities promptly to prevent unauthorized access and monitor malicious activities effectively. |