appsec.fyi · Sources

rescana.com

7 curated AppSec resources from rescana.com across 5 topics on appsec.fyi.

rescana.com

Resources curated from this publisher and indexed across appsec.fyi topic pages. Last item added: 2026-04-19.

Date Added Resource Excerpt
2026-04-19 2026Critical Apache Tika CVE-2025-66516: XXE VulnerabilityXXECritical Apache Tika CVE-2025-66516: XXE Vulnerability
2026-04-17 2026Critical Supply Chain Attack on EssentialPlugin WordPress Suite Exposes Over 400000 Websites to MalwareSupply ChainCritical Supply Chain Attack on EssentialPlugin WordPress Suite Exposes Over 400,000 Websites to Malware https://ift.tt/M81ZeVc
2026-04-17 2026April 2026 Patch Tuesday: Critical Vulnerabilities in SAP Adobe Microsoft SharePoint Fortinet and ColdFusion Threaten Enterprise SecuritySQLiApril 2026 Patch Tuesday: Critical Vulnerabilities in SAP, Adobe, Microsoft SharePoint, Fortinet, and ColdFusion Threaten Enterprise Security https://ift.tt/pSCZi9I
2026-04-14 2026CPUID Supply Chain Attack: STX RAT Malware Distributed via Trojanized CPU-Z and HWMonitor DownloadsSupply ChainCPUID Supply Chain Attack: STX RAT Malware Distributed via Trojanized CPU-Z and HWMonitor Downloads https://ift.tt/hWujPIn
2026-04-12 2026Google Chrome 147 Security Update: Patches 60 Vulnerabilities Including Critical WebML Remote Code Execution FRCEGoogle Chrome 147 Security Update: Patches 60 Vulnerabilities Including Critical WebML Remote Code Execution F https://ift.tt/yJBTPwY
2026-04-12 2026Critical Marimo Python Notebook RCE Vulnerability (CVE-2026-39987) Exploited Within 10 Hours of DisclosureRCECritical Marimo Python Notebook RCE Vulnerability (CVE-2026-39987) Exploited Within 10 Hours of Disclosure https://ift.tt/OU9auKp
2026-01-19 2026Critical XSS Vulnerability in StealC Malware Admin Panel Allows Researchers to Infiltrate and Monitor Threat Actor OperationsXSSA critical XSS vulnerability in the StealC malware admin panel has been discovered, enabling researchers to infiltrate and monitor threat actor operations. This vulnerability allows for unauthorized access and surveillance of malicious activities. Researchers can exploit this flaw to gain insights into the operations of threat actors using the StealC malware. This discovery highlights the importance of addressing security vulnerabilities promptly to prevent unauthorized access and monitor malicious activities effectively.