Dark Reading Confidential Episode 14: How curious, ethical problem-solving can continue to serve as a guiding principle for an evolving cybersecurity sector.
TrendAI™ Research provides a technical analysis of a compromised EmEditor installer used to deliver multistage malware that performs a range of malicious actions.
A vulnerability was found in Intermesh groupoffice up to 6.8.148/25.0.79. It has been classified as problematic. This impacts an unknown function of the component File Handler. The manipulation leads to cross site scripting.
This vulnerability is listed as CVE-2026-23887. The attack may be initiated remotely. There is no available exploit.
Upgrading the affected component is recommended.
A vulnerability was found in argoproj argo-workflows up to 3.6.16/3.7.7 and classified as problematic. This affects an unknown function of the component Artifact Directory Listing Handler. Executing a manipulation can lead to cross site scripting.
This vulnerability is tracked as CVE-2026-23960. The attack can be launched remotely. No exploit exists.
It is suggested to upgrade the affected component.
A vulnerability has been found in cvat up to 2.54.x and classified as problematic. The impacted element is an unknown function. Performing a manipulation results in privilege defined with unsafe actions.
This vulnerability is identified as CVE-2026-23526. The attack can be initiated remotely. There is not any exploit available.
The affected component should be upgraded.
A vulnerability, which was classified as very critical, was found in fleetdm fleet up to 4.53.2/4.75.1/4.76.1/4.77.0/4.78.2. The affected element is an unknown function. Such manipulation leads to improper verification of cryptographic signature.
This vulnerability is referenced as CVE-2026-23518. It is possible to launch the attack remotely. No exploit is available.
You should upgrade the affected component.
A vulnerability, which was classified as very critical, has been found in fleetdm fleet up to 4.53.2/4.75.1/4.76.1/4.77.0/4.78.2. Impacted is an unknown function. This manipulation causes missing authorization.
The identification of this vulnerability is CVE-2026-23517. It is possible to initiate the attack remotely. There is no exploit available.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Laravel reverb up to 1.6.x. This issue affects the function unserialize. The manipulation results in deserialization.
This vulnerability was named CVE-2026-23524. The attack may be performed from remote. There is no available exploit.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in zhblue hustoj up to 26.01.01. This vulnerability affects the function ranklist_export. The manipulation of the argument Nickname leads to csv injection.
This vulnerability is uniquely identified as CVE-2026-23873. The attack is possible to be carried out remotely. No exploit exists.
A vulnerability described as critical has been identified in Ceph. This affects an unknown part of the component Pybind. Executing a manipulation can lead to improper certificate validation.
This vulnerability is handled as CVE-2024-31884. The attack can be executed remotely. There is not any exploit available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in copier up to 9.11.1. Affected by this issue is the function _preserve_symlinks. Performing a manipulation results in symlink following.
This vulnerability is known as CVE-2026-23968. Attacking locally is a requirement. No exploit is available.
It is suggested to upgrade the affected component.
A vulnerability labeled as critical has been found in Backstage up to 0.12.1/0.13.1/0.14.0. Affected by this vulnerability is an unknown functionality of the component Request Header Handler. Such manipulation leads to server-side request forgery.
This vulnerability is traded as CVE-2026-24048. The attack may be launched remotely. There is no exploit available.
The affected component should be upgraded.
A vulnerability identified as problematic has been detected in fleetdm fleet up to 4.53.2/4.76.1/4.77.0/4.78.1. Affected is the function FLEET::auth_token of the component Authentication Token Handler. This manipulation causes cross site scripting.
This vulnerability appears as CVE-2026-22808. The attack may be initiated remotely. There is no available exploit.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in Docmost up to 0.23.x. This impacts the function mermaid.render of the component Mermaid Diagram Handler. The manipulation results in cross site scripting.
This vulnerability is reported as CVE-2026-23630. The attack can be launched remotely. No exploit exists.
It is advisable to upgrade the affected component.
A vulnerability was found in copier up to 9.11.1. It has been rated as critical. This affects the function _preserve_symlinks. The manipulation leads to symlink following.
This vulnerability is documented as CVE-2026-23986. The attack needs to be performed locally. There is not any exploit available.
Upgrading the affected component is advised.
A vulnerability was found in Saleor up to 3.20.107/3.21.42/3.22.26. It has been declared as problematic. The impacted element is an unknown function of the component Refresh Token Handler. Executing a manipulation can lead to improper neutralization of script in attributes in a web page.
This vulnerability is registered as CVE-2026-22849. It is possible to launch the attack remotely. No exploit is available.
It is recommended to upgrade the affected component.
A vulnerability was found in lxsmnsyc seroval up to 1.4.0. It has been classified as critical. The affected element is an unknown function. Performing a manipulation results in improperly controlled modification of object prototype attributes.
This vulnerability is cataloged as CVE-2026-23736. It is possible to initiate the attack remotely. There is no exploit available.
Upgrading the affected component is recommended.
A vulnerability was found in anthropics claude-code up to 2.0.64 and classified as problematic. Impacted is an unknown function. Such manipulation leads to insufficiently protected credentials.
This vulnerability is listed as CVE-2026-21852. The attack may be performed from remote. There is no available exploit.
It is suggested to upgrade the affected component.