{
	"id": "9e0956e9-f0f3-4c66-80c7-90da4e72abf2",
	"created_at": "2026-04-06T02:10:54.980777Z",
	"updated_at": "2026-04-10T13:11:27.113277Z",
	"deleted_at": null,
	"sha1_hash": "0696183951820339371f79fa43b7be8ad099c110",
	"title": "NVD - Home",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 49686,
	"plain_text": "NVD - Home\r\nArchived: 2026-04-06 01:57:42 UTC\r\nCVE-2026-33545 - MobSF is a mobile application security testing tool used. Prior to version 4.4.6,\r\nMobSF's `read_sqlite()` function in `mobsf/MobSF/utils.py` (lines 542-566) uses Python string formatting\r\n(`%`) to construct SQL queries with table names read from a ... read CVE-2026-33545\r\nPublished: March 26, 2026; 5:17:06 PM -0400\r\nCVE-2026-33541 - TSPortal is the WikiTide Foundation’s in-house platform used by the Trust and Safety\r\nteam to manage reports, investigations, appeals, and transparency work. Prior to version 34, a flaw in\r\nTSPortal allowed attackers to create arbitrary user records... read CVE-2026-33541\r\nPublished: March 26, 2026; 5:17:05 PM -0400\r\nCVE-2026-2272 - A flaw was found in GIMP. An integer overflow vulnerability exists when processing\r\nICO image files, specifically in the `ico_read_info` and `ico_read_icon` functions. This issue arises\r\nbecause a size calculation for image buffers can wrap around d... read CVE-2026-2272\r\nPublished: March 26, 2026; 5:17:04 PM -0400\r\nCVE-2026-2239 - A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the\r\nfread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This\r\noccurs because the buffer allocated for a Pascal string is not properly... read CVE-2026-2239\r\nPublished: March 26, 2026; 5:17:04 PM -0400\r\nCVE-2026-34874 - An issue was discovered in Mbed TLS through 3.6.5 and 4.x through 4.0.0. There is a\r\nNULL pointer dereference in distinguished name parsing that allows an attacker to write to address 0.\r\nPublished: April 01, 2026; 3:16:33 PM -0400\r\nCVE-2026-0968 - A flaw was found in libssh in which a malicious SFTP (SSH File Transfer Protocol)\r\nserver can exploit this by sending a malformed 'longname' field within an `SSH_FXP_NAME` message\r\nduring a file listing operation. This missing null check can lead to... read CVE-2026-0968\r\nPublished: March 26, 2026; 5:17:01 PM -0400\r\nCVE-2025-66442 - In Mbed TLS through 4.0.0, there is a compiler-induced timing side channel (in RSA\r\nand CBC/ECB decryption) that only occurs with LLVM's select-optimize feature. TF-PSA-Crypto through\r\n1.0.0 is also affected.\r\nPublished: April 01, 2026; 4:16:22 PM -0400\r\nCVE-2026-34872 - An issue was discovered in Mbed TLS 3.5.x and 3.6.x through 3.6.5 and TF-PSA-Crypto 1.0. There is a lack of contributory behavior in FFDH due to improper input validation. Using\r\nfinite-field Diffie-Hellman, the other party can force the shared sec... read CVE-2026-34872\r\nPublished: April 01, 2026; 4:16:27 PM -0400\r\nhttps://nvd.nist.gov/\r\nPage 1 of 3\n\nCVE-2025-66486 - IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to HTML injection. A remote\r\nattacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web\r\nbrowser within the security context of the hosting site.\r\nPublished: April 01, 2026; 7:17:02 PM -0400\r\nCVE-2025-66485 - IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to HTTP header injection,\r\ncaused by improper validation of input by the HOST headers.  This could allow an attacker to conduct\r\nvarious attacks against the vulnerable system, including cross-site... read CVE-2025-66485\r\nPublished: April 01, 2026; 7:17:02 PM -0400\r\nCVE-2026-34758 - OneUptime is an open-source monitoring and observability platform. Prior to version\r\n10.0.42, unauthenticated access to Notification test and Phone Number management endpoints allows\r\nSMS/Call/Email/WhatsApp abuse and phone number purchase. This iss... read CVE-2026-34758\r\nPublished: April 02, 2026; 3:21:33 PM -0400\r\nCVE-2026-34752 - Haraka is a Node.js mail server. Prior to version 3.1.4, sending an email with\r\n__proto__: as a header name crashes the Haraka worker process. This issue has been patched in version\r\n3.1.4.\r\nPublished: April 02, 2026; 3:21:33 PM -0400\r\nCVE-2026-34745 - Fireshare facilitates self-hosted media and link sharing. Prior to version 1.5.3, the fix\r\nfor CVE-2026-33645 was applied to the authenticated /api/uploadChunked endpoint but was not applied to\r\nthe unauthenticated /api/uploadChunked/public endpoint... read CVE-2026-34745\r\nPublished: April 02, 2026; 3:21:33 PM -0400\r\nCVE-2025-66484 - IBM Aspera Shares 1.9.9 through 1.11.0 is vulnerable to stored cross-site scripting.\r\nThis vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended\r\nfunctionality potentially leading to credentials discl... read CVE-2025-66484\r\nPublished: April 01, 2026; 7:17:02 PM -0400\r\nCVE-2026-34742 - The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model\r\nContext Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based\r\nservers. When an HTTP-based MCP server is run on localhost without ... read CVE-2026-34742\r\nPublished: April 02, 2026; 3:21:33 PM -0400\r\nCVE-2025-66487 - IBM Aspera Shares 1.9.9 through 1.11.0 does not properly rate limit the frequency that\r\nan authenticated user can send emails, which could result in email flooding or a denial of service.\r\nPublished: April 01, 2026; 7:17:02 PM -0400\r\nCVE-2026-34730 - Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1,\r\nCopier's _external_data feature allows a template to load YAML files using template-controlled paths. If\r\nuntrusted templates are in scope, a malicious templa... read CVE-2026-34730\r\nPublished: April 02, 2026; 3:21:32 PM -0400\r\nCVE-2026-34726 - Copier is a library and CLI app for rendering project templates. Prior to version 9.14.1,\r\nCopier's _subdirectory setting is documented as the subdirectory to use as the template root. However, the\r\nhttps://nvd.nist.gov/\r\nPage 2 of 3\n\ncurrent implementation accepts parent-directory tr... read CVE-2026-34726\r\nPublished: April 02, 2026; 3:21:32 PM -0400\r\nCVE-2026-4252 - A vulnerability was identified in Tenda AC8 16.03.50.11. Affected by this issue is the\r\nfunction check_is_ipv6 of the component IPv6 Handler. The manipulation leads to reliance on ip address\r\nfor authentication. It is possible to initiate the attack... read CVE-2026-4252\r\nPublished: March 16, 2026; 1:16:32 PM -0400\r\nCVE-2024-40849 - A race condition was addressed with additional validation. This issue is fixed in\r\nmacOS Sequoia 15.1. An app may be able to break out of its sandbox.\r\nPublished: April 02, 2026; 3:17:57 PM -0400\r\nSource: https://nvd.nist.gov/\r\nhttps://nvd.nist.gov/\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"MITRE"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://nvd.nist.gov/"
	],
	"report_names": [
		"nvd.nist.gov"
	],
	"threat_actors": [
		{
			"id": "d90307b6-14a9-4d0b-9156-89e453d6eb13",
			"created_at": "2022-10-25T16:07:23.773944Z",
			"updated_at": "2026-04-10T02:00:04.746188Z",
			"deleted_at": null,
			"main_name": "Lead",
			"aliases": [
				"Casper",
				"TG-3279"
			],
			"source_name": "ETDA:Lead",
			"tools": [
				"Agentemis",
				"BleDoor",
				"Cobalt Strike",
				"CobaltStrike",
				"RbDoor",
				"RibDoor",
				"Winnti",
				"cobeacon"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775441454,
	"ts_updated_at": 1775826687,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/0696183951820339371f79fa43b7be8ad099c110.pdf",
		"text": "https://archive.orkl.eu/0696183951820339371f79fa43b7be8ad099c110.txt",
		"img": "https://archive.orkl.eu/0696183951820339371f79fa43b7be8ad099c110.jpg"
	}
}