ShadowByt3s Claims Starbucks Breach With 10GB of Proprietary Source Code, Beverage Machine Firmware, and Global Management Tools From Compromised S3 Bucket
The Computer Emergency Response Team of Ukraine (CERT-UA) has disclosed details of a new phishing campaign in which the cybersecurity agency itself was impersonated to distribute a remote administration tool known as AGEWHEEZE.
As part of the attacks, the threat actors, tracked as UAC-0255, sent emails on March 26 and 27, 2026, posing as CERT-UA to distribute a password-protected ZIP archive
A vulnerability labeled as critical has been found in huimeicloud hm_editor up to 2.2.3. Impacted is the function client.get of the file src/mcp-server.js of the component image-to-base64 Endpoint. Executing a manipulation of the argument url can lead to server-side request forgery.
This vulnerability is registered as CVE-2026-5346. It is possible to launch the attack remotely. Furthermore, an exploit is available.
The vendor was contacted early about this disclosure but did not respond in any way.
Alleged Breach of Smarteez Exposes Full Production Database for L'Oreal Morocco Including 296 Pharmacies, 361K Sales Records, OAuth Secrets, and Competitive Intelligence Across Four L'Oreal Brands
A vulnerability identified as problematic has been detected in Sage DPW 2025_06_004. This issue affects some unknown processing of the component Login. Performing a manipulation results in observable response discrepancy.
This vulnerability is cataloged as CVE-2025-67807. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability categorized as critical has been discovered in Lakeside SysTrack Agent. This vulnerability affects unknown code. Such manipulation leads to race condition.
This vulnerability is listed as CVE-2026-35099. The attack must be carried out locally. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability was found in OpenClaw up to 2026.3.21. It has been rated as problematic. This affects an unknown part of the component Path Validation Handler. This manipulation causes improper resolution of path equivalence.
This vulnerability is tracked as CVE-2026-34510. The attack is possible to be carried out remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability was found in TOTOLINK A3600R 5.9c.4959. It has been declared as critical. Affected by this issue is the function setAppEasyWizardConfig in the library /lib/cste_modules/app.so. The manipulation of the argument rootSsid results in buffer overflow.
This vulnerability is identified as CVE-2026-31027. The attack can be executed remotely. There is not any exploit available.
A vulnerability was found in Textpattern up to 4.9.1. It has been classified as critical. Affected by this vulnerability is the function mt_uploadImage of the file rpc/TXP_RPCServer.php of the component XML-RPC Handler. The manipulation of the argument file.name leads to path traversal.
This vulnerability is referenced as CVE-2026-5344. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
The vendor confirmed the issue and will provide a fix in the upcoming release.