SEVEN.LEGEND // V4
Users Online: 1
Total Hits: 8,846
RSS // DATA STREAM
DATA STREAMS // RSS AGGREGATOR
0day Fans
Troy Hunt
USOM Threat Intel
Welive Security
The Hacker News
Zero Day Initiative
HackRead
Coin Telegraph
Bitcoinist RSS
ZDI: Published Advisories
The following is a list of publicly disclosed vulnerabilities discovered by
Zero Day Initiative researchers. While the affected vendor is working on a patch for these
vulnerabilities, TrendAI customers are protected from exploitation by security filters
delivered ahead of public disclosure. All security vulnerabilities that are acquired by the
Zero Day Initiative are handled according to the ZDI Disclosure Policy.
DATE: 2026.04.15 // 05:00
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of QNAP TS-453E devices. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following C...
ACCESS DATA >>
DATE: 2026.04.15 // 05:00
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NI LabVIEW. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI ...
ACCESS DATA >>
DATE: 2026.04.15 // 05:00
This vulnerability allows remote attackers to execute arbitrary code on affected installations of NI LabVIEW. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI ...
ACCESS DATA >>
DATE: 2026.04.15 // 05:00
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability. The ZDI...
ACCESS DATA >>
DATE: 2026.04.15 // 05:00
This vulnerability allows remote attackers to disclose sensitive information on affected installations of DriveLock. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.5. The following CVEs are assigned:...
ACCESS DATA >>
DATE: 2026.04.15 // 05:00
This vulnerability allows remote attackers to disclose sensitive information on affected installations of DriveLock. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.5. The following CVEs are assig...
ACCESS DATA >>
DATE: 2026.04.15 // 05:00
This vulnerability allows remote attackers to escalate privileges on affected installations of DriveLock. Authentication is required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2026-5...
ACCESS DATA >>