Intuitive suffered a phishing attack leading to a data breach exposing customer, employee, and corporate information. Intuitive is an American company that designs, manufactures, and sells robotic systems for minimally invasive surgery. Its most well-known products include the da Vinci Surgical System for general surgery and the Ion endoluminal system for precise procedures inside the […]
Iran war likely prolonged, increasing cyber threats, energy disruption, and instability, with companies in the Middle East facing higher risk. Follow me on Twitter: @securityaffairs and Facebook and Mastodon Pierluigi Paganini (SecurityAffairs – hacking, Iran)
A vulnerability, which was classified as critical, was found in langflow-ai Langflow up to 1.8.1. This impacts an unknown function of the component Public Flow Build Endpoint. Executing a manipulation can lead to improper neutralization of directives in dynamically evaluated code.
The identification of this vulnerability is CVE-2026-33017. The attack may be launched remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in parse-server. This affects an unknown function of the component Deep Copy. Performing a manipulation results in improperly controlled modification of object prototype attributes.
This vulnerability was named CVE-2026-32878. The attack may be initiated remotely. There is no available exploit.
It is advisable to upgrade the affected component.
A vulnerability classified as critical was found in Xen. The impacted element is an unknown function of the component Xenstored. Such manipulation leads to denial of service.
This vulnerability is uniquely identified as CVE-2026-23555. The attack can only be initiated within the local network. No exploit exists.
Applying a patch is advised to resolve this issue.
A vulnerability classified as critical has been found in Xen. The affected element is an unknown function of the component EPT. This manipulation causes use after free.
This vulnerability is handled as CVE-2026-23554. The attack can only be done within the local network. There is not any exploit available.
It is recommended to apply a patch to fix this issue.