Tuesday, April 21, 2026 Archive

Archived Security Snapshot

Critical vulnerabilities, curated daily for security professionals

🎯 SSCV Profile

See how vulnerabilities affect your specific environment

CRS uses the System Security Context Vector (SSCV) Framework v1.0 to adjust CVSS scores based on your system's exposure level, network position, and business criticality. Learn more about SSCV Framework

Risk scores will be adjusted based on your selected environment

Archived Security Brief

Tuesday's disclosures are led by HP, Digiwin EasyFlow .NET, and Infor products, alongside critical flaws in Apache Kafka and AWS services. The brief contains 14 critical CVEs (up 367% from 3 yesterday) and 65 high-priority CVEs (up 195% from 22). Notable entries include CVE-2026-39918 (CVSS 9.8) in an HP configuration file, CVE-2026-32613 (CVSS 9.9) affecting Infor multiple products, and CVE-2026-33557 (CVSS 9.1) in Apache Kafka. Remote code execution and configuration-level weaknesses dominate today's disclosures, impacting enterprise middleware, messaging infrastructure, and cloud platforms. No patches are currently available across the reported set, and 17 vulnerabilities have confirmed active exploitation spanning Cisco Catalyst SD-WAN Manager, Microsoft Windows, Adobe Acrobat, and Apache ActiveMQ.

  • HP, Digiwin EasyFlow .NET, and Infor lead today's critical disclosures with multiple CVSS 9.8+ vulnerabilities
  • Critical CVEs jumped to 14, a 367% increase from yesterday's 3
  • High-priority CVEs rose to 65, up 195% from 22 the previous day
  • Remote code execution and configuration weaknesses affect Apache Kafka, AWS services, and enterprise middleware
  • Patch availability stands at 0% across the reported vulnerabilities
  • 17 CVEs show confirmed active exploitation, including Cisco SD-WAN Manager, Microsoft Windows, and Apache ActiveMQ

Immediate action: Prioritize review of HP, Digiwin EasyFlow .NET, Infor, and Apache Kafka deployments, and apply compensating controls for Cisco Catalyst SD-WAN Manager and Apache ActiveMQ given active exploitation. With 0% patch availability in today's set, restrict network exposure, enforce access controls, and monitor vendor advisories for fixes as they are released.

💡 Tip: Swipe CVE cards left to ⭐ star, right to ❌ remove

Section Navigation