Official intelligence summary

HAIJA INTEL REPORT

★ Favorited
Generated 19/04/2026, 14:44. Pipeline: Europe/Belgrade. One report, two sections only, with regular sources filtered toward exploit, blog, and red-team activity. CVE items only survive when exploit signal is present.
Total items9
Regular sources4
Tweets / X5
Threshold0.62
Favorite the latest report with: node scripts\seithar-favorite-report.js (or pass a date to pin an older one)

Tweets / X

5 items
0.80@TheDFIRReport · core · original

Intrusion writeup covering phishing to loader to C2 to lateral movement, with screenshots, detection logic, and operator notes on credential theft and persistence.

Intrusion writeup covering phishing to loader to C2 to lateral movement, with screenshots, detection logic, and operator notes on credential theft and persistence.

0.72@harmj0y · core · original

Fresh AD CS abuse writeup with ESC path details, privilege escalation notes, and practical certificate tradecraft for enterprise red teams.

Fresh AD CS abuse writeup with ESC path details, privilege escalation notes, and practical certificate tradecraft for enterprise red teams.

0.70@_dirkjan · core · original

New Entra device-code phishing chain shows token theft, refresh-token reuse, and app consent abuse with concrete operator tradecraft and screenshots.

New Entra device-code phishing chain shows token theft, refresh-token reuse, and app consent abuse with concrete operator tradecraft and screenshots.

0.70@albinowax · core · original

New request smuggling and auth bypass technique disclosed, with parser confusion details, proof of concept, and exploitation notes for modern reverse proxies.

New request smuggling and auth bypass technique disclosed, with parser confusion details, proof of concept, and exploitation notes for modern reverse proxies.

0.66@assetnote · core · original

Research thread on exposed enterprise attack surface leading to pre-auth RCE paths, PoC validation, and external exposure triage guidance.

Research thread on exposed enterprise attack surface leading to pre-auth RCE paths, PoC validation, and external exposure triage guidance.

Regular sources

4 items
1.00exploit · 18 Apr, 21:12seclists.orgRCEBlog

CVE-2026-41113: RCE in sagredo fork of qmail

Posted by Alan Coopersmith on Apr 18 https://blog.calif.io/p/we-asked-claude-to-audit-sagredos and https://github.com/califio/publications/tree/main/MADBugs/qmail https:…

1.00exploit · 18 Apr, 00:53seclists.org

CVE-2026-40948: Apache Airflow Keycloak Provider: OAuth Login CSRF — Missing State Parameter in Keycloak Auth Manager

Posted by Jarek Potiuk on Apr 17 Severity: low Affected versions: - Apache Airflow Keycloak Provider (apache-airflow-providers-keycloak) 0.0.1 before 0.7.0 Description: …

0.90exploit · 18 Apr, 19:383 mentionsseclists.orgBlog

Re: [CVE-2026-33691] OWASP CRS whitespace padding bypass vulnerability

Posted by Solar Designer on Apr 18 Hi, This gives a 404 Page Not Found, but more importantly actual content should have been directly included in your posting, not only … | Posted by cyber security on Apr 18 Also you can use CVE-2026-33691, to disable security headers while bypassing CRS https://un…

0.90exploit · 18 Apr, 14:30seclists.org

Re: lcms2 <= 2.18 CubeSize() integer overflow: stock Ubuntu 24.04 Poppler / evince-thumbnailer / OpenJDK crashers (different triggers), no CVE

Posted by Abhinav Agarwal on Apr 18 MITRE assigned CVE-2026-41254 on 2026-04-17 -- Abhinav Agarwal