Qinglong Task Scheduler RCE Flaws Exploited in the Wild
Hackers are actively exploiting two severe authentication bypass vulnerabilities in Qinglong, a popular open-source task scheduling platform. These flaws allow attackers to execute arbitrary code and deploy resource-draining cryptomining malware on vulnerable servers. Qinglong is a self-hosted task
ORIGINAL SOURCE →via GBHackers Security
ADVERTISEMENT
⚡ STAY AHEAD
Events like this, convergence-verified across 689 sources, land in your inbox every Sunday. Free.
GET THE SUNDAY BRIEFING →RELATED · cyber
- [CYBER] Cyber is the Number One Global “People Risk,” Says Marsh
- [CYBER] High Fidelity Check for the cPanel Authentication Bypass (CVE-2026-41940)
- [CYBER] CISA orders feds to patch Windows flaw exploited as zero-day
- [CYBER] Sandhills Medical Says Ransomware Breach Affects 170,000
- [CYBER] Trump renews pressure on Israel’s Herzog to pardon Netanyahu: Report
- [CYBER] Coupang probe tests the U.S.’s willingness to protect its tech giants abroad