## Updated at UTC 2026-05-13T20:40:57.903749

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-44009 9.8 0.00% 2 0 2026-05-13T19:17:26.997000 vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, This vulnerabili
CVE-2026-44006 10.0 0.00% 2 0 2026-05-13T19:17:26.827000 vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, It is possible to
CVE-2026-44004 7.5 0.00% 2 0 2026-05-13T19:17:26.547000 vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, sandboxed code ca
CVE-2026-43998 8.5 0.00% 2 0 2026-05-13T19:17:25.790000 vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root p
CVE-2026-43997 10.0 0.00% 2 0 2026-05-13T19:17:25.613000 vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to
CVE-2026-42869 10.0 0.12% 1 0 2026-05-13T18:31:17.630000 SOCFortress CoPilot focuses on providing a single pane of glass for all your sec
CVE-2026-0263 None 0.00% 4 0 2026-05-13T18:31:07 A buffer overflow vulnerability in the IKEv2 processing of Palo Alto Networks PA
CVE-2026-6281 8.8 0.00% 2 0 2026-05-13T18:31:07 A potential vulnerability was reported in some Lenovo Personal Cloud Storage dev
CVE-2026-40631 8.7 0.00% 2 0 2026-05-13T18:31:06 An authenticated attacker with the Resource Administrator or Administrator role
CVE-2026-40618 7.5 0.00% 2 0 2026-05-13T18:31:06 When an SSL profile is configured on a virtual server on BIG-IP Virtual Edition
CVE-2026-41225 9.1 0.00% 2 0 2026-05-13T18:31:06 A vulnerability exists in iControl REST where a highly privileged, authenticated
CVE-2026-42409 7.5 0.00% 2 0 2026-05-13T18:31:06 When an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respo
CVE-2026-42406 8.7 0.00% 2 0 2026-05-13T18:31:06 A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, a
CVE-2026-42924 8.7 0.00% 4 0 2026-05-13T18:31:06 An authenticated attacker with the Resource Administrator or Administrator role
CVE-2026-39458 7.5 0.00% 2 0 2026-05-13T18:31:05 When a BIG-IP DNS profile enabled with DNS cache is configured on a virtual serv
CVE-2026-39455 7.5 0.00% 2 0 2026-05-13T18:31:05 When the BIG-IP Configuration utility is configured to use Lightweight Directory
CVE-2026-40423 7.5 0.00% 2 0 2026-05-13T18:31:05 When a SIP profile is configured on a virtual server, undisclosed traffic can ca
CVE-2026-40067 7.5 0.00% 2 0 2026-05-13T18:31:05 When a BIG-IP APM access policy is configured on a virtual server, undisclosed t
CVE-2026-40061 8.7 0.00% 2 0 2026-05-13T18:31:05 When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iContro
CVE-2026-40060 7.5 0.00% 2 0 2026-05-13T18:31:05 When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual ser
CVE-2026-40629 7.5 0.00% 2 0 2026-05-13T18:31:05 When SSL profiles are configured on a virtual server, undisclosed traffic can ca
CVE-2026-41956 7.5 0.00% 2 0 2026-05-13T18:31:05 When a classification profile is configured on a UDP virtual server, undisclosed
CVE-2026-40621 9.8 0.00% 2 0 2026-05-13T18:30:57 ELECOM wireless LAN access point devices do not require authentication to access
CVE-2026-32661 9.8 0.14% 2 0 2026-05-13T18:30:57 Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and G
CVE-2026-42260 8.2 0.03% 4 0 2026-05-13T18:27:58.823000 Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web
CVE-2026-45091 9.1 0.01% 2 0 2026-05-13T18:27:58.823000 sealed-env is a cross-stack, zero-trust secret management library for Node.js an
CVE-2026-43938 8.1 0.03% 4 0 2026-05-13T18:24:58.737000 YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12,
CVE-2026-43937 8.8 0.07% 2 0 2026-05-13T18:24:58.737000 YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin O
CVE-2026-44008 9.8 0.00% 2 0 2026-05-13T18:17:47.830000 vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method ne
CVE-2026-44007 9.1 0.00% 2 0 2026-05-13T18:17:47.830000 vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.1, when a NodeVM is
CVE-2026-44005 10.0 0.00% 2 0 2026-05-13T18:17:47.830000 vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge
CVE-2026-0265 0 0.00% 2 0 2026-05-13T18:17:47.830000 An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en
CVE-2026-0264 0 0.00% 2 0 2026-05-13T18:17:47.830000 A buffer overflow vulnerability in the DNS proxy and DNS Server features of Palo
CVE-2026-44578 8.6 0.00% 2 2 2026-05-13T18:17:16.127000 Next.js is a React framework for building full-stack web applications. From 13.4
CVE-2026-44579 7.5 0.00% 2 3 2026-05-13T18:17:16.127000 Next.js is a React framework for building full-stack web applications. From to
CVE-2026-44183 9.8 0.04% 2 0 2026-05-13T17:31:40.840000 Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in
CVE-2026-42315 8.1 0.06% 1 0 2026-05-13T17:26:28.013000 pyLoad is a free and open-source download manager written in Python. Prior to 0.
CVE-2026-44574 8.1 0.00% 2 1 2026-05-13T17:25:25.693000 Next.js is a React framework for building full-stack web applications. From 15.4
CVE-2026-44289 7.5 0.00% 2 0 2026-05-13T17:01:38.423000 protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior t
CVE-2026-42266 8.8 0.00% 4 0 2026-05-13T16:32:31.457000 jupyterlab is an extensible environment for interactive and reproducible computi
CVE-2026-42945 8.1 0.00% 4 1 2026-05-13T16:27:11.127000 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo
CVE-2026-40698 8.7 0.00% 2 0 2026-05-13T16:27:11.127000 A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, a
CVE-2026-41227 7.5 0.00% 2 0 2026-05-13T16:27:11.127000 On an HTTP/2 virtual server with Layer 7 DoS Protection configured, undisclosed
CVE-2026-41218 7.5 0.00% 2 0 2026-05-13T16:27:11.127000 When BIG-IP PEM iRules are configured on a virtual server (iRules using commands
CVE-2026-41217 7.9 0.00% 2 0 2026-05-13T16:27:11.127000 A vulnerability exists in an undisclosed BIG-IP TMOS Shell (tmsh) command that m
CVE-2026-41957 8.8 0.00% 2 0 2026-05-13T16:27:11.127000 An authenticated remote code execution vulnerability through undisclosed vectors
CVE-2026-41953 8.7 0.00% 2 0 2026-05-13T16:27:11.127000 A vulnerability exists in BIG-IP systems where a highly privileged, authenticate
CVE-2026-42930 8.7 0.00% 2 0 2026-05-13T16:27:11.127000 When running in Appliance mode, an authenticated attacker assigned the 'Administ
CVE-2026-42920 7.5 0.00% 2 0 2026-05-13T16:27:11.127000 When a Client SSL profile is configured with Allow Dynamic Record Sizing on a UD
CVE-2026-6282 8.1 0.00% 2 0 2026-05-13T16:27:11.127000 A potential improper file path validation vulnerability was reported in some Len
CVE-2026-44167 7.5 0.02% 2 0 2026-05-13T16:27:01 ### Impact Anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8
CVE-2026-44258 0 0.05% 2 0 2026-05-13T16:10:57.817000 efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the elfinder_check
CVE-2026-8108 7.8 0.01% 2 0 2026-05-13T15:52:56.850000 The installation of Fuji Tellus adds a driver to the kernel which grants all use
CVE-2026-45185 9.8 0.06% 19 1 2026-05-13T15:52:25.637000 Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable u
CVE-2026-42062 9.8 0.00% 2 0 2026-05-13T15:47:10.327000 ELECOM wireless LAN access point devices contain an OS command injection in proc
CVE-2026-8072 0 0.03% 1 0 2026-05-13T15:36:46.970000 Insecure generation of credentials in the local SAT (Technical Support) access f
CVE-2026-25705 8.4 0.04% 2 0 2026-05-13T15:35:35.267000 A vulnerability has been identified in [Rancher's Extensions](https://rancherman
CVE-2026-32185 5.5 0.04% 1 0 2026-05-13T15:34:52.573000 Files or directories accessible to external parties in Microsoft Teams allows an
CVE-2026-41089 9.8 0.09% 4 0 2026-05-13T15:34:52.573000 Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker
CVE-2026-41096 9.8 0.07% 5 0 2026-05-13T15:34:52.573000 Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attac
CVE-2026-40361 8.4 0.06% 2 0 2026-05-13T15:34:52.573000 Use after free in Microsoft Office Word allows an unauthorized attacker to execu
CVE-2026-35433 7.3 0.11% 2 0 2026-05-13T15:34:52.573000 Improper input validation in .NET allows an unauthorized attacker to elevate pri
CVE-2026-32177 7.3 0.09% 2 0 2026-05-13T15:34:52.573000 Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate pr
CVE-2026-43989 8.5 0.01% 4 0 2026-05-13T14:54:50.290000 JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-securit
CVE-2026-42860 8.5 0.03% 1 0 2026-05-13T14:50:59.870000 The Open edx Enterprise Service app provides enterprise features to the Open edX
CVE-2026-8159 7.5 0.04% 2 0 2026-05-13T14:44:31.283000 multiparty@4.2.3 and lower versions are vulnerable to denial of service via regu
CVE-2026-8162 7.5 0.04% 4 0 2026-05-13T14:43:47.950000 multiparty@4.2.3 and lower versions are vulnerable to denial of service via unca
CVE-2026-42882 9.4 0.12% 1 0 2026-05-13T14:19:06 ## Background The original concern is functional: a resource pattern should tre
CVE-2026-42864 9.9 0.05% 2 0 2026-05-13T14:18:25 ### Impact The `POST /api/v2/firefighter/raid/jira_bot` endpoint (`CreateJiraB
CVE-2026-42313 8.3 0.04% 1 0 2026-05-13T14:17:50 ### Summary The `set_config_value()` API method (`@permission(Perms.SETTINGS)`)
CVE-2026-2291 7.3 0.03% 2 0 2026-05-13T14:17:14.120000 dnsmasqs extract_name() function can be abused to cause a heap buffer overflow,
CVE-2026-42613 9.4 0.05% 1 0 2026-05-13T13:52:16 # Bug Report: Registration Privilege Escalation via Missing Server-Side Validati
CVE-2026-28910 3.3 0.01% 2 0 2026-05-13T00:49:16 This issue was addressed with improved permissions checking. This issue is fixed
CVE-2026-41712 7.5 0.03% 4 0 2026-05-12T21:31:33 Spring AI's chat memory component contained a problematic default that, when not
CVE-2026-44277 9.8 0.04% 6 1 2026-05-12T18:57:02.307000 A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, Fo
CVE-2026-26083 9.8 0.04% 3 0 2026-05-12T18:30:45 A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0
CVE-2025-35979 None 0.01% 1 0 2026-05-12T18:30:44 Exposure of sensitive information caused by shared microarchitectural predictor
CVE-2026-28972 6.5 0.04% 2 0 2026-05-12T18:30:37 An out-of-bounds write issue was addressed with improved input validation. This
CVE-2026-6722 9.8 0.23% 2 0 2026-05-12T17:48:21.643000 In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, a
CVE-2026-8177 7.5 0.02% 1 0 2026-05-12T16:48:58.260000 XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when
CVE-2026-6001 8.8 0.04% 2 0 2026-05-12T16:47:58.570000 Authorization bypass through User-Controlled key vulnerability in ABIS Technolog
CVE-2026-8043 9.6 0.09% 4 0 2026-05-12T16:38:24.040000 External control of a file name in Ivanti Xtraction before version 2026.2 allows
CVE-2026-28986 7.5 0.04% 2 0 2026-05-12T15:32:40 A race condition was addressed with additional validation. This issue is fixed i
CVE-2026-8111 8.8 0.32% 2 0 2026-05-12T15:31:52 SQL injection in the web console of Ivanti Endpoint Manager before version 2024
CVE-2026-8110 7.8 0.02% 4 0 2026-05-12T15:31:49 Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before 
CVE-2026-35071 8.2 0.03% 2 0 2026-05-12T15:31:49 Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper ne
CVE-2026-7432 7.8 0.03% 2 0 2026-05-12T15:31:48 A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally a
CVE-2026-31431 7.8 2.57% 1 100 2026-05-12T15:31:18 In the Linux kernel, the following vulnerability has been resolved: crypto: alg
CVE-2026-7256 8.8 0.83% 2 0 2026-05-12T15:11:29.503000 ** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI pro
CVE-2026-44295 8.7 0.00% 2 0 2026-05-12T15:06:24 ## Summary `pbjs` static code generation could emit unsafe JavaScript identifie
CVE-2026-44291 8.1 0.00% 2 0 2026-05-12T15:01:25 ## Summary protobufjs used plain objects with inherited prototypes for internal
CVE-2026-44290 7.5 0.00% 2 0 2026-05-12T15:01:15 ## Summary protobufjs allowed certain schema option paths to traverse through i
CVE-2026-42290 7.8 0.00% 2 0 2026-05-12T14:59:46 ## Summary `pbts` invoked JSDoc by building a shell command string from input f
CVE-2026-25787 9.1 0.04% 3 0 2026-05-12T14:19:41.400000 Affected devices do not properly validate and sanitize Technology Object (TO) na
CVE-2026-34260 9.6 0.01% 5 0 2026-05-12T14:19:41.400000 SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerabil
CVE-2025-40946 8.3 0.02% 2 0 2026-05-12T14:19:41.400000 A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blu
CVE-2026-22924 9.1 0.04% 2 0 2026-05-12T14:19:41.400000 A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). Th
CVE-2026-22925 7.5 0.04% 2 0 2026-05-12T14:19:41.400000 A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). Th
CVE-2026-27662 7.7 0.03% 2 0 2026-05-12T14:19:41.400000 Affected devices do not properly restrict access to the web browser via the Cont
CVE-2026-44412 7.8 0.01% 2 0 2026-05-12T14:19:41.400000 A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0
CVE-2026-35227 0 0.10% 1 0 2026-05-12T14:15:46.747000 An unauthenticated remote attacker may exhaust all available TCP connections in
CVE-2026-4890 7.5 0.18% 1 0 2026-05-12T14:15:46.747000 A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allo
CVE-2026-43434 7.8 0.01% 1 0 2026-05-12T14:10:27.343000 In the Linux kernel, the following vulnerability has been resolved: rust_binder
CVE-2026-43441 7.5 0.05% 1 0 2026-05-12T14:10:27.343000 In the Linux kernel, the following vulnerability has been resolved: net: bondin
CVE-2026-45213 7.6 0.03% 4 0 2026-05-12T14:03:52.757000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-42742 8.5 0.03% 2 0 2026-05-12T14:03:52.757000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2019-14192 9.8 0.38% 4 0 2026-05-12T12:32:32 An issue was discovered in Das U-Boot through 2019.07. There is an unbounded mem
CVE-2026-42741 8.5 0.03% 2 0 2026-05-12T12:32:23 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-25786 9.1 0.04% 3 0 2026-05-12T12:32:22 Affected devices do not properly validate and sanitize PLC/station name rendered
CVE-2025-40947 7.5 0.23% 2 0 2026-05-12T12:32:22 A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.1
CVE-2026-33893 7.5 0.04% 2 0 2026-05-12T12:32:22 A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.00
CVE-2026-44411 7.8 0.01% 2 0 2026-05-12T12:32:22 A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0
CVE-2026-41551 9.1 0.05% 2 0 2026-05-12T12:32:22 A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected ve
CVE-2026-2465 8.8 0.04% 4 0 2026-05-12T12:32:22 Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering
CVE-2026-45214 8.5 0.03% 4 0 2026-05-12T12:32:22 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-41713 8.2 0.03% 2 0 2026-05-12T12:32:22 A malicious user could craft input that is stored in conversation memory and lat
CVE-2026-45211 8.5 0.03% 2 0 2026-05-12T12:32:22 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-45218 7.7 0.03% 2 0 2026-05-12T12:32:22 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-40833 7.5 0.04% 2 0 2026-05-12T12:32:21 The affected devices contain a null pointer dereference vulnerability while proc
CVE-2025-6577 9.8 0.03% 2 0 2026-05-12T12:32:14 Improper neutralization of special elements used in an SQL command ('SQL injecti
CVE-2025-40949 9.1 0.17% 2 0 2026-05-12T12:32:14 A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.1
CVE-2026-2993 7.5 0.10% 2 0 2026-05-12T09:31:33 The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable
CVE-2026-39432 8.2 0.03% 3 0 2026-05-12T09:31:31 Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Inco
CVE-2026-7287 7.5 0.26% 2 0 2026-05-12T06:31:46 ** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep()
CVE-2026-34259 8.2 0.01% 2 0 2026-05-12T03:31:33 Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment,
CVE-2026-34263 9.6 0.02% 5 0 2026-05-12T03:31:32 Due to improper Spring Security configuration, SAP Commerce cloud allows an unau
CVE-2026-45223 8.8 0.08% 1 0 2026-05-11T21:31:46 Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coor
CVE-2026-44413 8.2 0.00% 2 0 2026-05-11T18:31:59 In JetBrains TeamCity before 2026.1 2025.11.5 authenticated users could expose s
CVE-2026-43639 8.0 0.05% 1 0 2026-05-11T18:31:59 Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerabili
CVE-2026-45006 8.8 0.11% 1 0 2026-05-11T18:31:59 OpenClaw before 2026.4.23 contains an improper access control vulnerability in t
CVE-2026-45004 7.8 0.01% 1 0 2026-05-11T18:31:59 OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in
CVE-2026-43640 8.1 0.06% 1 0 2026-05-11T18:31:59 Bitwarden Server prior to v2026.4.1 does not require master-password re-authenti
CVE-2026-33357 7.5 0.03% 1 0 2026-05-11T18:31:55 In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.
CVE-2026-25244 9.8 0.00% 1 0 2026-05-11T17:53:48 ### Summary A command injection vulnerability exists in `@wdio/browserstack-serv
CVE-2026-43500 7.8 0.01% 4 13 2026-05-11T17:16:34.290000 In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also
CVE-2026-45109 7.5 0.00% 2 0 2026-05-11T16:21:19 ### Impact It was found that the fix addressing [CVE-2026-44575](https://githu
CVE-2026-44575 7.5 0.00% 4 1 2026-05-11T15:55:27 ### Impact App Router applications that rely on middleware or proxy-based check
CVE-2026-44573 7.5 0.00% 2 1 2026-05-11T15:55:26 ### Impact Applications using the Pages Router with `i18n` configured and middl
CVE-2026-43433 7.8 0.01% 1 0 2026-05-11T09:31:34 In the Linux kernel, the following vulnerability has been resolved: rust_binder
CVE-2024-27355 7.5 0.33% 2 0 2026-05-08T18:24:30 ### Impact Any application using that loads untrusted ASN1 files (eg. X509 certi
CVE-2026-7482 9.1 0.10% 2 4 2026-05-08T17:26:03 Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGU
CVE-2026-41050 9.9 0.04% 4 0 2026-05-07T01:26:07 ### Impact Fleet's Helm deployer did not fully apply ServiceAccount impersonati
CVE-2026-25243 8.8 0.09% 2 1 2026-05-06T16:16:41.060000 Redis is an in-memory data structure store. In versions of redis-server up to 8.
CVE-2026-41940 9.8 74.24% 9 67 template 2026-05-04T18:09:42.300000 cPanel and WHM versions after 11.40 contain an authentication bypass vulnerabili
CVE-2026-21535 8.2 0.09% 2 0 2026-02-20T00:31:59 Improper access control in Microsoft Teams allows an unauthorized attacker to di
CVE-2017-0144 8.1 94.32% 2 22 2025-10-22T00:32:22 The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2
CVE-2025-27421 7.5 0.19% 1 0 2025-03-11T17:18:07 ## Goroutine Leak in Abacus SSE Implementation ### Summary A critical goroutin
CVE-2026-45411 0 0.00% 2 0 N/A
CVE-2026-46300 0 0.00% 6 0 N/A
CVE-2026-4798 0 0.06% 2 0 N/A
CVE-2026-3425 0 0.00% 2 0 N/A
CVE-2026-30893 0 0.08% 2 0 N/A
CVE-2026-23479 0 0.10% 2 1 N/A
CVE-2026-44548 0 0.01% 2 0 N/A
CVE-2026-4058 0 0.00% 2 0 N/A
CVE-2026-44547 0 0.03% 4 0 N/A
CVE-2026-7261 0 0.04% 2 0 N/A
CVE-2026-44257 0 0.21% 2 0 N/A
CVE-2026-42854 0 0.20% 2 0 N/A
CVE-2026-42288 0 0.27% 2 0 N/A
CVE-2026-42899 0 0.04% 1 0 N/A
CVE-2026-32175 0 0.08% 1 0 N/A
CVE-2026-43992 0 0.03% 4 0 N/A
CVE-2026-43991 0 0.03% 4 0 N/A
CVE-2026-43990 0 0.02% 2 0 N/A
CVE-2026-43993 0 0.04% 2 0 N/A
CVE-2026-8161 0 0.04% 2 1 N/A
CVE-2026-41431 0 0.04% 1 0 N/A
CVE-2026-42858 0 0.03% 1 0 N/A

CVE-2026-44009
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T19:17:26.997000

2 posts

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, This vulnerability is fixed in 3.11.2.

thehackerwire@mastodon.social at 2026-05-13T19:03:39.000Z ##

🔴 CVE-2026-44009 - Critical (9.8)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, This vulnerability is fixed in 3.11.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:03:39.000Z ##

🔴 CVE-2026-44009 - Critical (9.8)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, This vulnerability is fixed in 3.11.2.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44006
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T19:17:26.827000

2 posts

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, It is possible to reach BaseHandler.getPrototypeOf, which can be used to get arbitrary prototypes. This vulnerability is fixed in 3.11.0.

thehackerwire@mastodon.social at 2026-05-13T19:02:43.000Z ##

🔴 CVE-2026-44006 - Critical (10)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, It is possible to reach BaseHandler.getPrototypeOf, which can be used to get arbitrary prototypes. This vulnerability is fixed in 3.11.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:02:43.000Z ##

🔴 CVE-2026-44006 - Critical (10)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, It is possible to reach BaseHandler.getPrototypeOf, which can be used to get arbitrary prototypes. This vulnerability is fixed in 3.11.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44004
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T19:17:26.547000

2 posts

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, sandboxed code can call Buffer.alloc() with an arbitrary size to allocate memory directly on the host heap. Because Buffer.alloc is a synchronous C++ native call, vm2's timeout option cannot interrupt it. A single request can exhaust host memory and crash the process with a FATAL ERROR: Reached heap limit. This vulnerability is fixed i

thehackerwire@mastodon.social at 2026-05-13T19:02:19.000Z ##

🟠 CVE-2026-44004 - High (7.5)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, sandboxed code can call Buffer.alloc() with an arbitrary size to allocate memory directly on the host heap. Because Buffer.alloc is a synchronous C++ native call, vm2's timeout option ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:02:19.000Z ##

🟠 CVE-2026-44004 - High (7.5)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, sandboxed code can call Buffer.alloc() with an arbitrary size to allocate memory directly on the host heap. Because Buffer.alloc is a synchronous C++ native call, vm2's timeout option ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43998
(8.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T19:17:25.790000

2 posts

vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the allowed root directory in host context. Because path validation uses path.resolve() (which does not dereference symlinks) but module loading uses Node's native require() (which does), an attacker can load

thehackerwire@mastodon.social at 2026-05-13T19:08:15.000Z ##

🟠 CVE-2026-43998 - High (8.5)

vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the allowed root directory in host context. Because pat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:08:15.000Z ##

🟠 CVE-2026-43998 - High (8.5)

vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the allowed root directory in host context. Because pat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43997
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T19:17:25.613000

2 posts

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Symbol(nodejs.util.inspect.custom). This vulnerability is fixed in 3.11.0.

thehackerwire@mastodon.social at 2026-05-13T19:08:02.000Z ##

🔴 CVE-2026-43997 - Critical (10)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Sy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:08:02.000Z ##

🔴 CVE-2026-43997 - Critical (10)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Sy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42869
(10.0 CRITICAL)

EPSS: 0.12%

updated 2026-05-13T18:31:17.630000

1 posts

SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication token

offseq@infosec.exchange at 2026-05-12T00:00:45.000Z ##

🚨 CVE-2026-42869 (CRITICAL): socfortress CoPilot <0.1.57 uses a hardcoded JWT secret, letting attackers forge admin tokens and seize control. Upgrade to 0.1.57+ and set JWT_SECRET securely! Details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #CVE #InfoSec

##

CVE-2026-0263(CVSS UNKNOWN)

EPSS: 0.00%

updated 2026-05-13T18:31:07

4 posts

A buffer overflow vulnerability in the IKEv2 processing of Palo Alto Networks PAN-OS® software allows an unauthenticated network-based attacker to execute arbitrary code with elevated privileges on the firewall, or cause a denial of service (DoS) condition. Panorama, Cloud NGFW, and Prisma® Access are not impacted by these vulnerabilities.

cR0w at 2026-05-13T17:48:13.389Z ##

RE: infosec.exchange/@cR0w/1165619

security.paloaltonetworks.com/

This issue requires IKEv2 VPN tunnels that is configured with Post Quantum Cryptography (PQC).

##

AAKL at 2026-05-13T16:42:22.747Z ##

New. These are only the top three:

Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled security.paloaltonetworks.com/

CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution security.paloaltonetworks.com/

CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing security.paloaltonetworks.com/

More security.paloaltonetworks.com/

##

cR0w@infosec.exchange at 2026-05-13T17:48:13.000Z ##

RE: infosec.exchange/@cR0w/1165619

security.paloaltonetworks.com/

This issue requires IKEv2 VPN tunnels that is configured with Post Quantum Cryptography (PQC).

##

AAKL@infosec.exchange at 2026-05-13T16:42:22.000Z ##

New. These are only the top three:

Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled security.paloaltonetworks.com/

CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution security.paloaltonetworks.com/

CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing security.paloaltonetworks.com/

More security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability

##

CVE-2026-6281
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:07

2 posts

A potential vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user on the local network to execute arbitrary commands on the device.

thehackerwire@mastodon.social at 2026-05-13T16:19:32.000Z ##

🟠 CVE-2026-6281 - High (8.8)

A potential vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user on the local network to execute arbitrary commands on the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T16:19:32.000Z ##

🟠 CVE-2026-6281 - High (8.8)

A potential vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user on the local network to execute arbitrary commands on the device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40631
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:06

2 posts

An authenticated attacker with the Resource Administrator or Administrator role can modify configuration objects through iControl SOAP resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:05:01.000Z ##

🟠 CVE-2026-40631 - High (8.7)

An authenticated attacker with the Resource Administrator or Administrator role can modify configuration objects through iControl SOAP resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (EoTS) ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:05:01.000Z ##

🟠 CVE-2026-40631 - High (8.7)

An authenticated attacker with the Resource Administrator or Administrator role can modify configuration objects through iControl SOAP resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (EoTS) ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40618
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:06

2 posts

When an SSL profile is configured on a virtual server on BIG-IP Virtual Edition (VE) without Intel QuickAssist Technology (QAT) or on BIG-IP hardware platforms with the database variable crypto.hwacceleration set to disabled, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.   Note: Software versions which have reached End of Technical Support (EoTS) are not eva

thehackerwire@mastodon.social at 2026-05-13T18:02:42.000Z ##

🟠 CVE-2026-40618 - High (7.5)

When an SSL profile is configured on a virtual server on BIG-IP Virtual Edition (VE) without Intel QuickAssist Technology (QAT) or on BIG-IP hardware platforms with the database variable crypto.hwacceleration set to disabled, undisclosed traffic ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:02:42.000Z ##

🟠 CVE-2026-40618 - High (7.5)

When an SSL profile is configured on a virtual server on BIG-IP Virtual Edition (VE) without Intel QuickAssist Technology (QAT) or on BIG-IP hardware platforms with the database variable crypto.hwacceleration set to disabled, undisclosed traffic ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41225
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T18:31:06

2 posts

A vulnerability exists in iControl REST where a highly privileged, authenticated attacker with at least the Manager role can create configuration objects that allow running arbitrary commands.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:02:17.000Z ##

🔴 CVE-2026-41225 - Critical (9.1)

A vulnerability exists in iControl REST where a highly privileged, authenticated attacker with at least the Manager role can create configuration objects that allow running arbitrary commands.

 Note: Software versions which have reached End of T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:02:17.000Z ##

🔴 CVE-2026-41225 - Critical (9.1)

A vulnerability exists in iControl REST where a highly privileged, authenticated attacker with at least the Manager role can create configuration objects that allow running arbitrary commands.

 Note: Software versions which have reached End of T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42409
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:06

2 posts

When an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respond command are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:55:22.000Z ##

🟠 CVE-2026-42409 - High (7.5)

When an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respond command are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate.  Note: Software versio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:55:22.000Z ##

🟠 CVE-2026-42409 - High (7.5)

When an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respond command are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate.  Note: Software versio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42406
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:06

2 posts

A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands.     Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:53:51.000Z ##

🟠 CVE-2026-42406 - High (8.7)

A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands.     Note: Software versions...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:53:51.000Z ##

🟠 CVE-2026-42406 - High (8.7)

A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands.     Note: Software versions...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42924
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:06

4 posts

An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:53:30.000Z ##

🟠 CVE-2026-42924 - High (8.7)

An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (E...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:50:13.000Z ##

🟠 CVE-2026-42924 - High (8.7)

An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (E...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:53:30.000Z ##

🟠 CVE-2026-42924 - High (8.7)

An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (E...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:50:13.000Z ##

🟠 CVE-2026-42924 - High (8.7)

An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (E...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39458
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:05

2 posts

When a BIG-IP DNS profile enabled with DNS cache is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:08:52.000Z ##

🟠 CVE-2026-39458 - High (7.5)

When a BIG-IP DNS profile enabled with DNS cache is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:08:52.000Z ##

🟠 CVE-2026-39458 - High (7.5)

When a BIG-IP DNS profile enabled with DNS cache is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39455
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:05

2 posts

When the BIG-IP Configuration utility is configured to use Lightweight Directory Access Protocol (LDAP) authentication, undisclosed traffic can cause the httpd process to exhaust the available file descriptors.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:08:37.000Z ##

🟠 CVE-2026-39455 - High (7.5)

When the BIG-IP Configuration utility is configured to use Lightweight Directory Access Protocol (LDAP) authentication, undisclosed traffic can cause the httpd process to exhaust the available file descriptors.  Note: Software versions which ha...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:08:37.000Z ##

🟠 CVE-2026-39455 - High (7.5)

When the BIG-IP Configuration utility is configured to use Lightweight Directory Access Protocol (LDAP) authentication, undisclosed traffic can cause the httpd process to exhaust the available file descriptors.  Note: Software versions which ha...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40423
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:05

2 posts

When a SIP profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:08:24.000Z ##

🟠 CVE-2026-40423 - High (7.5)

When a SIP profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.

 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:08:24.000Z ##

🟠 CVE-2026-40423 - High (7.5)

When a SIP profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.

 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40067
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:05

2 posts

When a BIG-IP APM access policy is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:07:41.000Z ##

🟠 CVE-2026-40067 - High (7.5)

When a BIG-IP APM access policy is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate.

 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:07:41.000Z ##

🟠 CVE-2026-40067 - High (7.5)

When a BIG-IP APM access policy is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate.

 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40061
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:05

2 posts

When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system commands with higher privileges. In Appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary.  Note: Software

thehackerwire@mastodon.social at 2026-05-13T18:07:32.000Z ##

🟠 CVE-2026-40061 - High (8.7)

When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:07:32.000Z ##

🟠 CVE-2026-40061 - High (8.7)

When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40060
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:05

2 posts

When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:07:20.000Z ##

🟠 CVE-2026-40060 - High (7.5)

When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate. 

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:07:20.000Z ##

🟠 CVE-2026-40060 - High (7.5)

When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate. 

Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40629
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:05

2 posts

When SSL profiles are configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing new client connections.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:04:52.000Z ##

🟠 CVE-2026-40629 - High (7.5)

When SSL profiles are configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing new client connections.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:04:52.000Z ##

🟠 CVE-2026-40629 - High (7.5)

When SSL profiles are configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing new client connections.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41956
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:31:05

2 posts

When a classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:55:51.000Z ##

🟠 CVE-2026-41956 - High (7.5)

When a classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evalua...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:55:51.000Z ##

🟠 CVE-2026-41956 - High (7.5)

When a classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evalua...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40621
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T18:30:57

2 posts

ELECOM wireless LAN access point devices do not require authentication to access some specific URLs. The affected product may be operated without authentication.

thehackerwire@mastodon.social at 2026-05-13T15:56:09.000Z ##

🔴 CVE-2026-40621 - Critical (9.8)

ELECOM wireless LAN access point devices do not require authentication to access some specific URLs. The affected product may be operated without authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T15:56:09.000Z ##

🔴 CVE-2026-40621 - Critical (9.8)

ELECOM wireless LAN access point devices do not require authentication to access some specific URLs. The affected product may be operated without authentication.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32661
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-05-13T18:30:57

2 posts

Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and GUARDIANWALL Mail Security Cloud (SaaS version). If a remote attacker sends a specially crafted request to the product's web service, arbitrary code may be executed when the product is configured to run pop3wallpasswd with grdnwww user privilege.

offseq at 2026-05-13T07:30:27.757Z ##

🚨 CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26). Remote code execution possible. Restrict network access & monitor pop3wallpasswd. Patch pending. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-13T07:30:27.000Z ##

🚨 CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26). Remote code execution possible. Restrict network access & monitor pop3wallpasswd. Patch pending. radar.offseq.com/threat/cve-20 #OffSeq #CVE202632661 #infosec #vuln

##

CVE-2026-42260
(8.2 HIGH)

EPSS: 0.03%

updated 2026-05-13T18:27:58.823000

4 posts

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not resolve DNS, which combine to allow non-blind SSRF with the response body returned to the caller. This vulnerability is fixed in 2.1.7.

thehackerwire@mastodon.social at 2026-05-12T16:35:49.000Z ##

🟠 CVE-2026-42260 - High (8.2)

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:25:58.000Z ##

🟠 CVE-2026-42260 - High (8.2)

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T16:35:49.000Z ##

🟠 CVE-2026-42260 - High (8.2)

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:25:58.000Z ##

🟠 CVE-2026-42260 - High (8.2)

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45091
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-05-13T18:27:58.823000

2 posts

sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every minted unseal token. JWS payload is base64-encoded JSON, NOT encrypted. Any party who could observe a minted token (CI build logs, container env dumps,

thehackerwire@mastodon.social at 2026-05-12T15:00:16.000Z ##

🔴 CVE-2026-45091 - Critical (9.1)

sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:00:16.000Z ##

🔴 CVE-2026-45091 - Critical (9.1)

sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43938
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-13T18:24:58.737000

4 posts

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, and stores the result in the EventLog.Description column whenever an event (e.g., an unhandled exception) is logged. The admin event-log page (YetAnotherFo

thehackerwire@mastodon.social at 2026-05-12T16:35:58.000Z ##

🟠 CVE-2026-43938 - High (8.1)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:09.000Z ##

🟠 CVE-2026-43938 - High (8.1)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T16:35:58.000Z ##

🟠 CVE-2026-43938 - High (8.1)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:09.000Z ##

🟠 CVE-2026-43938 - High (8.1)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43937
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-13T18:24:58.737000

2 posts

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose OnPostRunQuery binds Editor from the POST body and passes it straight to IDbAccess.RunSql with no caller check, yielding arbitrary SQL execution for any l

thehackerwire@mastodon.social at 2026-05-12T15:26:05.000Z ##

🟠 CVE-2026-43937 - High (8.8)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:05.000Z ##

🟠 CVE-2026-43937 - High (8.8)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44008
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T18:17:47.830000

2 posts

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method neutralizeArraySpeciesBatch works with objects from the other side but can call into this side via getter on the array prototype exposing objects of the wrong side into the sandbox. This can be used to get host objects and get the host Function object. This allows attackers to write code which can escape from the VM2 san

thehackerwire@mastodon.social at 2026-05-13T19:03:26.000Z ##

🔴 CVE-2026-44008 - Critical (9.8)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method neutralizeArraySpeciesBatch works with objects from the other side but can call into this side via getter on the array prototype exposing objects of the wrong side into ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:03:26.000Z ##

🔴 CVE-2026-44008 - Critical (9.8)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method neutralizeArraySpeciesBatch works with objects from the other side but can call into this side via getter on the array prototype exposing objects of the wrong side into ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44007
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T18:17:47.830000

2 posts

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.1, when a NodeVM is created with nesting: true, sandbox code can unconditionally require('vm2') regardless of the outer VM's require configuration — including require: false. With access to vm2, the sandbox constructs a new inner NodeVM with its own unrestricted require settings and executes arbitrary OS commands on the host. Any applicat

thehackerwire@mastodon.social at 2026-05-13T19:03:15.000Z ##

🔴 CVE-2026-44007 - Critical (9.1)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.1, when a NodeVM is created with nesting: true, sandbox code can unconditionally require('vm2') regardless of the outer VM's require configuration — including require: false. With acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:03:15.000Z ##

🔴 CVE-2026-44007 - Critical (9.1)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.1, when a NodeVM is created with nesting: true, sandbox code can unconditionally require('vm2') regardless of the outer VM's require configuration — including require: false. With acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44005
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T18:17:47.830000

2 posts

vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying host objects with otherReflectSet() and otherReflectDefineProperty(), which lets attacker-controlled JavaScript running in a default VM or inherited NodeVM mutate shared host Object.prototype, Array.pr

thehackerwire@mastodon.social at 2026-05-13T19:02:31.000Z ##

🔴 CVE-2026-44005 - Critical (10)

vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying host objects with otherReflectSet() and otherRef...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:02:31.000Z ##

🔴 CVE-2026-44005 - Critical (10)

vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying host objects with otherReflectSet() and otherRef...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0265
(0 None)

EPSS: 0.00%

updated 2026-05-13T18:17:47.830000

2 posts

An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure acc

AAKL at 2026-05-13T16:42:22.747Z ##

New. These are only the top three:

Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled security.paloaltonetworks.com/

CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution security.paloaltonetworks.com/

CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing security.paloaltonetworks.com/

More security.paloaltonetworks.com/

##

AAKL@infosec.exchange at 2026-05-13T16:42:22.000Z ##

New. These are only the top three:

Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled security.paloaltonetworks.com/

CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution security.paloaltonetworks.com/

CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing security.paloaltonetworks.com/

More security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability

##

CVE-2026-0264
(0 None)

EPSS: 0.00%

updated 2026-05-13T18:17:47.830000

2 posts

A buffer overflow vulnerability in the DNS proxy and DNS Server features of Palo Alto Networks PAN-OS® Software allows an unauthenticated attacker with network access to cause a denial of service (DoS) condition (all PAN-OS platforms except Cloud NGFW and Prisma Access) or potentially execute arbitrary code by sending specially crafted network traffic (PA-Series hardware only). Panorama, Cloud

AAKL at 2026-05-13T16:42:22.747Z ##

New. These are only the top three:

Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled security.paloaltonetworks.com/

CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution security.paloaltonetworks.com/

CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing security.paloaltonetworks.com/

More security.paloaltonetworks.com/

##

AAKL@infosec.exchange at 2026-05-13T16:42:22.000Z ##

New. These are only the top three:

Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled security.paloaltonetworks.com/

CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution security.paloaltonetworks.com/

CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing security.paloaltonetworks.com/

More security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability

##

CVE-2026-44578
(8.6 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:17:16.127000

2 posts

Next.js is a React framework for building full-stack web applications. From 13.4.13 to before 15.5.16 and 16.2.5, self-hosted applications using the built-in Node.js server can be vulnerable to server-side request forgery through crafted WebSocket upgrade requests. An attacker can cause the server to proxy requests to arbitrary internal or external destinations, which may expose internal services

2 repos

https://github.com/panchocosil/verify-ghsa-c4j6-fc7j-m34r

https://github.com/dwisiswant0/next-16.2.4-pocs

thehackerwire@mastodon.social at 2026-05-13T19:07:49.000Z ##

🟠 CVE-2026-44578 - High (8.6)

Next.js is a React framework for building full-stack web applications. From 13.4.13 to before 15.5.16 and 16.2.5, self-hosted applications using the built-in Node.js server can be vulnerable to server-side request forgery through crafted WebSocket...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:07:49.000Z ##

🟠 CVE-2026-44578 - High (8.6)

Next.js is a React framework for building full-stack web applications. From 13.4.13 to before 15.5.16 and 16.2.5, self-hosted applications using the built-in Node.js server can be vulnerable to server-side request forgery through crafted WebSocket...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44579
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T18:17:16.127000

2 posts

Next.js is a React framework for building full-stack web applications. From to before 15.5.16 and 16.2.5, applications using Partial Prerendering through the Cache Components feature can be vulnerable to connection exhaustion through crafted POST requests to a server action. In affected configurations, a malicious request can trigger a request-body handling deadlock that leaves connections open f

3 repos

https://github.com/iamfarzad/fbcounsulting_v2

https://github.com/iamfarzad/fbconsulting_v0_chat

https://github.com/dwisiswant0/next-16.2.4-pocs

thehackerwire@mastodon.social at 2026-05-13T19:00:39.000Z ##

🟠 CVE-2026-44579 - High (7.5)

Next.js is a React framework for building full-stack web applications. From to before 15.5.16 and 16.2.5, applications using Partial Prerendering through the Cache Components feature can be vulnerable to connection exhaustion through crafted POST...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:00:39.000Z ##

🟠 CVE-2026-44579 - High (7.5)

Next.js is a React framework for building full-stack web applications. From to before 15.5.16 and 16.2.5, applications using Partial Prerendering through the Cache Components feature can be vulnerable to connection exhaustion through crafted POST...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44183
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-05-13T17:31:40.840000

2 posts

Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the X-Forwarded-For header as the client IP. That entry is attacker-controlled — X-Forwarded-For is append-only, so the leftmost value is whatever the origi

thehackerwire@mastodon.social at 2026-05-12T18:24:26.000Z ##

🔴 CVE-2026-44183 - Critical (9.8)

Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:24:26.000Z ##

🔴 CVE-2026-44183 - Critical (9.8)

Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42315
(8.1 HIGH)

EPSS: 0.06%

updated 2026-05-13T17:26:28.013000

1 posts

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_folder", there is no sanitization at all, allowing a user with Perms.MODIFY to specify arbitrary directories as download locations for a package. This vulnerability is fixed in 0.5.0b3.dev100.

thehackerwire@mastodon.social at 2026-05-11T18:24:04.000Z ##

🟠 CVE-2026-42315 - High (8.1)

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_folder", there is no sanitization at all, allowi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44574
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-13T17:25:25.693000

2 posts

Next.js is a React framework for building full-stack web applications. From 15.4.0 to before 15.5.16 and 16.2.5, applications that rely on middleware to protect dynamic routes can be vulnerable to authorization bypass. In affected deployments, specially crafted query parameters can alter the dynamic route value seen by the page while leaving the visible path unchanged, which can allow protected co

1 repos

https://github.com/dwisiswant0/next-16.2.4-pocs

thehackerwire@mastodon.social at 2026-05-13T17:38:19.000Z ##

🟠 CVE-2026-44574 - High (8.1)

Next.js is a React framework for building full-stack web applications. From 15.4.0 to before 15.5.16 and 16.2.5, applications that rely on middleware to protect dynamic routes can be vulnerable to authorization bypass. In affected deployments, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:38:19.000Z ##

🟠 CVE-2026-44574 - High (8.1)

Next.js is a React framework for building full-stack web applications. From 15.4.0 to before 15.5.16 and 16.2.5, applications that rely on middleware to protect dynamic routes can be vulnerable to authorization bypass. In affected deployments, spe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44289
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T17:01:38.423000

2 posts

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs could recurse without a depth limit while decoding nested protobuf data. This affected both skipping unknown group fields and generated decoding of nested message fields. A crafted protobuf binary payload could cause the JavaScript call stack to be exhausted during decoding. This vulnerabi

thehackerwire@mastodon.social at 2026-05-13T16:21:17.000Z ##

🟠 CVE-2026-44289 - High (7.5)

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs could recurse without a depth limit while decoding nested protobuf data. This affected both skipping unknown group fields and generated d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T16:21:17.000Z ##

🟠 CVE-2026-44289 - High (7.5)

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs could recurse without a depth limit while decoding nested protobuf data. This affected both skipping unknown group fields and generated d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42266
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:32:31.457000

4 posts

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions_uris) is not correctly enforced by JupyterLab. The PyPI Extension Manager was not contained to packages listed on the default PyPI index. This vulnerabi

thehackerwire@mastodon.social at 2026-05-13T17:53:41.000Z ##

🟠 CVE-2026-42266 - High (8.8)

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:50:24.000Z ##

🟠 CVE-2026-42266 - High (8.8)

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:53:41.000Z ##

🟠 CVE-2026-42266 - High (8.8)

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:50:24.000Z ##

🟠 CVE-2026-42266 - High (8.8)

jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42945
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

4 posts

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond it

1 repos

https://github.com/DepthFirstDisclosures/Nginx-Rift

cR0w at 2026-05-13T19:14:51.554Z ##

RE: infosec.exchange/@cR0w/1165688

Plenty of prerequisites but worth looking into.

my.f5.com/manage/s/article/K00

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. (CVE-2026-42945)

##

thehackerwire@mastodon.social at 2026-05-13T17:49:48.000Z ##

🟠 CVE-2026-42945 - High (8.1)

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

cR0w@infosec.exchange at 2026-05-13T19:14:51.000Z ##

RE: infosec.exchange/@cR0w/1165688

Plenty of prerequisites but worth looking into.

my.f5.com/manage/s/article/K00

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. (CVE-2026-42945)

##

thehackerwire@mastodon.social at 2026-05-13T17:49:48.000Z ##

🟠 CVE-2026-42945 - High (8.1)

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40698
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can create SNMP configuration objects through iControl REST or the TMOS shell (tmsh) resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:05:12.000Z ##

🟠 CVE-2026-40698 - High (8.7)

A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can create SNMP configuration objects through iControl REST or the TMOS shell (tmsh) resulting in p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:05:12.000Z ##

🟠 CVE-2026-40698 - High (8.7)

A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can create SNMP configuration objects through iControl REST or the TMOS shell (tmsh) resulting in p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41227
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

On an HTTP/2 virtual server with Layer 7 DoS Protection configured, undisclosed traffic can result in an increase in memory consumption causing the Traffic Management Microkernel (TMM) process to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T18:02:30.000Z ##

🟠 CVE-2026-41227 - High (7.5)

On an HTTP/2 virtual server with Layer 7 DoS Protection configured, undisclosed traffic can result in an increase in memory consumption causing the Traffic Management Microkernel (TMM) process to terminate.  Note: Software versions which have re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T18:02:30.000Z ##

🟠 CVE-2026-41227 - High (7.5)

On an HTTP/2 virtual server with Layer 7 DoS Protection configured, undisclosed traffic can result in an increase in memory consumption causing the Traffic Management Microkernel (TMM) process to terminate.  Note: Software versions which have re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41218
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

When BIG-IP PEM iRules are configured on a virtual server (iRules using commands starting with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, and the urlcatquery command), undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:58:59.000Z ##

🟠 CVE-2026-41218 - High (7.5)

When BIG-IP PEM iRules are configured on a virtual server (iRules using commands starting with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, and the urlcatquery command), undisclosed traffic can cause the Traffic Management Microkernel (TMM) to term...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:58:59.000Z ##

🟠 CVE-2026-41218 - High (7.5)

When BIG-IP PEM iRules are configured on a virtual server (iRules using commands starting with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, and the urlcatquery command), undisclosed traffic can cause the Traffic Management Microkernel (TMM) to term...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41217
(7.9 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

A vulnerability exists in an undisclosed BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with resource administrator or administrator role to execute arbitrary system commands with higher privileges. In Appliance mode deployments, a successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support

thehackerwire@mastodon.social at 2026-05-13T17:58:46.000Z ##

🟠 CVE-2026-41217 - High (7.9)

A vulnerability exists in an undisclosed BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with resource administrator or administrator role to execute arbitrary system commands with higher privileges. In Appliance mode dep...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:58:46.000Z ##

🟠 CVE-2026-41217 - High (7.9)

A vulnerability exists in an undisclosed BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with resource administrator or administrator role to execute arbitrary system commands with higher privileges. In Appliance mode dep...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41957
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

An authenticated remote code execution vulnerability through undisclosed vectors exists in the BIG-IP and BIG-IQ Configuration utility.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:58:33.000Z ##

🟠 CVE-2026-41957 - High (8.8)

An authenticated remote code execution vulnerability through undisclosed vectors exists in the BIG-IP and BIG-IQ Configuration utility.

 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:58:33.000Z ##

🟠 CVE-2026-41957 - High (8.8)

An authenticated remote code execution vulnerability through undisclosed vectors exists in the BIG-IP and BIG-IQ Configuration utility.

 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41953
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

A vulnerability exists in BIG-IP systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can modify configuration objects resulting in privilege escalation.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:55:35.000Z ##

🟠 CVE-2026-41953 - High (8.7)

A vulnerability exists in BIG-IP systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can modify configuration objects resulting in privilege escalation.  Note: Software versions which have reac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:55:35.000Z ##

🟠 CVE-2026-41953 - High (8.7)

A vulnerability exists in BIG-IP systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can modify configuration objects resulting in privilege escalation.  Note: Software versions which have reac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42930
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

When running in Appliance mode, an authenticated attacker assigned the 'Administrator' role may be able to bypass Appliance mode restrictions on a BIG-IP system.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:50:21.000Z ##

🟠 CVE-2026-42930 - High (8.7)

When running in Appliance mode, an authenticated attacker assigned the 'Administrator' role may be able to bypass Appliance mode restrictions on a BIG-IP system.

 Note: Software versions which have reached End of Technical Support (EoTS) are not...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:50:21.000Z ##

🟠 CVE-2026-42930 - High (8.7)

When running in Appliance mode, an authenticated attacker assigned the 'Administrator' role may be able to bypass Appliance mode restrictions on a BIG-IP system.

 Note: Software versions which have reached End of Technical Support (EoTS) are not...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42920
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

When a Client SSL profile is configured with Allow Dynamic Record Sizing on a UDP virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

thehackerwire@mastodon.social at 2026-05-13T17:50:07.000Z ##

🟠 CVE-2026-42920 - High (7.5)

When a Client SSL profile is configured with Allow Dynamic Record Sizing on a UDP virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.
 Note: Software versions which have reached End of Technical Su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:50:07.000Z ##

🟠 CVE-2026-42920 - High (7.5)

When a Client SSL profile is configured with Allow Dynamic Record Sizing on a UDP virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.
 Note: Software versions which have reached End of Technical Su...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6282
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-13T16:27:11.127000

2 posts

A potential improper file path validation vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user to move or access files belonging to other users on the same device.

thehackerwire@mastodon.social at 2026-05-13T16:19:41.000Z ##

🟠 CVE-2026-6282 - High (8.1)

A potential improper file path validation vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user to move or access files belonging to other users on the same device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T16:19:41.000Z ##

🟠 CVE-2026-6282 - High (8.1)

A potential improper file path validation vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user to move or access files belonging to other users on the same device.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44167
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-13T16:27:01

2 posts

### Impact Anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc) ### Patches https://github.com/phpseclib/phpseclib/commit/d53d2021bcb9f6a04d5d44ec99e6bbef219a71bc ### Workarounds No. ### References https://github.com/phpseclib/phpseclib/commit/d53d2021bcb9f6a04d5d44ec99e6bbef219a71bc

thehackerwire@mastodon.social at 2026-05-12T18:24:16.000Z ##

🟠 CVE-2026-44167 - High (7.5)

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:24:16.000Z ##

🟠 CVE-2026-44167 - High (7.5)

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44258
(0 None)

EPSS: 0.05%

updated 2026-05-13T16:10:57.817000

2 posts

efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the elfinder_checkRisk function validates target and targets for path traversal and home containment, but does not validate the dst (destination) parameter used by elfinder_paste. An attacker can copy or move files from within the home directory to any arbitrary destination by setting dst to a base64-encoded traversal path. This bypasse

offseq at 2026-05-13T06:00:25.135Z ##

🚨 CVE-2026-44258: CRITICAL OS command injection in efwGrp efw4.X (<4.08.010). Attackers can copy/move files outside home dir, bypassing controls. Upgrade to 4.08.010+ ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-13T06:00:25.000Z ##

🚨 CVE-2026-44258: CRITICAL OS command injection in efwGrp efw4.X (<4.08.010). Attackers can copy/move files outside home dir, bypassing controls. Upgrade to 4.08.010+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202644258 #infosec #patchnow

##

CVE-2026-8108
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-13T15:52:56.850000

2 posts

The installation of Fuji Tellus adds a driver to the kernel which grants all users read and write permissions.

thehackerwire@mastodon.social at 2026-05-13T12:25:06.000Z ##

🟠 CVE-2026-8108 - High (7.8)

The installation of Fuji Tellus adds a driver to the kernel which grants all users read and write permissions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T12:25:06.000Z ##

🟠 CVE-2026-8108 - High (7.8)

The installation of Fuji Tellus adds a driver to the kernel which grants all users read and write permissions.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45185
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-05-13T15:52:25.637000

19 posts

Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitr

1 repos

https://github.com/liamromanis101/Dead.Letter-CVE-2026-45185

secdb at 2026-05-13T12:27:34.938Z ##

🚨 CVE-2026-45185 (Dead.Letter)

Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/


##

sekurakbot@mastodon.com.pl at 2026-05-13T08:25:00.000Z ##

Krytyczna podatność w Eximie – serwerze pocztowym obsługującym pół Internetu. Znaleziona ze wsparciem AI.

W 2023 roku około 59% publicznych serwerów pocztowych to właśnie Exim. Właśnie załatano oraz opublikowano szczegóły podatności o ksywce Dead Letter, dzięki której atakujący mogą wykonywać kod na serwerze (RCE), bez uwierzytelnienia, w pełni zdalnie. Luka CVE-2026-45185 otrzymała “wycenę” 9.8/10 w skali CVSS. Podatne są Eximy w wersjach od 4.97...

#WBiegu #Ai #Exim #Podatność #Rce

sekurak.pl/krytyczna-podatnosc

##

undercodenews@mastodon.social at 2026-05-12T23:45:48.000Z ##

Exim Security Shock: CVE-2026-45185 Patch Reveals Dangerous Use-After-Free Flaw in GnuTLS Builds

Critical Security Update Exposes Deep Flaws in Email Infrastructure A newly disclosed vulnerability in the Exim mail transfer agent has sent shockwaves through the cybersecurity community after researchers confirmed a serious use-after-free bug tied to BDAT handling in systems built with GnuTLS. The flaw, tracked as CVE-2026-45185, affects Exim versions 4.97 through 4.99.2…

undercodenews.com/exim-securit

##

hn50@social.lansky.name at 2026-05-12T23:20:08.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

Link: xbow.com/blog/dead-letter-cve-
Discussion: news.ycombinator.com/item?id=4

##

campuscodi@mastodon.social at 2026-05-12T21:44:54.000Z ##

XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter

xbow.com/blog/dead-letter-cve-

Patches are out: exim.org/static/doc/security/E

##

newsycombinator@framapiaf.org at 2026-05-12T19:00:29.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: xbow.com/blog/dead-letter-cve-
Comments: news.ycombinator.com/item?id=4

##

hnbot@chrispelli.fun at 2026-05-12T18:02:35.000Z ##

Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim - xbow.com/blog/dead-letter-cve-

#hackernews

##

ngate@mastodon.social at 2026-05-12T18:01:21.000Z ##

🚀 Ah, another day, another #CVE nobody asked for. Humans vs. #AI in a race to exploit #Exim, because *obviously* that's what we need—Skynet learning to hack email servers. 😂 But hey, at least the buzzwords and pentest pitches are here to save us from the tedium of actual #security work. 📉
xbow.com/blog/dead-letter-cve- #Skynet #Hacking #HackerNews #ngated

##

h4ckernews@mastodon.social at 2026-05-12T18:01:15.000Z ##

Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim

xbow.com/blog/dead-letter-cve-

#HackerNews #DeadLetter #CVE202645185 #UnauthenticatedRCE #Exim #LLMVsHumans

##

CuratedHackerNews@mastodon.social at 2026-05-12T17:58:07.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

xbow.com/blog/dead-letter-cve-

##

_r_netsec at 2026-05-12T17:43:05.743Z ##

Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim xbow.com/blog/dead-letter-cve-

##

secdb@infosec.exchange at 2026-05-13T12:27:34.000Z ##

🚨 CVE-2026-45185 (Dead.Letter)

Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#deadletter #cve202645185 #exim #gnutls

##

hn50@social.lansky.name at 2026-05-12T23:20:08.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

Link: xbow.com/blog/dead-letter-cve-
Discussion: news.ycombinator.com/item?id=4

##

campuscodi@mastodon.social at 2026-05-12T21:44:54.000Z ##

XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter

xbow.com/blog/dead-letter-cve-

Patches are out: exim.org/static/doc/security/E

##

newsycombinator@framapiaf.org at 2026-05-12T19:00:29.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: xbow.com/blog/dead-letter-cve-
Comments: news.ycombinator.com/item?id=4

##

ngate@mastodon.social at 2026-05-12T18:01:21.000Z ##

🚀 Ah, another day, another #CVE nobody asked for. Humans vs. #AI in a race to exploit #Exim, because *obviously* that's what we need—Skynet learning to hack email servers. 😂 But hey, at least the buzzwords and pentest pitches are here to save us from the tedium of actual #security work. 📉
xbow.com/blog/dead-letter-cve- #Skynet #Hacking #HackerNews #ngated

##

h4ckernews@mastodon.social at 2026-05-12T18:01:15.000Z ##

Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim

xbow.com/blog/dead-letter-cve-

#HackerNews #DeadLetter #CVE202645185 #UnauthenticatedRCE #Exim #LLMVsHumans

##

CuratedHackerNews@mastodon.social at 2026-05-12T17:58:07.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

xbow.com/blog/dead-letter-cve-

##

_r_netsec@infosec.exchange at 2026-05-12T17:43:05.000Z ##

Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim xbow.com/blog/dead-letter-cve-

##

CVE-2026-42062
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-13T15:47:10.327000

2 posts

ELECOM wireless LAN access point devices contain an OS command injection in processing of username parameter. If processing a crafted request, an arbitrary OS command may be executed. No authentication is required.

thehackerwire@mastodon.social at 2026-05-13T15:56:00.000Z ##

🔴 CVE-2026-42062 - Critical (9.8)

ELECOM wireless LAN access point devices contain an OS command injection in processing of username parameter. If processing a crafted request, an arbitrary OS command may be executed. No authentication is required.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T15:56:00.000Z ##

🔴 CVE-2026-42062 - Critical (9.8)

ELECOM wireless LAN access point devices contain an OS command injection in processing of username parameter. If processing a crafted request, an arbitrary OS command may be executed. No authentication is required.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8072
(0 None)

EPSS: 0.03%

updated 2026-05-13T15:36:46.970000

1 posts

Insecure generation of credentials in the local SAT (Technical Support) access functionality of the Ingecon Sun EMS Board. The vulnerability arose because the secret access credentials were not based on a secure cryptographic scheme, but rather on a weak hashing algorithm, which could allow an attacker to carry out a privilege escalation.

offseq@infosec.exchange at 2026-05-12T10:30:31.000Z ##

🔴 CVE-2026-8072 (CRITICAL, 9.2): Ingeteam Ingecon Sun EMS Board uses weak hashing for SAT access credentials, risking privilege escalation. No mitigation yet — review access and monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vulnerability

##

CVE-2026-25705
(8.4 HIGH)

EPSS: 0.04%

updated 2026-05-13T15:35:35.267000

2 posts

A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` field inside a `UIPlugin` deployment. A malicious UI extension could abuse that to: * Overwrite Rancher binaries or configuration to inject code. *

thehackerwire@mastodon.social at 2026-05-13T16:17:16.000Z ##

🟠 CVE-2026-25705 - High (8.4)

A vulnerability has been identified in [Rancher's Extensions](ranchermanager.docs.rancher.co) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T16:17:16.000Z ##

🟠 CVE-2026-25705 - High (8.4)

A vulnerability has been identified in [Rancher's Extensions](ranchermanager.docs.rancher.co) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32185
(5.5 MEDIUM)

EPSS: 0.04%

updated 2026-05-13T15:34:52.573000

1 posts

Files or directories accessible to external parties in Microsoft Teams allows an unauthorized attacker to perform spoofing locally.

undercodenews@mastodon.social at 2026-05-13T14:06:16.000Z ##

Microsoft Teams Android Vulnerability (CVE-2026-32185) Exposes Local Spoofing Risk in Enterprise Environments

Introduction A newly identified security vulnerability affecting Microsoft Teams on Android has raised significant concerns across enterprise IT and cybersecurity communities. Tracked as CVE-2026-32185, the flaw reveals how weaknesses in file and directory access handling can be exploited to spoof local devices. Although no active exploitation has been…

undercodenews.com/microsoft-te

##

CVE-2026-41089
(9.8 CRITICAL)

EPSS: 0.09%

updated 2026-05-13T15:34:52.573000

4 posts

Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.

netsecio@mastodon.social at 2026-05-13T13:51:40.000Z ##

📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE

Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday

🔗 cyber.netsecops.io

##

CapTechGroup@mastodon.social at 2026-05-13T12:48:36.000Z ##

May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...

captechgroup.com/about-us/thre

##

nyanbinary at 2026-05-12T19:03:17.144Z ##

checks notes ...

Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution

msrc.microsoft.com/update-guid
msrc.microsoft.com/update-guid

##

nyanbinary@infosec.exchange at 2026-05-12T19:03:17.000Z ##

checks notes ...

Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution

msrc.microsoft.com/update-guid
msrc.microsoft.com/update-guid

##

CVE-2026-41096
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-05-13T15:34:52.573000

5 posts

Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.

netsecio@mastodon.social at 2026-05-13T13:51:40.000Z ##

📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE

Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday

🔗 cyber.netsecops.io

##

CapTechGroup@mastodon.social at 2026-05-13T12:48:36.000Z ##

May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...

captechgroup.com/about-us/thre

##

jackc@kompost.cz at 2026-05-13T06:57:23.000Z ##

Microsoft Patch Tuesday 05/2026:
- opravy 120 zranitelností ve Windows, Officech, ale také třeba Malování(!)
- 17 kritických (z toho 14x RCE)
- krom toho mnoho (130+) oprav Edge nebo Teamsů

Velmi zajímavě vypadá zranitelnost CVE-2026-41096 ve Windows DNS klientovi(!), která umožňuje vzdálené spuštění kódu podstrčením připravených DNS odpovědí. S tím bych se vyloženě bál připojit se k sítím s cizím DNS.

#kybez

##

nyanbinary at 2026-05-12T19:03:17.144Z ##

checks notes ...

Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution

msrc.microsoft.com/update-guid
msrc.microsoft.com/update-guid

##

nyanbinary@infosec.exchange at 2026-05-12T19:03:17.000Z ##

checks notes ...

Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution

msrc.microsoft.com/update-guid
msrc.microsoft.com/update-guid

##

CVE-2026-40361
(8.4 HIGH)

EPSS: 0.06%

updated 2026-05-13T15:34:52.573000

2 posts

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

bontchev at 2026-05-13T08:27:06.230Z ##

CVE-2026-40361 - Microsoft Word Remote Code Execution Vulnerability:

msrc.microsoft.com/update-guid

What's next - and RCE in Notepad?

##

bontchev@infosec.exchange at 2026-05-13T08:27:06.000Z ##

CVE-2026-40361 - Microsoft Word Remote Code Execution Vulnerability:

msrc.microsoft.com/update-guid

What's next - and RCE in Notepad?

##

CVE-2026-35433
(7.3 HIGH)

EPSS: 0.11%

updated 2026-05-13T15:34:52.573000

2 posts

Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally.

blowdart.me@bsky.brid.gy at 2026-05-12T20:12:48.787Z ##

Even .NET Framework has an update, with its own fixes for CVE-2026-32177 and CVE-2026-35433. support.microsoft.com/en-us/topic/... So, start your update engines :)

May 12, 2026-KB5087051 Cumulat...

##

blowdart.me@bsky.brid.gy at 2026-05-12T20:12:48.785Z ##

CVE-2026-35433 – .NET Elevation of Privilege github.com/dotnet/annou...

Microsoft Security Advisory CV...

##

CVE-2026-32177
(7.3 HIGH)

EPSS: 0.09%

updated 2026-05-13T15:34:52.573000

2 posts

Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally.

blowdart.me@bsky.brid.gy at 2026-05-12T20:12:48.787Z ##

Even .NET Framework has an update, with its own fixes for CVE-2026-32177 and CVE-2026-35433. support.microsoft.com/en-us/topic/... So, start your update engines :)

May 12, 2026-KB5087051 Cumulat...

##

blowdart.me@bsky.brid.gy at 2026-05-12T20:12:48.786Z ##

CVE-2026-32177 – .NET Elevation of Privilege github.com/dotnet/annou...

Microsoft Security Advisory CV...

##

CVE-2026-43989
(8.5 HIGH)

EPSS: 0.01%

updated 2026-05-13T14:54:50.290000

4 posts

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink target, file size, or file format. This vulnerability is fixed in 0.x.y-security-1.

thehackerwire@mastodon.social at 2026-05-12T17:26:58.000Z ##

🟠 CVE-2026-43989 - High (8.5)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:22.000Z ##

🟠 CVE-2026-43989 - High (8.5)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:26:58.000Z ##

🟠 CVE-2026-43989 - High (8.5)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:22.000Z ##

🟠 CVE-2026-43989 - High (8.5)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42860
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-13T14:50:59.870000

1 posts

The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_source. An authenticated user with the Enterprise Admin role can set this field to an arbitrary URL via the SAMLProviderConfigViewSet PATCH endpoint, then tri

thehackerwire@mastodon.social at 2026-05-11T18:17:42.000Z ##

🟠 CVE-2026-42860 - High (8.5)

The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_sourc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8159
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-13T14:44:31.283000

2 posts

multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take seconds, blocking the event loop. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: limiting upload sizes at the p

thehackerwire@mastodon.social at 2026-05-12T11:59:16.000Z ##

🟠 CVE-2026-8159 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:59:16.000Z ##

🟠 CVE-2026-8159 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8162
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-13T14:43:47.950000

4 posts

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser invokes decodeURI on the value without try/catch. The resulting URIError propagates as an uncaught exception and crashes the process. Impact: any service

thehackerwire@mastodon.social at 2026-05-12T12:18:54.000Z ##

🟠 CVE-2026-8162 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:59:01.000Z ##

🟠 CVE-2026-8162 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:18:54.000Z ##

🟠 CVE-2026-8162 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:59:01.000Z ##

🟠 CVE-2026-8162 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42882
(9.4 CRITICAL)

EPSS: 0.12%

updated 2026-05-13T14:19:06

1 posts

## Background The original concern is functional: a resource pattern should treat a percent-encoded segment like some%2Fvalue as a single opaque token rather than splitting it into two path segments at the decoded /. Investigation into why %2F was being decoded and how routes matched against the result surfaced three related security issues, documented below. Rather than landing a fix directly,

offseq@infosec.exchange at 2026-05-12T06:00:28.000Z ##

🚨 CVE-2026-42882 (CRITICAL): oxyno-zeta s3-proxy <5.0.0 has a path traversal bug, letting unauthenticated attackers bypass auth to access or modify protected S3 objects. Patch to v5.0.0 now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202642882 #CloudSecurity #Vuln

##

CVE-2026-42864
(9.9 CRITICAL)

EPSS: 0.05%

updated 2026-05-13T14:18:25

2 posts

### Impact The `POST /api/v2/firefighter/raid/jira_bot` endpoint (`CreateJiraBotView`) is reachable without authentication (`permission_classes = [permissions.AllowAny]`). Its `attachments` payload is fetched server-side via `httpx.get()` with no URL validation, then uploaded as an attachment on the Jira ticket that gets created. An unauthenticated caller able to reach the ingress can c

offseq@infosec.exchange at 2026-05-12T07:30:31.000Z ##

🔥 CVE-2026-42864: CRITICAL vuln in ManoManoTech firefighter-incident (<0.0.54). Missing auth lets attackers fetch arbitrary URLs & exfil AWS creds if IMDSv2 not enforced. Update to 0.0.54+ & check your cloud configs! radar.offseq.com/threat/cve-20 #OffSeq #CVE202642864 #CloudSecurity

##

thehackerwire@mastodon.social at 2026-05-11T20:01:49.000Z ##

🔴 CVE-2026-42864 - Critical (9.9)

FireFighter is an incident management application. Prior to 0.0.54, the POST /api/v2/firefighter/raid/jira_bot endpoint (CreateJiraBotView) is reachable without authentication (permission_classes = [permissions.AllowAny]). Its attachments payload ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42313
(8.3 HIGH)

EPSS: 0.04%

updated 2026-05-13T14:17:50

1 posts

### Summary The `set_config_value()` API method (`@permission(Perms.SETTINGS)`) in `src/pyload/core/api/__init__.py` gates security-sensitive options behind a hand-maintained allowlist `ADMIN_ONLY_CORE_OPTIONS`. The allowlist contains `("proxy", "username")` and `("proxy", "password")` — which protect the proxy credentials — but it does **not** include `("proxy", "enabled")`, `("proxy", "host")`,

thehackerwire@mastodon.social at 2026-05-11T18:24:36.000Z ##

🟠 CVE-2026-42313 - High (8.3)

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, the set_config_value() API method (@Permission(Perms.SETTINGS)) in src/pyload/core/api/__init__.py gates security-sensitive options behind a hand-maintai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2291
(7.3 HIGH)

EPSS: 0.03%

updated 2026-05-13T14:17:14.120000

2 posts

dnsmasqs extract_name() function can be abused to cause a heap buffer overflow, allowing an attacker to inject false DNS cache entries, which could result in DNS lookups to redirect to an attacker-controlled IP address, or to cause a DoS.

michelin@hachyderm.io at 2026-05-13T19:23:12.000Z ##

If you use #dnsmasq on @fedora or @centos Stream - be aware that there are recently disclosed CVEs - kb.cert.org/vuls/id/471747

@SUSE at least rates one of them a 9.2 on the CVSS 4.0 scale

suse.com/security/cve/CVE-2026

Fedora updates for stable releases are about to hit testing: bodhi.fedoraproject.org/update

and if you have the #CentOSHyperscale repo enabled you can `sudo dnf install centos-release-hyperscale-testing && sudo dnf update 'dnsmasq*'`

Please give feedback for the Fedora builds and for the Hyperscale ones if you give them a spin!

gitlab.com/CentOS/Hyperscale/r

As of the time of posting there is no advisory from #RedHat yet

#Fedora
#CentOS
#CentOS_Stream

##

michelin@hachyderm.io at 2026-05-13T19:23:12.000Z ##

If you use #dnsmasq on @fedora or @centos Stream - be aware that there are recently disclosed CVEs - kb.cert.org/vuls/id/471747

@SUSE at least rates one of them a 9.2 on the CVSS 4.0 scale

suse.com/security/cve/CVE-2026

Fedora updates for stable releases are about to hit testing: bodhi.fedoraproject.org/update

and if you have the #CentOSHyperscale repo enabled you can `sudo dnf install centos-release-hyperscale-testing && sudo dnf update 'dnsmasq*'`

Please give feedback for the Fedora builds and for the Hyperscale ones if you give them a spin!

gitlab.com/CentOS/Hyperscale/r

As of the time of posting there is no advisory from #RedHat yet

#Fedora
#CentOS
#CentOS_Stream

##

CVE-2026-42613
(9.4 CRITICAL)

EPSS: 0.05%

updated 2026-05-13T13:52:16

1 posts

# Bug Report: Registration Privilege Escalation via Missing Server-Side Validation of groups/access ## Summary The `Login::register()` method in the Login plugin accepts attacker-controlled `groups` and `access` fields from the registration POST data without server-side validation. When registration is enabled and `groups` or `access` are included in the configured allowed fields list, an unauth

offseq@infosec.exchange at 2026-05-12T01:30:27.000Z ##

⚠️ CRITICAL: Grav CMS Login plugin (<2.0.0-beta.2) has a flaw in input validation — unauthenticated attackers can self-register as admin.super if registration is enabled. Patch to 2.0.0-beta.2+ or disable registration! CVE-2026-42613 radar.offseq.com/threat/cve-20 #OffSeq #Grav #Infosec

##

CVE-2026-28910
(3.3 LOW)

EPSS: 0.01%

updated 2026-05-13T00:49:16

2 posts

This issue was addressed with improved permissions checking. This issue is fixed in macOS Tahoe 26.4. A malicious app may be able to access arbitrary files.

mysk@mastodon.social at 2026-05-13T15:35:14.000Z ##

@winterknight1337 It seems to be rubbish. The vector doesn't reflect the attack at all. For example, the attack needs user interaction, but the vector doesn't include it. Anyhow, we will publish the blog and videos soon (targeting Friday).

tenable.com/cve/CVE-2026-28910

##

mysk@mastodon.social at 2026-05-13T15:35:14.000Z ##

@winterknight1337 It seems to be rubbish. The vector doesn't reflect the attack at all. For example, the attack needs user interaction, but the vector doesn't include it. Anyhow, we will publish the blog and videos soon (targeting Friday).

tenable.com/cve/CVE-2026-28910

##

CVE-2026-41712
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T21:31:33

4 posts

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

thehackerwire@mastodon.social at 2026-05-12T12:18:44.000Z ##

🟠 CVE-2026-41712 - High (7.5)

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:52.000Z ##

🟠 CVE-2026-41712 - High (7.5)

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:18:44.000Z ##

🟠 CVE-2026-41712 - High (7.5)

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:52.000Z ##

🟠 CVE-2026-41712 - High (7.5)

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44277
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-05-12T18:57:02.307000

6 posts

A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

1 repos

https://github.com/0xBlackash/CVE-2026-44277

beyondmachines1 at 2026-05-13T11:01:07.371Z ##

Fortinet Patches Critical Remote Code Execution Flaws in FortiAuthenticator and FortiSandbox

Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, which allow unauthenticated attackers to execute remote code on FortiAuthenticator and FortiSandbox systems.

**Plan a very quick patch to these products, Fortinet products are constant targets of hackers. Upgrade FortiAuthenticator to 8.0.3, 6.6.9, or 6.5.7, and FortiSandbox to 5.0.2 or 4.4.9.**

beyondmachines.net/event_detai

##

undercodenews@mastodon.social at 2026-05-13T07:31:33.000Z ##

Fortinet Releases Emergency Security Fixes for FortiAuthenticator and FortiSandbox Remote Code Execution Flaws

Introduction Cybersecurity giant Fortinet has released urgent security patches for two critical vulnerabilities affecting its widely deployed enterprise products, FortiAuthenticator and FortiSandbox. The flaws, identified as CVE-2026-44277 and CVE-2026-26083, could allow attackers to execute arbitrary commands or malicious code on vulnerable systems without…

undercodenews.com/fortinet-rel

##

Analyst207@mastodon.social at 2026-05-12T18:28:32.000Z ##

Fortinet Disrupts Critical RCE Flaws in FortiSandbox, FortiAuthenticator

Fortinet has patched a critical remote code execution vulnerability in its FortiAuthenticator and FortiSandbox products, which could have allowed unauthenticated attackers to run unauthorized code or commands. The company has released fixed builds to address the flaw, tracked as CVE-2026-44277, and…

osintsights.com/fortinet-disru

#RemoteCodeExecution #Fortiauthenticator #Cve202644277 #Fortinet #IdentityAndAccessManagement

##

thehackerwire@mastodon.social at 2026-05-12T18:24:07.000Z ##

🔴 CVE-2026-44277 - Critical (9.8)

A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-05-13T11:01:07.000Z ##

Fortinet Patches Critical Remote Code Execution Flaws in FortiAuthenticator and FortiSandbox

Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, which allow unauthenticated attackers to execute remote code on FortiAuthenticator and FortiSandbox systems.

**Plan a very quick patch to these products, Fortinet products are constant targets of hackers. Upgrade FortiAuthenticator to 8.0.3, 6.6.9, or 6.5.7, and FortiSandbox to 5.0.2 or 4.4.9.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-05-12T18:24:07.000Z ##

🔴 CVE-2026-44277 - Critical (9.8)

A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-26083
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-05-12T18:30:45

3 posts

A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0.1, FortiSandbox 4.4.0 through 4.4.8, FortiSandbox Cloud 5.0.2 through 5.0.5, FortiSandbox PaaS 23.4 all versions, FortiSandbox PaaS 23.3 all versions, FortiSandbox PaaS 23.1 all versions, FortiSandbox PaaS 22.2 all versions, FortiSandbox PaaS 22.1 all versions, FortiSandbox PaaS 21.4 all versions, FortiSandbox PaaS 21

beyondmachines1 at 2026-05-13T11:01:07.371Z ##

Fortinet Patches Critical Remote Code Execution Flaws in FortiAuthenticator and FortiSandbox

Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, which allow unauthenticated attackers to execute remote code on FortiAuthenticator and FortiSandbox systems.

**Plan a very quick patch to these products, Fortinet products are constant targets of hackers. Upgrade FortiAuthenticator to 8.0.3, 6.6.9, or 6.5.7, and FortiSandbox to 5.0.2 or 4.4.9.**

beyondmachines.net/event_detai

##

undercodenews@mastodon.social at 2026-05-13T07:31:33.000Z ##

Fortinet Releases Emergency Security Fixes for FortiAuthenticator and FortiSandbox Remote Code Execution Flaws

Introduction Cybersecurity giant Fortinet has released urgent security patches for two critical vulnerabilities affecting its widely deployed enterprise products, FortiAuthenticator and FortiSandbox. The flaws, identified as CVE-2026-44277 and CVE-2026-26083, could allow attackers to execute arbitrary commands or malicious code on vulnerable systems without…

undercodenews.com/fortinet-rel

##

beyondmachines1@infosec.exchange at 2026-05-13T11:01:07.000Z ##

Fortinet Patches Critical Remote Code Execution Flaws in FortiAuthenticator and FortiSandbox

Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, which allow unauthenticated attackers to execute remote code on FortiAuthenticator and FortiSandbox systems.

**Plan a very quick patch to these products, Fortinet products are constant targets of hackers. Upgrade FortiAuthenticator to 8.0.3, 6.6.9, or 6.5.7, and FortiSandbox to 5.0.2 or 4.4.9.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2025-35979(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-05-12T18:30:44

1 posts

Exposure of sensitive information caused by shared microarchitectural predictor state that influences transient execution for some Intel(R) Processors within VMX non-root (guest) operation may allow an information disclosure. Unprivileged software adversary with an authenticated user combined with a high complexity attack may enable data exposure. This result may potentially occur via local access

CVE-2026-28972
(6.5 MEDIUM)

EPSS: 0.04%

updated 2026-05-12T18:30:37

2 posts

An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. An app may be able to cause unexpected system termination or write kernel memory.

xint at 2026-05-12T16:26:15.798Z ##

Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
xint.io/blog/kernel-vulnerabil

##

xint@infosec.exchange at 2026-05-12T16:26:15.000Z ##

Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
xint.io/blog/kernel-vulnerabil

##

CVE-2026-6722
(9.8 CRITICAL)

EPSS: 0.23%

updated 2026-05-12T17:48:21.643000

2 posts

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP o

beyondmachines1 at 2026-05-13T08:01:07.919Z ##

Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution

PHP released emergency updates to fix five vulnerabilities, including two critical use-after-free flaws (CVE-2026-6722 and CVE-2026-7261) that allow unauthenticated remote code execution via the SOAP extension.

**If you run PHP on your web servers, update immediately to version 8.2.31, 8.3.31, 8.4.21, or 8.5.6. If you can't patch right away, disable the SOAP extension as a temporary measure until the update is applied.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-05-13T08:01:07.000Z ##

Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution

PHP released emergency updates to fix five vulnerabilities, including two critical use-after-free flaws (CVE-2026-6722 and CVE-2026-7261) that allow unauthenticated remote code execution via the SOAP extension.

**If you run PHP on your web servers, update immediately to version 8.2.31, 8.3.31, 8.4.21, or 8.5.6. If you can't patch right away, disable the SOAP extension as a temporary measure until the update is applied.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-8177
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-12T16:48:58.260000

1 posts

XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences. A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the end of the input string into adjacent heap memory. Any Perl process that passes attacker controlled strings to XML::LibXML's DOM node-name methods can r

thehackerwire@mastodon.social at 2026-05-11T18:24:47.000Z ##

🟠 CVE-2026-8177 - High (7.5)

XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences.

A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6001
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-12T16:47:58.570000

2 posts

Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers. This issue affects BAPSİS: before v.202604152042.

thehackerwire@mastodon.social at 2026-05-12T11:59:07.000Z ##

🟠 CVE-2026-6001 - High (8.8)

Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers.

This issue affects BAPSİS: before v.202604152042.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:59:07.000Z ##

🟠 CVE-2026-6001 - High (8.8)

Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers.

This issue affects BAPSİS: before v.202604152042.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8043
(9.6 CRITICAL)

EPSS: 0.09%

updated 2026-05-12T16:38:24.040000

4 posts

External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side attacks.

nyanbinary at 2026-05-12T16:22:52.138Z ##

til that Ivanti doesn't just make insecure endpoint management software. they also make insecure reporting software :neobot_giggle:

nvd.nist.gov/vuln/detail/cve-2

##

thehackerwire@mastodon.social at 2026-05-12T15:24:31.000Z ##

🔴 CVE-2026-8043 - Critical (9.6)

External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

nyanbinary@infosec.exchange at 2026-05-12T16:22:52.000Z ##

til that Ivanti doesn't just make insecure endpoint management software. they also make insecure reporting software :neobot_giggle:

nvd.nist.gov/vuln/detail/cve-2

##

thehackerwire@mastodon.social at 2026-05-12T15:24:31.000Z ##

🔴 CVE-2026-8043 - Critical (9.6)

External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28986
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T15:32:40

2 posts

A race condition was addressed with additional validation. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, watchOS 26.5. An app may be able to cause unexpected system termination.

xint at 2026-05-12T16:26:15.798Z ##

Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
xint.io/blog/kernel-vulnerabil

##

xint@infosec.exchange at 2026-05-12T16:26:15.000Z ##

Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
xint.io/blog/kernel-vulnerabil

##

CVE-2026-8111
(8.8 HIGH)

EPSS: 0.32%

updated 2026-05-12T15:31:52

2 posts

SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.

thehackerwire@mastodon.social at 2026-05-12T15:24:13.000Z ##

🟠 CVE-2026-8111 - High (8.8)

SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:24:13.000Z ##

🟠 CVE-2026-8111 - High (8.8)

SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8110
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-12T15:31:49

4 posts

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

thehackerwire@mastodon.social at 2026-05-12T16:35:38.000Z ##

🟠 CVE-2026-8110 - High (7.8)

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:25:49.000Z ##

🟠 CVE-2026-8110 - High (7.8)

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T16:35:38.000Z ##

🟠 CVE-2026-8110 - High (7.8)

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:25:49.000Z ##

🟠 CVE-2026-8110 - High (7.8)

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35071
(8.2 HIGH)

EPSS: 0.03%

updated 2026-05-12T15:31:49

2 posts

Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.

thehackerwire@mastodon.social at 2026-05-12T15:00:28.000Z ##

🟠 CVE-2026-35071 - High (8.2)

Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:00:28.000Z ##

🟠 CVE-2026-35071 - High (8.2)

Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7432
(7.8 HIGH)

EPSS: 0.03%

updated 2026-05-12T15:31:48

2 posts

A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM

thehackerwire@mastodon.social at 2026-05-12T15:24:22.000Z ##

🟠 CVE-2026-7432 - High (7.8)

A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:24:22.000Z ##

🟠 CVE-2026-7432 - High (7.8)

A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31431
(7.8 HIGH)

EPSS: 2.57%

updated 2026-05-12T15:31:18

1 posts

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just

100 repos

https://github.com/ExploitEoom/CVE-2026-31431

https://github.com/rvizx/CVE-2026-31431

https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail

https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs

https://github.com/SilverRuler/copy-fail-CVE-2026-31431

https://github.com/Linux-zs/cve-2026-31431-mitigation

https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection

https://github.com/ncmprbll/copy-fail-rs

https://github.com/Smarttfoxx/copyfail

https://github.com/Dabbleam/CVE-2026-31431-mitigation

https://github.com/lonelyor/CVE-2026-31431-exp

https://github.com/yxdm02/CVE-2026-31431

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC

https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431

https://github.com/wgnet/wg.copyfail.patch

https://github.com/atgreen/block-copyfail

https://github.com/Xerxes-2/CVE-2026-31431-rs

https://github.com/freelabz/CVE-2026-31431

https://github.com/pascal-gujer/CVE-2026-31431

https://github.com/cozystack/copy-fail-blocker

https://github.com/badsectorlabs/copyfail-go

https://github.com/samanzamani/copy-fail-checker

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431

https://github.com/wuwu001/CVE-2026-31431-exploit

https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431

https://github.com/pedromizz/copy-fail

https://github.com/bigwario/copy-fail-CVE-2026-31431-C

https://github.com/SeanRickerd/cve-2026-31431

https://github.com/gbonacini/CVE-2026-31431

https://github.com/wesmar/CVE-2026-31431

https://github.com/Huchangzhi/autorootlinux

https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag

https://github.com/EynaExp/Copy-Fail-CVE-2026-31431-modernized

https://github.com/darioomatos/cve-2026-31431-copyfail

https://github.com/mCub3/CVE-2026-31431

https://github.com/XsanFlip/CVE-2026-31431-Patch

https://github.com/tgies/copy-fail-c

https://github.com/Alfredooe/CVE-2026-31431

https://github.com/desultory/CVE-2026-31431

https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite

https://github.com/bootsareme/copyfail-deconstructed

https://github.com/rootsecdev/cve_2026_31431

https://github.com/ashok523/cve-2026-31431

https://github.com/qi4L/CVE-2026-31431-Container-Escape

https://github.com/diemoeve/copyfail-rs

https://github.com/G01d3nW01f/CVE-2026-31431

https://github.com/Sl4cK0TH/CVE-2026-31431-PoC

https://github.com/sudoytang/copyfail-arm64

https://github.com/krisiasty/vcheck

https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation

https://github.com/AdityaBhatt3010/CVE-2026-31431

https://github.com/Dullpurple-sloop726/CVE-2026-31431-Linux-Copy-Fail

https://github.com/suominen/CVE-2026-31431

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/polyakovavv/copyfail

https://github.com/ben-slates/CVE-2026-31431-Exploit

https://github.com/adysec/cve-2026-31431

https://github.com/sgkdev/page_inject

https://github.com/sec17br/CVE-2026-31431-Copy-Fail

https://github.com/malwarekid/CVE-2026-31431

https://github.com/0xShe/CVE-2026-31431

https://github.com/cyber-joker/copy-fail-python

https://github.com/xn0kkx/CVE-2026-31431_CopyFail_LinuxKernel_LPE

https://github.com/toxy4ny/copy-fail-exploit-on-c-redteam

https://github.com/MartinPham/copy-fail-CVE-2026-31431-php

https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431

https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431

https://github.com/Boos4721/copyfail-rs

https://github.com/gagaltotal/cve-2026-31431-copy-fail

https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe

https://github.com/JuanBindez/CVE-2026-31431

https://github.com/0xBlackash/CVE-2026-31431

https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE

https://github.com/ZephrFish/CopyFail-CVE-2026-31431

https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit

https://github.com/H1d3r/copy-fail_LPE_Interactive

https://github.com/abdullaabdullazade/CVE-2026-31431

https://github.com/AliHzSec/CVE-2026-31431

https://github.com/kadir/copy-fail-CVE-2026-31431-IOC

https://github.com/aestechno/cve-2026-31431-ansible

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC

https://github.com/professional-slacker/alg_check

https://github.com/ErdemOzgen/copy-fail-cve-2026-31431

https://github.com/theori-io/copy-fail-CVE-2026-31431

https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit

https://github.com/jbnetwork-git/copy-fail-check

https://github.com/wvverez/CVE-2026-31431-Copy-Fail

https://github.com/0xN7y/CVE-2026-31431

https://github.com/philfry/cve-2026-31431-ftrace

https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script

https://github.com/rfxn/copyfail

https://github.com/RoflSecurity/copy_fail

https://github.com/povzayd/CVE-2026-31431

https://github.com/b5null/CVE-2026-31431-C

https://github.com/sammwyy/copyfail-rs

https://github.com/mrunalp/block-copyfail

https://github.com/MrAriaNet/cPanel-Fix

https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431

https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431

linux@activitypub.awakari.com at 2026-05-12T08:00:00.000Z ## Copy Fail and Dirty Frag: Linux Page-Cache Exploits Target Every Major Distribution Two recent Linux kernel vulnerabilities have been disclosed: Copy Fail (CVE-2026-31431) on April 29, 2026, and Di...

#Linux #Security #Vulnerabilities #DevOps #news

Origin | Interest | Match ##

CVE-2026-7256
(8.8 HIGH)

EPSS: 0.83%

updated 2026-05-12T15:11:29.503000

2 posts

** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device by sending a crafted HTTP request.

thehackerwire@mastodon.social at 2026-05-12T17:30:08.000Z ##

🟠 CVE-2026-7256 - High (8.8)

** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:30:08.000Z ##

🟠 CVE-2026-7256 - High (8.8)

** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44295
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-12T15:06:24

2 posts

## Summary `pbjs` static code generation could emit unsafe JavaScript identifiers derived from schema-controlled names. When generating static JavaScript from a crafted schema or JSON descriptor, certain namespace, enum, service, or derived full names could be written into the generated output without sufficient sanitization. ## Impact An attacker who can provide or influence schemas passed to

thehackerwire@mastodon.social at 2026-05-13T16:19:51.000Z ##

🟠 CVE-2026-44295 - High (8.7)

protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbjs static code generation could emit unsafe JavaScript identifiers derived from schema-controlled names. When generating static JavaScript from a crafted schema...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T16:19:51.000Z ##

🟠 CVE-2026-44295 - High (8.7)

protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbjs static code generation could emit unsafe JavaScript identifiers derived from schema-controlled names. When generating static JavaScript from a crafted schema...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44291
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-12T15:01:25

2 posts

## Summary protobufjs used plain objects with inherited prototypes for internal type lookup tables used by generated encode and decode functions. If `Object.prototype` had already been polluted, those lookup tables could resolve attacker-controlled inherited properties as valid protobuf type information. This could cause attacker-controlled strings to be emitted into generated JavaScript code.

thehackerwire@mastodon.social at 2026-05-13T16:21:35.000Z ##

🟠 CVE-2026-44291 - High (8.1)

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs used plain objects with inherited prototypes for internal type lookup tables used by generated encode and decode functions. If Object.pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T16:21:35.000Z ##

🟠 CVE-2026-44291 - High (8.1)

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs used plain objects with inherited prototypes for internal type lookup tables used by generated encode and decode functions. If Object.pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44290
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-12T15:01:15

2 posts

## Summary protobufjs allowed certain schema option paths to traverse through inherited object properties while applying options. A crafted protobuf schema or JSON descriptor could cause option handling to write to properties on global JavaScript constructors, corrupting process-wide built-in functionality. ## Impact An attacker who can provide or influence protobuf schemas or JSON descriptors

thehackerwire@mastodon.social at 2026-05-13T16:21:26.000Z ##

🟠 CVE-2026-44290 - High (7.5)

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs allowed certain schema option paths to traverse through inherited object properties while applying options. A crafted protobuf schema or ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T16:21:26.000Z ##

🟠 CVE-2026-44290 - High (7.5)

protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs allowed certain schema option paths to traverse through inherited object properties while applying options. A crafted protobuf schema or ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42290
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-12T14:59:46

2 posts

## Summary `pbts` invoked JSDoc by building a shell command string from input file paths and executing it through `child_process.exec`. File paths containing shell metacharacters could therefore be interpreted by the shell instead of being passed to JSDoc as plain arguments. ## Impact An attacker who can control file names or paths passed to `pbts` may be able to execute arbitrary shell command

thehackerwire@mastodon.social at 2026-05-13T17:50:32.000Z ##

🟠 CVE-2026-42290 - High (7.8)

protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbts invoked JSDoc by building a shell command string from input file paths and executing it through child_process.exec. File paths containing shell metacharacter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:50:32.000Z ##

🟠 CVE-2026-42290 - High (7.8)

protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbts invoked JSDoc by building a shell command string from input file paths and executing it through child_process.exec. File paths containing shell metacharacter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25787
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-12T14:19:41.400000

3 posts

Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into the product, to inject malicious scripts into the page. If a benign user with appropriate rights accesses the "Motion Control Diagnostics" parameters pa

netsecio@mastodon.social at 2026-05-13T13:51:54.000Z ##

📰 Siemens Patches Critical Flaws in SIMATIC S7 PLCs, RUGGEDCOM Devices

Siemens drops 18 security advisories for ICS Patch Tuesday, fixing critical flaws in SIMATIC S7 PLCs and RUGGEDCOM devices. Key bugs (CVE-2026-25786, CVE-2026-25787) could lead to device takeover. 🏭 #ICSsecurity #OTsecurity #Siemens #PLC

🔗 cyber.netsecops.io

##

thehackerwire@mastodon.social at 2026-05-12T15:04:58.000Z ##

🔴 CVE-2026-25787 - Critical (9.1)

Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:04:58.000Z ##

🔴 CVE-2026-25787 - Critical (9.1)

Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34260
(9.6 CRITICAL)

EPSS: 0.01%

updated 2026-05-12T14:19:41.400000

5 posts

SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user input into SQL queries, which are then passed to the underlying database without proper validation or sanitization. Upon successful exploitation, an attac

thehackerwire@mastodon.social at 2026-05-12T18:05:16.000Z ##

🔴 CVE-2026-34260 - Critical (9.6)

SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1 at 2026-05-12T17:01:08.461Z ##

SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws

SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.

**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-05-12T18:05:16.000Z ##

🔴 CVE-2026-34260 - Critical (9.6)

SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-05-12T17:01:08.000Z ##

SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws

SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.

**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-05-12T04:30:30.000Z ##

🚨 CRITICAL: SQL injection (CVE-2026-34260, CVSS 9.6) in SAP S/4HANA (SAP_BASIS 751-816). Authenticated attackers can access sensitive data & crash apps. No patch yet — restrict access & monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #SAP #Infosec #SQLInjection

##

CVE-2025-40946
(8.3 HIGH)

EPSS: 0.02%

updated 2026-05-12T14:19:41.400000

2 posts

A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All versions), blueplanet 125 NX3 M11 (All versions), blueplanet 125 TL3 (All versions), blueplanet 125 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 137 TL3 (All ve

thehackerwire@mastodon.social at 2026-05-12T17:27:26.000Z ##

🟠 CVE-2025-40946 - High (8.3)

A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions &lt; V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions &lt; V6.1.4.9), blueplanet 110 TL3 (All ver...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:27:26.000Z ##

🟠 CVE-2025-40946 - High (8.3)

A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions &lt; V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions &lt; V6.1.4.9), blueplanet 110 TL3 (All ver...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22924
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-12T14:19:41.400000

2 posts

A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions. This could allow an attacker to disrupt normal operations or perform unauthorized actions, potentially impacting system availability and integrity.

thehackerwire@mastodon.social at 2026-05-12T17:21:36.000Z ##

🔴 CVE-2026-22924 - Critical (9.1)

A vulnerability has been identified in SIMATIC CN 4100 (All versions &lt; V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.
This could allow an attacker to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:36.000Z ##

🔴 CVE-2026-22924 - Critical (9.1)

A vulnerability has been identified in SIMATIC CN 4100 (All versions &lt; V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.
This could allow an attacker to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22925
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T14:19:41.400000

2 posts

A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets This could allow an attacker to render the service unavailable and cause denial-of-service conditions by overwhelming system resources.

thehackerwire@mastodon.social at 2026-05-12T15:01:59.000Z ##

🟠 CVE-2026-22925 - High (7.5)

A vulnerability has been identified in SIMATIC CN 4100 (All versions &lt; V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets
This could allow an attacker to render the service un...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:01:59.000Z ##

🟠 CVE-2026-22925 - High (7.5)

A vulnerability has been identified in SIMATIC CN 4100 (All versions &lt; V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets
This could allow an attacker to render the service un...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27662
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-12T14:19:41.400000

2 posts

Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place. This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potentially enabling the discovery of backdoors, performing unauthorized actions, or exploiting misconfigurations that may lead to further system compromise.

thehackerwire@mastodon.social at 2026-05-12T15:01:38.000Z ##

🟠 CVE-2026-27662 - High (7.7)

Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place.
This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:01:38.000Z ##

🟠 CVE-2026-27662 - High (7.7)

Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place.
This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44412
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-12T14:19:41.400000

2 posts

A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-05-12T13:05:16.000Z ##

🟠 CVE-2026-44412 - High (7.8)

A vulnerability has been identified in Solid Edge SE2026 (All versions &lt; V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.
This could allow an attacker to execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T13:05:16.000Z ##

🟠 CVE-2026-44412 - High (7.8)

A vulnerability has been identified in Solid Edge SE2026 (All versions &lt; V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.
This could allow an attacker to execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35227
(0 None)

EPSS: 0.10%

updated 2026-05-12T14:15:46.747000

1 posts

An unauthenticated remote attacker may exhaust all available TCP connections in the CODESYS Modbus TCP Server stack if a race condition in connection handling is successfully exploited, preventing legitimate clients from establishing new connections.

certvde@infosec.exchange at 2026-05-12T07:15:44.000Z ##

#OT #Advisory VDE-2026-042
CODESYS Modbus TCP Server - Improper resource management

CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35227

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-4890
(7.5 HIGH)

EPSS: 0.18%

updated 2026-05-12T14:15:46.747000

1 posts

A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.

thehackerwire@mastodon.social at 2026-05-11T20:01:59.000Z ##

🟠 CVE-2026-4890 - High (7.5)

A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43434
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-12T14:10:27.343000

1 posts

In the Linux kernel, the following vulnerability has been resolved: rust_binder: check ownership before using vma When installing missing pages (or zapping them), Rust Binder will look up the vma in the mm by address, and then call vm_insert_page (or zap_page_range_single). However, if the vma is closed and replaced with a different vma at the same address, this can lead to Rust Binder installin

thehackerwire@mastodon.social at 2026-05-11T18:00:36.000Z ##

🟠 CVE-2026-43434 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

rust_binder: check ownership before using vma

When installing missing pages (or zapping them), Rust Binder will look
up the vma in the mm by address, and then call vm_insert_pag...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43441
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-12T14:10:27.343000

1 posts

In the Linux kernel, the following vulnerability has been resolved: net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never initialized because inet6_init() exits before ndisc_init() is called which initializes it. If bonding ARP/NS validation is enabled, an IPv6 NS/NA packet received on a slave can reach bond_validate

thehackerwire@mastodon.social at 2026-05-11T18:00:12.000Z ##

🟠 CVE-2026-43441 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled

When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never
initialized because inet6_init() exits befo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45213
(7.6 HIGH)

EPSS: 0.03%

updated 2026-05-12T14:03:52.757000

4 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.

thehackerwire@mastodon.social at 2026-05-12T12:07:13.000Z ##

🟠 CVE-2026-45213 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through &lt;= 1.1.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:31.000Z ##

🟠 CVE-2026-45213 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through &lt;= 1.1.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:07:13.000Z ##

🟠 CVE-2026-45213 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through &lt;= 1.1.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:31.000Z ##

🟠 CVE-2026-45213 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through &lt;= 1.1.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42742
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T14:03:52.757000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through <= 3.4.6.

thehackerwire@mastodon.social at 2026-05-12T11:55:19.000Z ##

🟠 CVE-2026-42742 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through &lt;= 3.4.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:55:19.000Z ##

🟠 CVE-2026-42742 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through &lt;= 3.4.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2019-14192
(9.8 CRITICAL)

EPSS: 0.38%

updated 2026-05-12T12:32:32

4 posts

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call.

allainyann@piaille.fr at 2026-05-13T13:25:12.000Z ##

@eshard Very clever write-up from @eshard team on adding a missing USB-Ethernet peripheral to QEMU (SMSC LAN9514) to enable Time Travel Analysis of CVE-2019-14192 on unmodified RPi 3B+ U-Boot firmware.

Using the U-Boot driver as the hardware spec is such an elegant trick. Sparked some ideas for things I'm working on. Thanks for sharing it !

eshard.com/blog/u-boot-cve-tta

##

eshard at 2026-05-13T11:44:35.273Z ##

Missing peripheral in QEMU? Adding it yourself is easier than you think.

We hit a wall analyzing CVE-2019-14192 on real Raspberry Pi 3B+ firmware, so we added the missing driver to . Register by register, using U-Boot's own source as the spec.

🔗 eshard.com/blog/u-boot-cve-tta

##

allainyann@piaille.fr at 2026-05-13T13:25:12.000Z ##

@eshard Very clever write-up from @eshard team on adding a missing USB-Ethernet peripheral to QEMU (SMSC LAN9514) to enable Time Travel Analysis of CVE-2019-14192 on unmodified RPi 3B+ U-Boot firmware.

Using the U-Boot driver as the hardware spec is such an elegant trick. Sparked some ideas for things I'm working on. Thanks for sharing it !

eshard.com/blog/u-boot-cve-tta

##

eshard@infosec.exchange at 2026-05-13T11:44:35.000Z ##

Missing peripheral in QEMU? Adding it yourself is easier than you think.

We hit a wall analyzing CVE-2019-14192 on real Raspberry Pi 3B+ firmware, so we added the missing driver to #QEMU. Register by register, using U-Boot's own source as the spec.

🔗 eshard.com/blog/u-boot-cve-tta

#QEMU #Cybersecurity #firmware #uboot

##

CVE-2026-42741
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:23

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection.This issue affects Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend: from n/a through <= 3.3.2.

thehackerwire@mastodon.social at 2026-05-12T11:55:09.000Z ##

🟠 CVE-2026-42741 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:55:09.000Z ##

🟠 CVE-2026-42741 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25786
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-12T12:32:22

3 posts

Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into the product, to inject malicious scripts into the page. If a benign user with appropriate rights accesses the "communication" parameters page, the malicious code woul

netsecio@mastodon.social at 2026-05-13T13:51:54.000Z ##

📰 Siemens Patches Critical Flaws in SIMATIC S7 PLCs, RUGGEDCOM Devices

Siemens drops 18 security advisories for ICS Patch Tuesday, fixing critical flaws in SIMATIC S7 PLCs and RUGGEDCOM devices. Key bugs (CVE-2026-25786, CVE-2026-25787) could lead to device takeover. 🏭 #ICSsecurity #OTsecurity #Siemens #PLC

🔗 cyber.netsecops.io

##

thehackerwire@mastodon.social at 2026-05-12T15:04:48.000Z ##

🔴 CVE-2026-25786 - Critical (9.1)

Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:04:48.000Z ##

🔴 CVE-2026-25786 - Critical (9.1)

Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40947
(7.5 HIGH)

EPSS: 0.23%

updated 2026-05-12T12:32:22

2 posts

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All vers

thehackerwire@mastodon.social at 2026-05-12T15:05:08.000Z ##

🟠 CVE-2025-40947 - High (7.5)

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.17.1), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.17.1), RUGGED...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:05:08.000Z ##

🟠 CVE-2025-40947 - High (7.5)

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.17.1), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.17.1), RUGGED...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33893
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T12:32:22

2 posts

A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.0014), Teamcenter V2406 (All versions < V2406.0012), Teamcenter V2412 (All versions < V2412.0009), Teamcenter V2506 (All versions < V2506.0005), Teamcenter V2512 (All versions). The affected application contains hardcoded key which is used for obfuscation stored directly into the application. This could allow an attacker

thehackerwire@mastodon.social at 2026-05-12T15:01:49.000Z ##

🟠 CVE-2026-33893 - High (7.5)

A vulnerability has been identified in Teamcenter V2312 (All versions &lt; V2312.0014), Teamcenter V2406 (All versions &lt; V2406.0012), Teamcenter V2412 (All versions &lt; V2412.0009), Teamcenter V2506 (All versions &lt; V2506.0005), Teamcenter V...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:01:49.000Z ##

🟠 CVE-2026-33893 - High (7.5)

A vulnerability has been identified in Teamcenter V2312 (All versions &lt; V2312.0014), Teamcenter V2406 (All versions &lt; V2406.0012), Teamcenter V2412 (All versions &lt; V2412.0009), Teamcenter V2506 (All versions &lt; V2506.0005), Teamcenter V...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44411
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-12T12:32:22

2 posts

A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-05-12T13:05:05.000Z ##

🟠 CVE-2026-44411 - High (7.8)

A vulnerability has been identified in Solid Edge SE2026 (All versions &lt; V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T13:05:05.000Z ##

🟠 CVE-2026-44411 - High (7.8)

A vulnerability has been identified in Solid Edge SE2026 (All versions &lt; V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41551
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-05-12T12:32:22

2 posts

A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized. This could allow a remote attacker to access arbitrary files on the device.

thehackerwire@mastodon.social at 2026-05-12T13:04:56.000Z ##

🔴 CVE-2026-41551 - Critical (9.1)

A vulnerability has been identified in ROS# (All versions &lt; V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized.
This could allow a remote attacker to access arbitrary files on the dev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T13:04:56.000Z ##

🔴 CVE-2026-41551 - Critical (9.1)

A vulnerability has been identified in ROS# (All versions &lt; V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized.
This could allow a remote attacker to access arbitrary files on the dev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2465
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-12T12:32:22

4 posts

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation. This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

thehackerwire@mastodon.social at 2026-05-12T12:07:33.000Z ##

🟠 CVE-2026-2465 - High (8.8)

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.

This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:40.000Z ##

🟠 CVE-2026-2465 - High (8.8)

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.

This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:07:33.000Z ##

🟠 CVE-2026-2465 - High (8.8)

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.

This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:40.000Z ##

🟠 CVE-2026-2465 - High (8.8)

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.

This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45214
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

4 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.

thehackerwire@mastodon.social at 2026-05-12T12:07:23.000Z ##

🟠 CVE-2026-45214 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through &lt;= 1.5.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:42.000Z ##

🟠 CVE-2026-45214 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through &lt;= 1.5.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:07:23.000Z ##

🟠 CVE-2026-45214 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through &lt;= 1.5.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:42.000Z ##

🟠 CVE-2026-45214 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through &lt;= 1.5.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41713
(8.2 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

2 posts

A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavior across conversation turns.

thehackerwire@mastodon.social at 2026-05-12T11:58:58.000Z ##

🟠 CVE-2026-41713 - High (8.2)

A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:58.000Z ##

🟠 CVE-2026-41713 - High (8.2)

A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45211
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a through <= 4.7.1.

thehackerwire@mastodon.social at 2026-05-12T11:58:21.000Z ##

🟠 CVE-2026-45211 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:21.000Z ##

🟠 CVE-2026-45211 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45218
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through <= 11.4.0.

thehackerwire@mastodon.social at 2026-05-12T11:55:00.000Z ##

🟠 CVE-2026-45218 - High (7.7)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through &lt;= 11.4.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:55:00.000Z ##

🟠 CVE-2026-45218 - High (7.7)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through &lt;= 11.4.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40833
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T12:32:21

2 posts

The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.

thehackerwire@mastodon.social at 2026-05-12T17:27:36.000Z ##

🟠 CVE-2025-40833 - High (7.5)

The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:27:36.000Z ##

🟠 CVE-2025-40833 - High (7.5)

The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-6577
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-05-12T12:32:14

2 posts

Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection. This issue affects E-Commerce Website: before 4.5.001.

thehackerwire@mastodon.social at 2026-05-12T15:26:26.000Z ##

🔴 CVE-2025-6577 - Critical (9.8)

Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection.

This issue affects E-Commerce Website: before 4.5.001.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:26.000Z ##

🔴 CVE-2025-6577 - Critical (9.8)

Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection.

This issue affects E-Commerce Website: before 4.5.001.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40949
(9.1 CRITICAL)

EPSS: 0.17%

updated 2026-05-12T12:32:14

2 posts

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All vers

thehackerwire@mastodon.social at 2026-05-12T15:26:16.000Z ##

🔴 CVE-2025-40949 - Critical (9.1)

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.17.1), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.17.1), RUGGED...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:16.000Z ##

🔴 CVE-2025-40949 - Critical (9.1)

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.17.1), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.17.1), RUGGED...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2993
(7.5 HIGH)

EPSS: 0.10%

updated 2026-05-12T09:31:33

2 posts

The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing SQL query in the getListForTbl() function. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing que

thehackerwire@mastodon.social at 2026-05-12T17:27:46.000Z ##

🟠 CVE-2026-2993 - High (7.5)

The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:27:46.000Z ##

🟠 CVE-2026-2993 - High (7.5)

The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39432
(8.2 HIGH)

EPSS: 0.03%

updated 2026-05-12T09:31:31

3 posts

Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Timetics: from n/a through 1.0.53.

thehackerwire@mastodon.social at 2026-05-12T17:29:58.000Z ##

🟠 CVE-2026-39432 - High (8.2)

Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.

This issue affects Timetics: from n/a through 1.0.53.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:29:58.000Z ##

🟠 CVE-2026-39432 - High (8.2)

Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.

This issue affects Timetics: from n/a through 1.0.53.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-12T09:00:33.000Z ##

🔍 HIGH severity: CVE-2026-39432 in Arraytics Timetics ≤1.0.53 — Missing authorization (CWE-862) enables potential data exposure. No patch available yet. Restrict access, monitor advisories. radar.offseq.com/threat/cve-20 #OffSeq #Cybersecurity #Vuln #CVE202639432

##

CVE-2026-7287
(7.5 HIGH)

EPSS: 0.26%

updated 2026-05-12T06:31:46

2 posts

** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C0 could allow an attacker to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request to a vulnerable device.

thehackerwire@mastodon.social at 2026-05-12T17:30:21.000Z ##

🟠 CVE-2026-7287 - High (7.5)

** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:30:21.000Z ##

🟠 CVE-2026-7287 - High (7.5)

** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34259
(8.2 HIGH)

EPSS: 0.01%

updated 2026-05-12T03:31:33

2 posts

Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful exploitation could allow the attacker to read or modify any system data or shut down the system, resulting in a complete compromise of confidentiality, integ

thehackerwire@mastodon.social at 2026-05-12T18:05:05.000Z ##

🟠 CVE-2026-34259 - High (8.2)

Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful expl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:05:05.000Z ##

🟠 CVE-2026-34259 - High (8.2)

Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful expl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34263
(9.6 CRITICAL)

EPSS: 0.02%

updated 2026-05-12T03:31:32

5 posts

Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentiality, Integrity, and Availability of the application.

thehackerwire@mastodon.social at 2026-05-12T18:05:27.000Z ##

🔴 CVE-2026-34263 - Critical (9.6)

Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentia...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1 at 2026-05-12T17:01:08.461Z ##

SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws

SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.

**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**

beyondmachines.net/event_detai

##

thehackerwire@mastodon.social at 2026-05-12T18:05:27.000Z ##

🔴 CVE-2026-34263 - Critical (9.6)

Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentia...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-05-12T17:01:08.000Z ##

SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws

SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.

**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-05-12T03:00:26.000Z ##

🚨 CRITICAL (CVSS 9.6): CVE-2026-34263 hits SAP Commerce Cloud (HY_COM 2205, COM_CLOUD 2211/JDK21). Unauthenticated attackers can upload configs & inject code — full server compromise risk. Monitor & restrict config uploads! radar.offseq.com/threat/cve-20 #OffSeq #SAP #Vuln

##

CVE-2026-45223
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-11T21:31:46

1 posts

Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges. An attacker with access to the shared non-admin token can craft a user-token payload with admin: true, sign it using HMAC-SHA256, and present it to adm

thehackerwire@mastodon.social at 2026-05-11T20:01:39.000Z ##

🟠 CVE-2026-45223 - High (8.8)

Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44413
(8.2 HIGH)

EPSS: 0.00%

updated 2026-05-11T18:31:59

2 posts

In JetBrains TeamCity before 2026.1 2025.11.5 authenticated users could expose server API to unauthorised access

netsecio@mastodon.social at 2026-05-12T16:44:10.000Z ##

📰 High-Severity Flaw in JetBrains TeamCity On-Premises Allows API Exposure (CVE-2026-44413)

PATCH NOW: A high-severity vulnerability (CVE-2026-44413) in JetBrains TeamCity On-Premises allows any authenticated user to expose server APIs. All versions up to 2025.11.4 are affected. Upgrade to 2026.1 immediately. 💻🔧 #TeamCity #JetBrains #CI/CD

🔗 cyber.netsecops.io

##

thehackerwire@mastodon.social at 2026-05-11T18:21:57.000Z ##

🟠 CVE-2026-44413 - High (8.2)

In JetBrains TeamCity before 2026.1
2025.11.5 authenticated users could expose server API to unauthorised access

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43639
(8.0 HIGH)

EPSS: 0.05%

updated 2026-05-11T18:31:59

1 posts

Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of the target organization; self-hosted installations are unaffected as this endpoint is restricted to Cloud via SelfHosted(NotSelfHostedOnly = true).

thehackerwire@mastodon.social at 2026-05-11T18:23:55.000Z ##

🟠 CVE-2026-43639 - High (8)

Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45006
(8.8 HIGH)

EPSS: 0.11%

updated 2026-05-11T18:31:59

1 posts

OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist protection. Attackers can persist malicious config modifications affecting command execution, network behavior, credentials, and operator policies that surv

thehackerwire@mastodon.social at 2026-05-11T18:21:45.000Z ##

🟠 CVE-2026-45006 - High (8.8)

OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45004
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T18:31:59

1 posts

OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript under the current user account by placing a malicious extensions/<plugin>/setup-api.js file in a repository and convincing a user to run OpenClaw commands fr

thehackerwire@mastodon.social at 2026-05-11T18:21:35.000Z ##

🟠 CVE-2026-45004 - High (7.8)

OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript unde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43640
(8.1 HIGH)

EPSS: 0.06%

updated 2026-05-11T18:31:59

1 posts

Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid session.

thehackerwire@mastodon.social at 2026-05-11T18:17:24.000Z ##

🟠 CVE-2026-43640 - High (8.1)

Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33357
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-11T18:31:55

1 posts

In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label <= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP data for arbitrary devices. The root cause is a server-side authorization failure in "GET /openapi/device/status".

thehackerwire@mastodon.social at 2026-05-11T17:39:18.000Z ##

🟠 CVE-2026-33357 - High (7.5)

In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label &lt;= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25244
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-11T17:53:48

1 posts

### Summary A command injection vulnerability exists in `@wdio/browserstack-service` that allows remote code execution (RCE) when processing git branch names in test orchestration. An attacker can exploit this by providing a malicious git repository with a branch name containing shell command injection payloads. ### Details _Give all details on the vulnerability. Pointing to the incriminated sour

netsecio@mastodon.social at 2026-05-13T13:51:57.000Z ##

📰 WebdriverIO Flaw (CVSS 9.8) Allows CI/CD Takeover via Malicious Git Branches

Critical 9.8 CVSS command injection flaw (CVE-2026-25244) found in WebdriverIO. Malicious git branch names can lead to CI/CD server takeover. If you use @wdio/browserstack-service, update immediately! 🚨 #CyberSecurity #SupplyChain #DevSecOps

🔗 cyber.netsecops.io

##

CVE-2026-43500
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T17:16:34.290000

4 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-o

13 repos

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/linnemanlabs/dirtyfrag-arm64

https://github.com/haydenjames/dirty-frag-check

https://github.com/AK777177/Dirty-Frag-Analysis

https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4

https://github.com/XRSecCD/202605_dirty_frag

https://github.com/metalx1993/dirtyfrag-patches

https://github.com/liamromanis101/DirtyFrag-Detector

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan

https://github.com/vorkampfer/dirty_frag_mitigation

https://github.com/0xlane/pagecache-guard

https://github.com/krisiasty/vcheck

lobsters@mastodon.social at 2026-05-12T21:15:09.000Z ##

Load-Bearing Assumptions: the rxrpc case (CVE-2026-43500) and the constraint that was never there lobste.rs/s/tuiapt #linux #security
linkedin.com/pulse/load-bearin

##

knoppix95@mastodon.social at 2026-05-12T20:52:59.000Z ##

Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧

🔗 itsfoss.com/news/linux-fully-p

#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech

##

lobsters@mastodon.social at 2026-05-12T21:15:09.000Z ##

Load-Bearing Assumptions: the rxrpc case (CVE-2026-43500) and the constraint that was never there lobste.rs/s/tuiapt #linux #security
linkedin.com/pulse/load-bearin

##

knoppix95@mastodon.social at 2026-05-12T20:52:59.000Z ##

Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧

🔗 itsfoss.com/news/linux-fully-p

#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech

##

CVE-2026-45109
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-11T16:21:19

2 posts

### Impact It was found that the fix addressing [CVE-2026-44575](https://github.com/vercel/next.js/security/advisories/GHSA-267c-6grr-h53f) did not apply to `middleware.ts` with Turbopack. Refer to [CVE-2026-44575](https://github.com/vercel/next.js/security/advisories/GHSA-267c-6grr-h53f) for further details. ### References - [CVE CVE-2026-44575](https://github.com/vercel/next.js/security/ad

thehackerwire@mastodon.social at 2026-05-13T19:00:17.000Z ##

🟠 CVE-2026-45109 - High (7.5)

Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts with Turbopack. This vulnerability is fixed in 15.5...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:00:17.000Z ##

🟠 CVE-2026-45109 - High (7.5)

Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts with Turbopack. This vulnerability is fixed in 15.5...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44575
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-11T15:55:27

4 posts

### Impact App Router applications that rely on middleware or proxy-based checks for authorization can allow unauthorized access through transport-specific route variants used for segment prefetching. In affected configurations, specially crafted `.rsc` and segment-prefetch URLs can resolve to the same page without being matched by the intended middleware rule, which can allow protected content t

1 repos

https://github.com/dwisiswant0/next-16.2.4-pocs

thehackerwire@mastodon.social at 2026-05-13T19:00:17.000Z ##

🟠 CVE-2026-45109 - High (7.5)

Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts with Turbopack. This vulnerability is fixed in 15.5...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:38:31.000Z ##

🟠 CVE-2026-44575 - High (7.5)

Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.16 and 16.2.5, App Router applications that rely on middleware or proxy-based checks for authorization can allow unauthorized access through transpor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:00:17.000Z ##

🟠 CVE-2026-45109 - High (7.5)

Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts with Turbopack. This vulnerability is fixed in 15.5...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:38:31.000Z ##

🟠 CVE-2026-44575 - High (7.5)

Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.16 and 16.2.5, App Router applications that rely on middleware or proxy-based checks for authorization can allow unauthorized access through transpor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44573
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-11T15:55:26

2 posts

### Impact Applications using the Pages Router with `i18n` configured and middleware/proxy-based authorization can allow unauthorized access to protected page data through locale-less `/_next/data/<buildId>/<page>.json` requests. In affected configurations, middleware does not run for the unprefixed data route, allowing an attacker to retrieve SSR JSON for protected pages without passing the inte

1 repos

https://github.com/dwisiswant0/next-16.2.4-pocs

thehackerwire@mastodon.social at 2026-05-13T17:38:10.000Z ##

🟠 CVE-2026-44573 - High (7.5)

Next.js is a React framework for building full-stack web applications. From 12.2.0 to before 15.5.16 and 16.2.5, Applications using the Pages Router with i18n configured and middleware/proxy-based authorization can allow unauthorized access to pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T17:38:10.000Z ##

🟠 CVE-2026-44573 - High (7.5)

Next.js is a React framework for building full-stack web applications. From 12.2.0 to before 15.5.16 and 16.2.5, Applications using the Pages Router with i18n configured and middleware/proxy-based authorization can allow unauthorized access to pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43433
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T09:31:34

1 posts

In the Linux kernel, the following vulnerability has been resolved: rust_binder: avoid reading the written value in offsets array When sending a transaction, its offsets array is first copied into the target proc's vma, and then the values are read back from there. This is normally fine because the vma is a read-only mapping, so the target process cannot change the value under us. However, if t

thehackerwire@mastodon.social at 2026-05-11T18:00:23.000Z ##

🟠 CVE-2026-43433 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

rust_binder: avoid reading the written value in offsets array

When sending a transaction, its offsets array is first copied into the
target proc's vma, and then the values are r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2024-27355
(7.5 HIGH)

EPSS: 0.33%

updated 2026-05-08T18:24:30

2 posts

### Impact Any application using that loads untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). ### Patches https://github.com/phpseclib/phpseclib/commit/e32531001b4d62c66c3d824ccef54ffad835eb59 ### Workarounds No. ### Resources https://github.com/phpseclib/phpseclib/commit/e32531001b4d62c66c3d824ccef54ffad835eb59 https://www.usenix.org/system/files/conference/u

thehackerwire@mastodon.social at 2026-05-12T18:24:16.000Z ##

🟠 CVE-2026-44167 - High (7.5)

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:24:16.000Z ##

🟠 CVE-2026-44167 - High (7.5)

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7482
(9.1 CRITICAL)

EPSS: 0.10%

updated 2026-05-08T17:26:03

2 posts

Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader. The /api/create endpoint accepts an attacker-supplied GGUF file in which the declared tensor offset and size exceed the file's actual length; during quantization in fs/ggml/gguf.go and server/quantization.go (WriteTo()), the server reads past the allocated heap buffer. The leaked memory contents may inc

4 repos

https://github.com/msuiche/gguf_cve2026_7482

https://github.com/szybnev/CVE-2026-7482

https://github.com/0x0OZ/CVE-2026-7482-PoC

https://github.com/kaleth4/CVE-2026-7482

knoppix95@mastodon.social at 2026-05-13T07:04:45.000Z ##

Ollama fixed CVE-2026-7482 in v0.17.1, a critical out-of-bounds read flaw that could leak API keys, prompts, and chat data from exposed servers via crafted GGUF files. 🔓
Researchers also disclosed unpatched Windows update flaws enabling persistent code execution through unsigned updates and path traversal in Ollama 0.12.10–0.17.5. ⚠️

🔗 thehackernews.com/2026/05/olla

#TechNews #Ollama #LLM #AI #Cybersecurity #OpenSource #FOSS #Privacy #Infosec #Windows #Linux #Security #Servers #DataBreach #Technology

##

knoppix95@mastodon.social at 2026-05-13T07:04:45.000Z ##

Ollama fixed CVE-2026-7482 in v0.17.1, a critical out-of-bounds read flaw that could leak API keys, prompts, and chat data from exposed servers via crafted GGUF files. 🔓
Researchers also disclosed unpatched Windows update flaws enabling persistent code execution through unsigned updates and path traversal in Ollama 0.12.10–0.17.5. ⚠️

🔗 thehackernews.com/2026/05/olla

#TechNews #Ollama #LLM #AI #Cybersecurity #OpenSource #FOSS #Privacy #Infosec #Windows #Linux #Security #Servers #DataBreach #Technology

##

CVE-2026-41050
(9.9 CRITICAL)

EPSS: 0.04%

updated 2026-05-07T01:26:07

4 posts

### Impact Fleet's Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their `GitRepo`. **Helm `lookup` bypass:** The Helm template engine ran Kubernetes API queries with the fleet-agent's cluster-admin credentials instead

thehackerwire@mastodon.social at 2026-05-13T16:17:25.000Z ##

🔴 CVE-2026-41050 - Critical (9.9)

Fleet's Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their `GitR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-13T09:00:30.108Z ##

🔥 CRITICAL: SUSE Rancher Fleet Helm deployer (0.11.0 – 0.15.0) has a major auth flaw (CVE-2026-41050). Tenants with git push access can read secrets from any namespace in downstream clusters. Restrict access & monitor closely! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-13T16:17:25.000Z ##

🔴 CVE-2026-41050 - Critical (9.9)

Fleet's Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their `GitR...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-13T09:00:30.000Z ##

🔥 CRITICAL: SUSE Rancher Fleet Helm deployer (0.11.0 – 0.15.0) has a major auth flaw (CVE-2026-41050). Tenants with git push access can read secrets from any namespace in downstream clusters. Restrict access & monitor closely! radar.offseq.com/threat/cve-20 #OffSeq #SUSE #Kubernetes

##

CVE-2026-25243
(8.8 HIGH)

EPSS: 0.09%

updated 2026-05-06T16:16:41.060000

2 posts

Redis is an in-memory data structure store. In versions of redis-server up to 8.6.3, the RESTORE command does not properly validate serialized values. An authenticated attacker with permission to execute RESTORE can supply a crafted serialized payload that triggers invalid memory access and may lead to remote code execution. A workaround is to restrict access to the RESTORE command with ACL rules.

1 repos

https://github.com/mgiay/CVE-2026-25589-25588-25243-23631-23479-REDIS

redis_release_watcher@kodesumber.com at 2026-05-13T12:50:36.000Z ##

8.6.3

Update urgency: SECURITY: There are security fixes in the release. Security fixes (CVE-2026-23479) Use-After-Free in unblock client flow may lead to Remote Code Execution (CVE-2026-25243) Invalid memory access in RESTORE may lead to Remote Code...

github.com/redis/redis/release

#redis #cacheserver #github

##

redis_release_watcher@kodesumber.com at 2026-05-13T12:50:36.000Z ##

8.6.3

Update urgency: SECURITY: There are security fixes in the release. Security fixes (CVE-2026-23479) Use-After-Free in unblock client flow may lead to Remote Code Execution (CVE-2026-25243) Invalid memory access in RESTORE may lead to Remote Code...

github.com/redis/redis/release

#redis #cacheserver #github

##

CVE-2026-41940
(9.8 CRITICAL)

EPSS: 74.24%

updated 2026-05-04T18:09:42.300000

9 posts

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Nuclei template

67 repos

https://github.com/0xBlackash/CVE-2026-41940

https://github.com/mahfuzreham/cpanel-cve-2026-41940

https://github.com/assetnote/cpanel2shell-scanner

https://github.com/Andrei-Dr/cpanel-cve-2026-41940-ioc

https://github.com/XsanFlip/poc-cpanel-cve-2026-41940

https://github.com/SreejaPuthan/cpanel-control-plane-exposure-check

https://github.com/kmaruthisrikar/CVE-2026-41940-cPanel-Auth-Bypass-Exploit

https://github.com/unteikyou/CVE-2026-41940-AuthBypass-Detector

https://github.com/habibkaratas/sorry-ransomware-analysis

https://github.com/Wesuiliye/CVE-2026-41940

https://github.com/Ishanoshada/CVE-2026-41940-Exploit-PoC

https://github.com/acuciureanu/cpanel2shell-honeypot

https://github.com/ilmndwntr/CVE-2026-41940-MASS-EXPLOIT

https://github.com/MrOplus/CVE-2026-41940

https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker

https://github.com/murrez/CVE-2026-41940

https://github.com/Underh0st/CPanel-Audit-Remediation-Tool

https://github.com/Ap0dexMe0/CVE-2026-41940

https://github.com/branixsolutions/Security-CVE-2026-41940-cPanel-WHM-WP2

https://github.com/rfxn/cpanel-sessionscribe

https://github.com/linko-iheb/cve-2026-41940-scanner

https://github.com/sercanokur/CVE-2026-41940-cPanel-WHM-Verification-Tool

https://github.com/cy3erm/CVE-2026-41940-POC

https://github.com/Christian93111/CVE-2026-41940

https://github.com/george1-adel/CVE-2026-41940_exploit

https://github.com/merdw/cPanel-CVE-2026-41940-Scanner

https://github.com/Richflexpix/cpanel-pwn

https://github.com/3tternp/CVE-2026-41940---cPanel-WHM-check

https://github.com/tfawnies/CVE-2026-41940-next

https://github.com/zedxod/CVE-2026-41940-POC

https://github.com/AmirrezaMarzban/portscan-CVE-2026-41940

https://github.com/vineet7800/cpanel-malware-cleaner-cve-2026

https://github.com/imbas007/POC_CVE-2026-41940

https://github.com/thekawix/CVE-2026-41940

https://github.com/ngksiva/cpanel-forensics

https://github.com/tc4dy/CVE-2026-41940-POC-Exploit

https://github.com/Unfold-Security/CVE-2026-41940-Detection

https://github.com/ynsmroztas/cPanelSniper

https://github.com/adriyansyah-mf/cve-2026-41940-poc

https://github.com/Kagantua/cPanelWHM-AuthBypass

https://github.com/Jenderal92/CVE-2026-41940

https://github.com/nickpaulsec/2026-41940-poc

https://github.com/itsismarcos/CVE-2026-41940

https://github.com/zycoder0day/CVE-2026-41940

https://github.com/rdyprtmx/poc-cve-2026-41940

https://github.com/sebinxavi/cve-checker-2026

https://github.com/YudaSamuel/cpanel-vuln-scanner

https://github.com/0xF55/cve-2026-41940-exploit

https://github.com/iSee857/cPanel-WHM-CVE-2026-41940-AuthBypass

https://github.com/devtint/CVE-2026-41940

https://github.com/realawaisakbar/CVE-2026-41940-Exploit-PoC

https://github.com/44pie/cpsniper

https://github.com/anach-ai/CVE-2026-41940

https://github.com/shahidmallaofficial/cpanel-cve-2026-41940-fix

https://github.com/senyx122/CVE-2026-41940

https://github.com/MrAriaNet/cPanel-Fix

https://github.com/dennisec/CVE-2026-41940

https://github.com/Lutfifakee-Project/CVE-2026-41940

https://github.com/0dev1337/cpanelscanner

https://github.com/Sachinart/CVE-2026-41940-cpanel-0day

https://github.com/bughunt4me/cpanelCVE-2026-41940

https://github.com/OhmGun/whmxploit---CVE-2026-41940

https://github.com/tahaXafous/CVE_2026_41940_scan_exploit

https://github.com/NULL200OK/cve-2026-41940-tool

https://github.com/ZildanZ/CVE-2026-41940

https://github.com/0xabdoulaye/CPANEL-CVE-2026-41940

https://github.com/Defacto-ridgepole254/CVE-2026-41940-Exploit-PoC

tugatech@masto.pt at 2026-05-13T14:02:50.000Z ##

Ataque a sistemas cPanel explora falha CVE-2026-41940 para instalar backdoor
🔗 tugatech.com.pt/t83414-ataque-

#ataque #cve #falha 

##

pentesttools at 2026-05-13T09:47:01.862Z ##

Seven FuelCMS CVEs documented. XSS callbacks now show IP and headers. Website Scanner detects exposed private keys passively. Scheduled scan exports. API risk filtering.

Also: free scanner for CVE-2026-41940, the cPanel auth bypass exploited for 64 days before a patch existed. No account needed.

pentest-tools.com/network-vuln

##

threatcodex at 2026-05-12T14:55:55.925Z ##

Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment

blog.xlab.qianxin.com/mr_rot13

##

technadu at 2026-05-12T14:35:01.354Z ##

CVE-2026-41940 is under active mass exploitation.

Researchers say threat group “Mr_Rot13” is exploiting the critical cPanel flaw to steal credentials, deploy webshells, and gain persistent access across hosting infrastructure.

2,000+ attacking IPs observed globally.

technadu.com/cve-2026-41940-vu

##

undercodenews@mastodon.social at 2026-05-12T13:11:11.000Z ##

Critical cPanel Vulnerability CVE-2026-41940 Sparks Global Cyberattacks and Backdoor Infections

Massive Exploitation Campaign Targets cPanel Servers Worldwide A dangerous cyberattack campaign is rapidly spreading across the internet after hackers began exploiting the critical cPanel vulnerability identified as CVE-2026-41940. Security researchers have assigned the flaw a CVSS severity score of 9.3, placing it among the most dangerous web hosting vulnerabilities…

undercodenews.com/critical-cpa

##

tugatech@masto.pt at 2026-05-13T14:02:50.000Z ##

Ataque a sistemas cPanel explora falha CVE-2026-41940 para instalar backdoor
🔗 tugatech.com.pt/t83414-ataque-

#ataque #cve #falha 

##

pentesttools@infosec.exchange at 2026-05-13T09:47:01.000Z ##

Seven FuelCMS CVEs documented. XSS callbacks now show IP and headers. Website Scanner detects exposed private keys passively. Scheduled scan exports. API risk filtering.

Also: free scanner for CVE-2026-41940, the cPanel auth bypass exploited for 64 days before a patch existed. No account needed.

pentest-tools.com/network-vuln

#infosec #pentesting #vulnerabilitymanagement

##

threatcodex@infosec.exchange at 2026-05-12T14:55:55.000Z ##

Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment
#CVE_2026_41940 #Mr_Rot13
blog.xlab.qianxin.com/mr_rot13

##

technadu@infosec.exchange at 2026-05-12T14:35:01.000Z ##

CVE-2026-41940 is under active mass exploitation.

Researchers say threat group “Mr_Rot13” is exploiting the critical cPanel flaw to steal credentials, deploy webshells, and gain persistent access across hosting infrastructure.

2,000+ attacking IPs observed globally.

technadu.com/cve-2026-41940-vu

#CyberSecurity #ThreatIntel #cPanel

##

CVE-2026-21535
(8.2 HIGH)

EPSS: 0.09%

updated 2026-02-20T00:31:59

2 posts

Improper access control in Microsoft Teams allows an unauthorized attacker to disclose information over a network.

vitobotta@mastodon.social at 2026-05-13T11:00:38.000Z ##

CVE-2026-21535: unauthenticated info disclosure in Microsoft Teams. Network access is all an attacker needs, no credentials at all. The app sitting open on every corporate laptop right now. Go patch it. bleepingcomputer.com/news/micr

##

vitobotta@mastodon.social at 2026-05-13T11:00:38.000Z ##

CVE-2026-21535: unauthenticated info disclosure in Microsoft Teams. Network access is all an attacker needs, no credentials at all. The app sitting open on every corporate laptop right now. Go patch it. bleepingcomputer.com/news/micr

##

CVE-2017-0144
(8.1 HIGH)

EPSS: 94.32%

updated 2025-10-22T00:32:22

2 posts

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those describe

22 repos

https://github.com/MedX267/EternalBlue-Vulnerability-Scanner

https://github.com/klairmanraj/Multi-VLAN-Enterprise-Network-Vulnerability-Assessment

https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework-

https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint

https://github.com/AtithKhawas/autoblue

https://github.com/AnugiArrawwala/CVE-Research

https://github.com/FireTemple/Blackash-CVE-2017-0144

https://github.com/peterpt/eternal_scanner

https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144

https://github.com/quynhold/Detect-CVE-2017-0144-attack

https://github.com/trinadh-dasari-cyber/eternalblue-ms17-010-research

https://github.com/ichhyak22/EternalBlue-Exploit-Demonstration-MS17-010

https://github.com/kimocoder/eternalblue

https://github.com/denuwanjayasekara/CVE-Exploitation-Reports

https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution

https://github.com/klairmanraj/Vulnerability-Risk-Assessment-TVRA-Enterprise-Network

https://github.com/althany/CVE-2017-0144_Lab-Guide

https://github.com/dannic145/EternalBlue-Exploit-Demonstration

https://github.com/Mitsu-bis/Eternal-Blue-CVE-2017-0144-THM-Write-Up

https://github.com/klairmanraj/Multi-VLAN-Enterprise-Network-Security-Infrastructure

https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144

https://github.com/sethwhy/BlueDoor

alsoran@dfarq.homeip.net at 2026-05-12T11:00:06.000Z ## On May 12, 2017, ransomware named Wannacry started spreading across the globe, infecting and encrypting Windows systems by exploiting CVE-2017-0144, a flaw that a two-month-old Microsoft patch, MS17-010, had fixed. It quickly became one of the biggest Windows outbreaks ever. Why was it so bad, and what could have made it go better? […]

dfarq.homeip.net/why-the-wanna

##

alsoran@dfarq.homeip.net at 2026-05-12T11:00:06.000Z ##

Why the Wannacry outbreak was so bad

On May 12, 2017, ransomware named Wannacry started spreading across the globe, infecting and encrypting Windows systems by exploiting CVE-2017-0144, a flaw that a two-month-old Microsoft patch, MS17-010, had fixed. It quickly became one of the biggest Windows outbreaks ever. Why was it so bad, and what could have made it go better? […]

dfarq.homeip.net/why-the-wanna

##

CVE-2025-27421
(7.5 HIGH)

EPSS: 0.19%

updated 2025-03-11T17:18:07

1 posts

## Goroutine Leak in Abacus SSE Implementation ### Summary A critical goroutine leak vulnerability has been identified in the Abacus server's Server-Sent Events (SSE) implementation. The issue occurs when clients disconnect from the `/stream` endpoint, as the server fails to properly clean up resources and terminate associated goroutines. This leads to resource exhaustion where the server contin

CVE-2026-45411
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-13T19:00:29.000Z ##

🔴 CVE-2026-45411 - Critical (9.8)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.3, it is possible to catch a host exception using the yield* expression inside an async generator. When the generator is closed using the return function, the value is awaited on and exce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T19:00:29.000Z ##

🔴 CVE-2026-45411 - Critical (9.8)

vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.3, it is possible to catch a host exception using the yield* expression inside an async generator. When the generator is closed using the return function, the value is awaited on and exce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46300
(0 None)

EPSS: 0.00%

6 posts

N/A

mastokukei@social.josko.org at 2026-05-13T18:02:04.000Z ##

(CVE-2026-46300)
- Malware in Hugging Face repositories and npm packages
- Foxconn ransomware attack impacting major tech companies [4/4]

##

decio at 2026-05-13T17:05:55.458Z ##

et voilà il a reçu son nom de code CVE-2026-46300

##

forst@mastodon.social at 2026-05-13T16:40:44.000Z ##

Apparently yet another one of those #DirtyFrag-like vulnerabilities in #Linux, this one called #Fragnesia

CVE-2026-46300

openwall.com/lists/oss-securit

#CopyFail

##

jschauma@mstdn.social at 2026-05-13T16:05:02.000Z ##

As I was saying, we're not done with page cache LPEs.

Looks like a third variant just dropped (CVE-2026-46300):
github.com/v12-security/pocs/t
github.com/v12-security/pocs/b

openwall.com/lists/oss-securit

Initial reading is defense against #DirtyFrag mitigates this, too, so perhaps not a full round of updates needed here.

##

decio@infosec.exchange at 2026-05-13T17:05:55.000Z ##

et voilà il a reçu son nom de code CVE-2026-46300

##

jschauma@mstdn.social at 2026-05-13T16:05:02.000Z ##

As I was saying, we're not done with page cache LPEs.

Looks like a third variant just dropped (CVE-2026-46300):
github.com/v12-security/pocs/t
github.com/v12-security/pocs/b

openwall.com/lists/oss-securit

Initial reading is defense against #DirtyFrag mitigates this, too, so perhaps not a full round of updates needed here.

##

CVE-2026-4798
(0 None)

EPSS: 0.06%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-13T16:17:07.000Z ##

🟠 CVE-2026-4798 - High (7.5)

The Avada Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘product_order’ parameter in all versions up to, and including, 3.15.1 due to insufficient escaping on the user supplied parameter and lack of sufficient ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T16:17:07.000Z ##

🟠 CVE-2026-4798 - High (7.5)

The Avada Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘product_order’ parameter in all versions up to, and including, 3.15.1 due to insufficient escaping on the user supplied parameter and lack of sufficient ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3425
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-13T15:56:19.000Z ##

🟠 CVE-2026-3425 - High (8.8)

The RTMKit Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.2 via the 'path' parameter of the 'get_content' AJAX action. This makes it possible for authenticated attackers, w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T15:56:19.000Z ##

🟠 CVE-2026-3425 - High (8.8)

The RTMKit Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.2 via the 'path' parameter of the 'get_content' AJAX action. This makes it possible for authenticated attackers, w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30893
(0 None)

EPSS: 0.08%

2 posts

N/A

redis_release_watcher@kodesumber.com at 2026-05-13T12:50:36.000Z ##

8.6.3

Update urgency: SECURITY: There are security fixes in the release. Security fixes (CVE-2026-23479) Use-After-Free in unblock client flow may lead to Remote Code Execution (CVE-2026-25243) Invalid memory access in RESTORE may lead to Remote Code...

github.com/redis/redis/release

#redis #cacheserver #github

##

redis_release_watcher@kodesumber.com at 2026-05-13T12:50:36.000Z ##

8.6.3

Update urgency: SECURITY: There are security fixes in the release. Security fixes (CVE-2026-23479) Use-After-Free in unblock client flow may lead to Remote Code Execution (CVE-2026-25243) Invalid memory access in RESTORE may lead to Remote Code...

github.com/redis/redis/release

#redis #cacheserver #github

##

CVE-2026-44548
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-13T12:25:27.000Z ##

🟠 CVE-2026-44548 - High (8.1)

ChurchCRM is an open-source church management system. Prior to 7.3.2, top-level cross-site GET navigation from an attacker-controlled page to FundRaiserDelete.php, PropertyTypeDelete.php, or NoteDelete.php causes a logged-in ChurchCRM user with th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T12:25:27.000Z ##

🟠 CVE-2026-44548 - High (8.1)

ChurchCRM is an open-source church management system. Prior to 7.3.2, top-level cross-site GET navigation from an attacker-controlled page to FundRaiserDelete.php, PropertyTypeDelete.php, or NoteDelete.php causes a logged-in ChurchCRM user with th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4058
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-13T12:25:17.000Z ##

🔴 CVE-2026-44547 - Critical (9.6)

ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-13T12:25:17.000Z ##

🔴 CVE-2026-44547 - Critical (9.6)

ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44547
(0 None)

EPSS: 0.03%

4 posts

N/A

thehackerwire@mastodon.social at 2026-05-13T12:25:17.000Z ##

🔴 CVE-2026-44547 - Critical (9.6)

ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-13T00:00:35.864Z ##

🚨 CVE-2026-44547: CRITICAL improper authentication in ChurchCRM 7.2.0 – 7.3.0 (CVSS 9.6). Low-priv attackers can bypass auth and compromise data. Upgrade to 7.3.1 urgently! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-13T12:25:17.000Z ##

🔴 CVE-2026-44547 - Critical (9.6)

ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-13T00:00:35.000Z ##

🚨 CVE-2026-44547: CRITICAL improper authentication in ChurchCRM 7.2.0 – 7.3.0 (CVSS 9.6). Low-priv attackers can bypass auth and compromise data. Upgrade to 7.3.1 urgently! radar.offseq.com/threat/cve-20 #OffSeq #ChurchCRM #Vuln #infosec

##

CVE-2026-7261
(0 None)

EPSS: 0.04%

2 posts

N/A

beyondmachines1 at 2026-05-13T08:01:07.919Z ##

Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution

PHP released emergency updates to fix five vulnerabilities, including two critical use-after-free flaws (CVE-2026-6722 and CVE-2026-7261) that allow unauthenticated remote code execution via the SOAP extension.

**If you run PHP on your web servers, update immediately to version 8.2.31, 8.3.31, 8.4.21, or 8.5.6. If you can't patch right away, disable the SOAP extension as a temporary measure until the update is applied.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-05-13T08:01:07.000Z ##

Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution

PHP released emergency updates to fix five vulnerabilities, including two critical use-after-free flaws (CVE-2026-6722 and CVE-2026-7261) that allow unauthenticated remote code execution via the SOAP extension.

**If you run PHP on your web servers, update immediately to version 8.2.31, 8.3.31, 8.4.21, or 8.5.6. If you can't patch right away, disable the SOAP extension as a temporary measure until the update is applied.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-44257
(0 None)

EPSS: 0.21%

2 posts

N/A

offseq at 2026-05-13T04:30:31.659Z ##

🚨 CRITICAL: CVE-2026-44257 in efwGrp efw4.X (<4.08.010) enables remote, unauthenticated command execution via crafted zip uploads and path traversal. Patch to 4.08.010 ASAP. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-13T04:30:31.000Z ##

🚨 CRITICAL: CVE-2026-44257 in efwGrp efw4.X (<4.08.010) enables remote, unauthenticated command execution via crafted zip uploads and path traversal. Patch to 4.08.010 ASAP. radar.offseq.com/threat/cve-20 #OffSeq #vuln #infosec #websecurity

##

CVE-2026-42854
(0 None)

EPSS: 0.20%

2 posts

N/A

offseq at 2026-05-13T03:00:27.340Z ##

🔥 CRITICAL: CVE-2026-42854 in arduino-esp32 (<3.3.8) enables stack buffer overflow via HTTP multipart boundary — can crash device or allow RCE. Patch ASAP by upgrading to 3.3.8! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-13T03:00:27.000Z ##

🔥 CRITICAL: CVE-2026-42854 in arduino-esp32 (<3.3.8) enables stack buffer overflow via HTTP multipart boundary — can crash device or allow RCE. Patch ASAP by upgrading to 3.3.8! radar.offseq.com/threat/cve-20 #OffSeq #CVE202642854 #IoTSecurity #Espressif

##

CVE-2026-42288
(0 None)

EPSS: 0.27%

2 posts

N/A

offseq at 2026-05-13T01:30:30.800Z ##

⚠️ CVE-2026-42288: ChurchCRM < 7.3.2 impacted by critical pre-auth RCE (CWE-94) via code injection in setup wizard. Unauthenticated attackers can take full control. Upgrade to 7.3.2+ ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-13T01:30:30.000Z ##

⚠️ CVE-2026-42288: ChurchCRM < 7.3.2 impacted by critical pre-auth RCE (CWE-94) via code injection in setup wizard. Unauthenticated attackers can take full control. Upgrade to 7.3.2+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #ChurchCRM #Vuln #RCE #PatchNow

##

CVE-2026-42899
(0 None)

EPSS: 0.04%

1 posts

N/A

CVE-2026-32175
(0 None)

EPSS: 0.08%

1 posts

N/A

CVE-2026-43992
(0 None)

EPSS: 0.03%

4 posts

N/A

thehackerwire@mastodon.social at 2026-05-12T17:22:47.000Z ##

🔴 CVE-2026-43992 - Critical (9.8)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:13.000Z ##

🔴 CVE-2026-43992 - Critical (9.8)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:22:47.000Z ##

🔴 CVE-2026-43992 - Critical (9.8)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:13.000Z ##

🔴 CVE-2026-43992 - Critical (9.8)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43991
(0 None)

EPSS: 0.03%

4 posts

N/A

thehackerwire@mastodon.social at 2026-05-12T17:22:37.000Z ##

🟠 CVE-2026-43991 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:03.000Z ##

🟠 CVE-2026-43991 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:22:37.000Z ##

🟠 CVE-2026-43991 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:03.000Z ##

🟠 CVE-2026-43991 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43990
(0 None)

EPSS: 0.02%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-12T17:21:26.000Z ##

🟠 CVE-2026-43990 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell me...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:26.000Z ##

🟠 CVE-2026-43990 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell me...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43993
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-12T17:21:16.000Z ##

🟠 CVE-2026-43993 - High (8.2)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:16.000Z ##

🟠 CVE-2026-43993 - High (8.2)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:19:03.000Z ##

🟠 CVE-2026-8161 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:19:03.000Z ##

🟠 CVE-2026-8161 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41431
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-05-11T18:24:15.000Z ##

🟠 CVE-2026-41431 - High (8)

Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Application Resource (MAR) updater (org.mozilla.updater) that has had all MAR signature verification stripped from the Firefox codebase it was forked from. The MAR files...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42858
(0 None)

EPSS: 0.03%

1 posts

N/A

thehackerwire@mastodon.social at 2026-05-11T18:17:33.000Z ##

🟠 CVE-2026-42858 - High (8.5)

Open edX Platform enables the authoring and delivery of online learning at any scale. The sync_provider_data endpoint in SAMLProviderDataViewSet allows authenticated Enterprise Admin users to supply an arbitrary URL via the metadata_url POST param...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites