## Updated at UTC 2026-05-18T23:54:03.735668

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-8836 9.8 0.00% 2 0 2026-05-18T21:31:58 A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_par
CVE-2026-8851 8.1 0.00% 2 0 2026-05-18T21:16:41.777000 SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List ma
CVE-2026-8838 9.8 0.00% 2 0 2026-05-18T21:16:41.623000 Unsafe use of Python's eval() on server-received data in the vector_in() functio
CVE-2026-27130 9.9 0.00% 2 0 2026-05-18T21:16:39.890000 Dokploy is a free, self-hostable Platform as a Service (PaaS). Versions 0.26.6 a
CVE-2026-25244 9.8 0.00% 2 0 2026-05-18T21:16:39.547000 WebdriverIO is a test automation framework for unit, e2e and component testing u
CVE-2026-22810 8.2 0.00% 2 0 2026-05-18T21:16:39.373000 Joplin is an open source note-taking and to-do application that organises notes
CVE-2025-56352 7.5 0.00% 2 0 2026-05-18T20:27:23.023000 In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the br
CVE-2025-57282 8.8 0.00% 2 0 2026-05-18T20:27:12.817000 ngrok v4.3.3 and 5.0.0-beta.2 is vulnerable to Command Injection.
CVE-2026-41085 8.8 0.00% 2 0 2026-05-18T20:27:12.817000 Thermo Fisher Scientific Torrent Suite Dx through 5.14.2 has a privilege escalat
CVE-2026-8657 8.2 0.05% 4 0 2026-05-18T20:27:12.817000 Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype P
CVE-2026-47092 7.8 0.00% 2 0 2026-05-18T20:19:31.307000 Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injecti
CVE-2026-8724 4.7 0.01% 2 0 2026-05-18T20:16:40.220000 A security flaw has been discovered in Dataease 2.10.20. Impacted is the functio
CVE-2026-45672 8.8 0.06% 2 1 2026-05-18T20:16:39.537000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45301 8.1 0.03% 2 0 2026-05-18T20:16:38.997000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45315 8.7 0.02% 2 0 2026-05-18T20:11:38.523000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-41258 9.1 0.04% 3 0 2026-05-18T19:59:59.590000 OpenMRS is an open source electronic medical record system platform. From 2.7.0
CVE-2026-44717 9.8 0.25% 3 0 2026-05-18T19:59:59.590000 MCP Calculate Server is a mathematical calculation service based on MCP protocol
CVE-2026-45402 8.1 0.03% 2 0 2026-05-18T19:53:25.020000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-44570 8.3 0.04% 2 0 2026-05-18T19:52:38.637000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-8524 8.8 0.07% 1 0 2026-05-18T19:43:34.423000 Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed
CVE-2026-8529 8.8 0.07% 1 0 2026-05-18T19:41:53.163000 Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed
CVE-2026-45035 0 0.05% 2 0 2026-05-18T19:34:25.260000 Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1
CVE-2026-8776 8.8 0.04% 4 0 2026-05-18T19:22:47.003000 A vulnerability has been found in Edimax BR-6428NS 1.10. This vulnerability affe
CVE-2026-8518 8.8 0.08% 2 0 2026-05-18T19:17:26.423000 Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remot
CVE-2026-6346 8.7 0.00% 2 0 2026-05-18T18:39:52.200000 Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail
CVE-2026-8695 7.5 0.26% 1 0 2026-05-18T18:38:29.277000 radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list()
CVE-2026-44551 9.1 0.04% 2 0 2026-05-18T18:35:23.590000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-8509 8.8 0.06% 2 0 2026-05-18T18:34:39.533000 Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8511 9.6 0.07% 2 0 2026-05-18T18:34:17.750000 Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote a
CVE-2026-31431 7.8 2.57% 1 100 2026-05-18T18:32:28 In the Linux kernel, the following vulnerability has been resolved: crypto: alg
CVE-2026-45230 9.1 0.00% 2 0 2026-05-18T18:31:37 DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /a
CVE-2026-45495 8.8 0.00% 2 0 2026-05-18T18:31:37 Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
CVE-2026-42822 10.0 0.00% 4 0 2026-05-18T18:31:31 Improper authentication in Azure Local Disconnected Operations allows an unautho
CVE-2026-39079 7.5 0.00% 2 0 2026-05-18T18:31:30 An issue in prestashop upsshipping all versions through at least 2.4.0 allows a
CVE-2026-44553 8.1 0.03% 2 0 2026-05-18T18:29:30.137000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-7301 9.8 0.00% 2 0 2026-05-18T17:44:44.047000 SGLangs multimodal generation runtime scheduler's ROUTER socket binds to 0.0.0.0
CVE-2026-8686 7.5 0.03% 2 0 2026-05-18T17:44:14.880000 Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.
CVE-2026-8719 8.8 0.04% 4 0 2026-05-18T17:44:03.697000 The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPre
CVE-2026-8739 5.3 0.03% 2 0 2026-05-18T17:44:03.697000 A vulnerability was detected in Sanluan PublicCMS 5.202506.d. The affected eleme
CVE-2026-8737 5.3 0.05% 2 0 2026-05-18T17:44:03.697000 A weakness has been identified in Sanluan PublicCMS 5.202506.d. This issue affec
CVE-2026-8507 9.8 0.01% 2 0 2026-05-18T17:40:45.343000 Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) w
CVE-2026-45331 8.5 0.03% 2 0 2026-05-18T17:36:58.370000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45671 8.0 0.04% 2 0 2026-05-18T17:36:58.370000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45398 7.5 0.04% 3 0 2026-05-18T17:36:58.370000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45401 8.5 0.03% 2 0 2026-05-18T17:36:58.370000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-44565 8.1 0.06% 2 0 2026-05-18T17:36:58.370000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-44826 7.5 0.04% 2 0 2026-05-18T17:26:40.167000 Vvveb is a powerful and easy to use CMS with page builder to build websites, blo
CVE-2026-46408 7.6 0.03% 2 0 2026-05-18T17:26:40.167000 Vvveb is a powerful and easy to use CMS with page builder to build websites, blo
CVE-2026-46407 8.1 0.03% 2 0 2026-05-18T17:26:40.167000 Vvveb is a powerful and easy to use CMS with page builder to build websites, blo
CVE-2026-45010 9.1 0.12% 4 0 2026-05-18T17:25:39.493000 phpMyFAQ before 4.1.2 contains an improper restriction of excessive authenticati
CVE-2026-46366 7.5 0.06% 2 0 2026-05-18T17:25:39.493000 phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the ge
CVE-2026-46364 9.8 0.05% 3 0 2026-05-18T17:25:39.493000 phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in
CVE-2026-3220 8.8 0.03% 2 3 2026-05-18T17:05:46.240000 The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin
CVE-2026-6495 7.1 0.03% 2 0 2026-05-18T17:05:46.240000 The Ajax Load More WordPress plugin before 7.8.4 does not sanitise and escape a
CVE-2026-7304 9.8 0.00% 2 0 2026-05-18T15:31:41 SGLangs multimodal generation runtime is vulnerable to unauthenticated remote co
CVE-2026-41948 7.7 0.00% 2 0 2026-05-18T15:30:45 Dify version 1.14.1 and prior contain a path traversal vulnerability that allows
CVE-2026-7302 9.1 0.00% 2 0 2026-05-18T15:30:38 SGLangs multimodal generation runtime is vulnerable to an unauthenticated path t
CVE-2026-42009 7.5 0.00% 2 0 2026-05-18T15:30:38 A flaw was found in gnutls. A remote attacker could exploit an issue in the Data
CVE-2026-46333 5.5 0.03% 15 4 2026-05-18T15:30:37 In the Linux kernel, the following vulnerability has been resolved: ptrace: sli
CVE-2026-31635 7.5 0.05% 2 0 2026-05-18T15:16:25.370000 In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix
CVE-2026-7498 8.8 0.00% 4 0 2026-05-18T09:31:56 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-6347 7.6 0.00% 2 0 2026-05-18T09:31:56 Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail
CVE-2026-8786 6.3 0.03% 2 0 2026-05-18T06:31:18 A vulnerability has been found in Tencent WeKnora up to 0.3.6. Affected by this
CVE-2026-8775 8.8 0.04% 4 0 2026-05-18T03:32:43 A flaw has been found in Edimax BR-6428NS 1.10. This affects the function formL2
CVE-2026-43500 7.8 0.01% 4 14 2026-05-17T18:31:33 In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also
CVE-2026-8733 6.3 0.03% 2 0 2026-05-17T06:30:32 A vulnerability was found in Investintech SlimPDFReader up to 2.0.13. Affected b
CVE-2026-8725 7.3 0.04% 2 0 2026-05-17T03:30:29 A weakness has been identified in CoreWorxLab CAAL up to 1.6.0. The affected ele
CVE-2026-46728 8.2 0.00% 4 0 2026-05-17T00:31:39 Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification by
CVE-2020-17103 7.0 0.35% 4 3 2026-05-16T15:31:13 , aka 'Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerabili
CVE-2026-45375 9.0 0.04% 2 0 2026-05-16T01:16:17.333000 SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, S
CVE-2026-43904 7.8 0.01% 2 0 2026-05-16T01:16:16.447000 OpenImageIO is a toolset for reading, writing, and manipulating image files of a
CVE-2026-35194 8.1 0.05% 2 0 2026-05-16T00:32:14 Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and
CVE-2026-45400 8.5 0.03% 2 0 2026-05-15T23:55:30 ### Summary In the open-webui project, a parsing difference between the urlparse
CVE-2026-45675 8.1 0.05% 2 0 2026-05-15T23:55:05 ## Summary The LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-
CVE-2026-44554 8.1 0.04% 2 0 2026-05-15T23:52:50 # Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overw
CVE-2026-44555 7.6 0.04% 2 0 2026-05-15T23:52:35 # Base Model Routing Bypasses Access Control via Model Chaining ## Affected Com
CVE-2026-44552 8.7 0.03% 2 0 2026-05-15T23:52:30 # Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Ena
CVE-2026-44714 7.5 0.03% 1 0 2026-05-15T23:49:54 ### Summary `ScriptExecution.correctlySpends()` contains two fast-path verificat
CVE-2026-42155 None 0.04% 2 0 2026-05-15T23:48:44 Affected Version: OpenMage LTS ≤ 20.16.0 (confirmed on `20.16.0`) Affected File
CVE-2026-23998 7.5 0.02% 2 0 2026-05-15T23:48:24 ### Summary A vulnerability in Fleet’s Windows MDM management endpoint could al
CVE-2026-27886 None 0.11% 2 0 2026-05-15T23:44:52 ### Summary of CVE-2026-27886 Vulnerability Details - CVE: CVE-2026-27886 - CVS
CVE-2026-46367 7.6 0.01% 2 0 2026-05-15T21:31:45 phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Ut
CVE-2026-8696 7.5 0.23% 2 0 2026-05-15T21:31:45 radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() fu
CVE-2026-46359 7.5 0.03% 2 0 2026-05-15T21:31:42 phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::set
CVE-2026-8558 8.8 0.08% 2 0 2026-05-15T21:16:39.133000 Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-43907 8.3 0.04% 2 0 2026-05-15T19:43:22.767000 OpenImageIO is a toolset for reading, writing, and manipulating image files of a
CVE-2026-42897 8.1 12.34% 25 1 2026-05-15T19:35:52.963000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-34253 8.2 0.07% 1 0 2026-05-15T18:31:42 A buffer underflow vulnerability has been identified in the ogg123 utility from
CVE-2026-39054 7.3 1.69% 2 0 2026-05-15T18:31:41 Oinone Pamirs 7.0.0 contains a command injection vulnerability in CommandHelper.
CVE-2026-38728 7.5 0.10% 1 0 2026-05-15T18:31:38 An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to c
CVE-2026-42334 7.5 0.04% 2 0 2026-05-15T18:25:21.933000 Mongoose is a MongoDB object modeling tool designed to work in an asynchronous e
CVE-2026-43908 8.8 0.04% 2 0 2026-05-15T18:07:55.057000 OpenImageIO is a toolset for reading, writing, and manipulating image files of a
CVE-2026-24712 7.3 2.87% 2 0 2026-05-15T15:31:42 Northern.tech CFEngine Enterprise and Community before 3.21.8, 3.24.3, and 3.27.
CVE-2026-44523 10.0 0.01% 2 0 2026-05-15T15:16:52.960000 Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum
CVE-2026-42031 9.8 9.11% 2 0 template 2026-05-15T14:59:11.840000 CKAN is an open-source DMS (data management system) for powering data hubs and d
CVE-2026-44592 9.4 0.02% 2 0 2026-05-15T14:44:49.877000 Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_D
CVE-2026-41702 7.8 0.01% 1 0 2026-05-15T09:31:42 VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that o
CVE-2026-45665 8.1 0.03% 2 0 2026-05-15T01:55:56 ### Summary A Stored Cross-Site Scripting (XSS) vulnerability exists in the Bann
CVE-2026-8574 8.3 0.07% 1 0 2026-05-15T00:31:38 Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allow
CVE-2026-8520 8.3 0.06% 2 0 2026-05-15T00:31:37 Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attac
CVE-2026-8526 8.8 0.07% 1 0 2026-05-15T00:31:37 Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8513 8.3 0.07% 2 0 2026-05-15T00:31:36 Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allo
CVE-2026-8512 8.3 0.07% 2 0 2026-05-15T00:31:36 Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8510 7.5 0.07% 2 0 2026-05-15T00:31:36 Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 all
CVE-2026-8514 8.3 0.07% 2 0 2026-05-15T00:31:36 Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote
CVE-2026-8530 8.3 0.07% 2 0 2026-05-15T00:31:36 Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 al
CVE-2026-8527 8.8 0.08% 1 0 2026-05-15T00:31:36 Insufficient validation of untrusted input in Downloads in Google Chrome prior t
CVE-2026-8525 8.3 0.06% 1 0 2026-05-15T00:31:36 Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 al
CVE-2026-8523 8.3 0.07% 1 0 2026-05-15T00:31:36 Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote
CVE-2026-8534 8.3 0.07% 1 0 2026-05-15T00:31:36 Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.77
CVE-2026-8548 8.3 0.07% 1 0 2026-05-15T00:31:36 Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8542 8.3 0.07% 1 0 2026-05-15T00:30:30 Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allow
CVE-2026-8515 8.3 0.07% 2 0 2026-05-15T00:30:29 Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote
CVE-2026-8575 8.3 0.07% 1 0 2026-05-14T22:16:51.050000 Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote a
CVE-2026-8533 8.3 0.07% 1 0 2026-05-14T22:16:47.413000 Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed
CVE-2026-8531 8.8 0.06% 2 0 2026-05-14T22:16:47.267000 Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.16
CVE-2026-8519 8.8 0.07% 2 0 2026-05-14T22:16:46.123000 Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 al
CVE-2026-8521 7.5 0.03% 2 0 2026-05-14T21:30:54 Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8540 8.8 0.08% 1 0 2026-05-14T21:30:54 Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote a
CVE-2026-8549 8.8 0.08% 1 0 2026-05-14T21:30:54 Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remot
CVE-2026-8547 7.5 0.07% 1 0 2026-05-14T21:30:54 Insufficient policy enforcement in Passwords in Google Chrome on Windows prior t
CVE-2026-8555 8.8 0.08% 1 0 2026-05-14T21:30:54 Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowe
CVE-2026-8621 8.8 0.08% 2 0 2026-05-14T21:30:53 Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that al
CVE-2026-44586 8.3 0.05% 2 0 2026-05-14T21:22:56.313000 SiYuan is an open-source personal knowledge management system. From 2.1.12 to be
CVE-2026-8522 8.8 0.08% 2 0 2026-05-14T21:19:23.923000 Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allo
CVE-2026-8517 8.8 0.07% 2 0 2026-05-14T21:19:23.923000 Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.1
CVE-2026-8532 8.8 0.08% 1 0 2026-05-14T21:19:23.923000 Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remot
CVE-2026-8544 8.8 0.08% 1 0 2026-05-14T21:19:23.923000 Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remot
CVE-2026-8551 8.8 0.08% 1 0 2026-05-14T21:19:23.923000 Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a r
CVE-2026-8557 7.5 0.07% 1 0 2026-05-14T21:19:23.923000 Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed
CVE-2026-44516 7.6 0.03% 2 0 2026-05-14T20:54:42 ### Summary The `LoggingRestClientCustomizer` in the `web` module automatically
CVE-2026-44542 9.1 0.64% 2 0 2026-05-14T20:54:33 ### **Summary** Attacker-controlled path input is joined with a trusted base pa
CVE-2026-45338 7.7 0.03% 2 0 2026-05-14T20:19:57 ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in `_proce
CVE-2026-42945 8.1 0.15% 27 22 2026-05-14T20:17:05.413000 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo
CVE-2026-45303 7.7 0.03% 2 0 2026-05-14T20:16:11 ### Summary Through the HTML rendering view, scripts can be injected and execute
CVE-2026-44578 8.6 4.00% 2 7 template 2026-05-14T18:34:38.530000 Next.js is a React framework for building full-stack web applications. From 13.4
CVE-2026-43284 7.8 0.01% 4 28 2026-05-14T18:33:53 In the Linux kernel, the following vulnerability has been resolved: xfrm: esp:
CVE-2026-20182 10.0 25.95% 13 1 2026-05-14T18:33:03 May 2026: This security advisory provides the details and fix information for a
CVE-2025-15024 8.8 0.04% 2 0 2026-05-14T18:33:03 Improper Control of Generation of Code ('Code Injection') vulnerability in Yorda
CVE-2026-41615 9.6 0.10% 2 0 2026-05-14T18:33:03 Exposure of sensitive information to an unauthorized actor in Microsoft Authenti
CVE-2026-44513 8.8 0.12% 2 0 2026-05-14T18:30:57.103000 Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, a
CVE-2026-44827 8.8 0.12% 2 0 2026-05-14T18:30:57.103000 Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, di
CVE-2025-15023 8.8 0.04% 2 0 2026-05-14T18:19:37.060000 Incorrect Authorization vulnerability in Yordam Information Technology Consultin
CVE-2026-6473 8.8 0.06% 1 0 2026-05-14T15:32:05 Integer wraparound in multiple PostgreSQL server features allows an unprivileged
CVE-2026-43660 7.5 0.12% 1 0 2026-05-13T21:16:47.520000 A validation issue was addressed with improved logic. This issue is fixed in Saf
CVE-2026-28883 7.5 0.05% 1 0 2026-05-13T21:16:41.903000 A use-after-free issue was addressed with improved memory management. This issue
CVE-2026-8043 9.6 0.10% 1 0 2026-05-13T20:34:20.310000 External control of a file name in Ivanti Xtraction before version 2026.2 allows
CVE-2026-34659 9.6 3.74% 2 0 2026-05-13T19:38:48.113000 Adobe Connect versions 2025.9.15, 2025.8.157 and earlier are affected by a Deser
CVE-2026-0265 None 0.08% 1 1 2026-05-13T18:31:07 An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en
CVE-2026-40701 4.8 0.03% 1 0 2026-05-13T16:27:11.127000 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_ssl_module
CVE-2026-45091 9.1 0.01% 2 1 2026-05-13T16:24:39 In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embe
CVE-2026-40361 8.4 0.07% 2 0 2026-05-13T15:34:52.573000 Use after free in Microsoft Office Word allows an unauthorized attacker to execu
CVE-2026-36983 7.3 5.71% 2 0 2026-05-12T19:36:42.187000 D-Link DCS-932L v2.18.01 is vulnerable to Command Injection in the function sub_
CVE-2026-40369 7.8 0.02% 4 1 2026-05-12T18:30:50 Untrusted pointer dereference in Windows Kernel allows an authorized attacker to
CVE-2026-8051 7.2 1.46% 2 0 2026-05-12T15:31:49 OS command injection in Ivanti Virtual Traffic Manager before version 22.9r4 all
CVE-2026-0300 9.8 14.43% 1 8 2026-05-12T15:31:19 A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Capti
CVE-2026-7256 8.8 1.21% 2 0 2026-05-12T06:31:46 ** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI pro
CVE-2026-7411 10.0 0.13% 1 1 2026-05-11T16:22:43 In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequat
CVE-2026-7412 8.6 0.03% 1 0 2026-05-06T16:16:12.510000 In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, the Opera
CVE-2026-39987 9.8 81.84% 1 9 template 2026-04-27T16:30:09 ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal
CVE-2017-9841 9.8 94.21% 1 17 template 2026-04-21T18:00:56.903000 Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem
CVE-2026-34197 8.8 75.81% 2 12 template 2026-04-16T19:59:38.107000 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-3172 8.1 0.06% 1 0 2026-04-15T00:35:42.020000 Buffer overflow in parallel HNSW index build in pgvector 0.6.0 through 0.8.1 all
CVE-2026-32201 6.5 8.71% 1 1 2026-04-14T18:30:55 Improper input validation in Microsoft Office SharePoint allows an unauthorized
CVE-2026-24154 7.6 0.03% 2 0 2026-04-03T19:04:33.083000 NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker
CVE-2026-4289 7.3 0.04% 1 1 2026-03-17T00:31:40 A security vulnerability has been detected in Tiandy Easy7 Integrated Management
CVE-2026-20127 10.0 58.95% 1 7 2026-02-25T18:31:45 A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle
CVE-2018-4063 8.8 1.88% 2 0 2025-12-15T15:18:49.987000 An exploitable remote code execution vulnerability exists in the upload.cgi func
CVE-2023-22518 9.8 94.38% 2 9 template 2025-10-24T13:38:59.063000 All versions of Confluence Data Center and Server are affected by this unexploit
CVE-2023-38831 7.8 93.88% 2 61 2025-10-22T00:32:49 RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a use
CVE-2025-6793 9.4 87.03% 1 0 2025-07-14T17:16:32.440000 Marvell QConvergeConsole QLogicDownloadImpl Directory Traversal Arbitrary File D
CVE-2024-48760 9.8 66.58% 1 0 2025-01-23T18:32:22 An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code v
CVE-2023-30253 8.8 90.43% 1 8 2025-01-14T17:15:11.487000 Dolibarr before 17.0.1 allows remote code execution by an authenticated user via
CVE-2024-49767 7.5 1.09% 2 0 2025-01-03T12:15:26.257000 Werkzeug is a Web Server Gateway Interface web application library. Applications
CVE-2022-21894 4.4 42.69% 2 6 2024-11-21T06:45:39.280000 Secure Boot Security Feature Bypass Vulnerability
CVE-2023-24932 6.7 0.58% 2 4 2024-08-01T15:32:23 Secure Boot Security Feature Bypass Vulnerability
CVE-2012-1182 None 78.55% 1 1 2023-02-02T05:05:16 The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.
CVE-2026-46300 0 0.00% 8 5 N/A
CVE-2026-44633 0 0.03% 2 0 N/A
CVE-2026-43906 0 0.01% 2 0 N/A
CVE-2026-43905 0 0.01% 2 0 N/A
CVE-2026-43903 0 0.01% 2 0 N/A
CVE-2026-43909 0 0.04% 2 0 N/A
CVE-2026-44699 0 0.04% 2 0 N/A
CVE-2026-24401 0 0.04% 1 0 N/A

CVE-2026-8836
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T21:31:58

2 posts

A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters results in stack-based buffer overflow. The attack may be initiated remotely. The patch is named 0c957ec03054eb6c8205e9c9d1d05d90ada3898c. It is suggested to i

thehackerwire@mastodon.social at 2026-05-18T20:00:05.000Z ##

🔴 CVE-2026-8836 - Critical (9.8)

A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters result...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T20:00:05.000Z ##

🔴 CVE-2026-8836 - Critical (9.8)

A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters result...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8851
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-18T21:16:41.777000

2 posts

SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUserInAcls endpoint. Attackers can inject malicious SQL code to write extracted data into the sogo_acl table and retrieve it through the /acls API, establish

thehackerwire@mastodon.social at 2026-05-18T22:00:34.000Z ##

🟠 CVE-2026-8851 - High (8.1)

SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUser...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T22:00:34.000Z ##

🟠 CVE-2026-8851 - High (8.1)

SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUser...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8838
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T21:16:41.623000

2 posts

Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client. To remediate this issue, users should upgrade to version 2.1.14.

thehackerwire@mastodon.social at 2026-05-18T22:00:24.000Z ##

🔴 CVE-2026-8838 - Critical (9.8)

Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client.

To remediate this issue,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T22:00:24.000Z ##

🔴 CVE-2026-8838 - Critical (9.8)

Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client.

To remediate this issue,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27130
(9.9 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T21:16:39.890000

2 posts

Dokploy is a free, self-hostable Platform as a Service (PaaS). Versions 0.26.6 and below have OS command injection through the appName parameter. 3 chained issues cause this problem: inadequate input sanitization, lack of schema validation and direct shell interpolation. User-controlled application names are passed through inadequate sanitization (cleanAppName function only replaces spaces and con

thehackerwire@mastodon.social at 2026-05-18T22:02:25.000Z ##

🔴 CVE-2026-27130 - Critical (9.9)

Dokploy is a free, self-hostable Platform as a Service (PaaS). Versions 0.26.6 and below have OS command injection through the appName parameter. 3 chained issues cause this problem: inadequate input sanitization, lack of schema validation and dir...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T22:02:25.000Z ##

🔴 CVE-2026-27130 - Critical (9.9)

Dokploy is a free, self-hostable Platform as a Service (PaaS). Versions 0.26.6 and below have OS command injection through the appName parameter. 3 chained issues cause this problem: inadequate input sanitization, lack of schema validation and dir...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25244
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T21:16:39.547000

2 posts

WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration. Git permits branch names containing shell metacharacters, and getGitMetadataForAISelection() interpolates these names directly into execSync() calls wi

thehackerwire@mastodon.social at 2026-05-18T22:02:15.000Z ##

🔴 CVE-2026-25244 - Critical (9.8)

WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T22:02:15.000Z ##

🔴 CVE-2026-25244 - Critical (9.8)

WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22810
(8.2 HIGH)

EPSS: 0.00%

updated 2026-05-18T21:16:39.373000

2 posts

Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote converter does not sanitize the names of embedded files before writing them to disk. As a result, it's possible for an attacker to create a malicious .on

thehackerwire@mastodon.social at 2026-05-18T22:00:44.000Z ##

🟠 CVE-2026-22810 - High (8.2)

Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T22:00:44.000Z ##

🟠 CVE-2026-22810 - High (8.2)

Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-56352
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-18T20:27:23.023000

2 posts

In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the broker mishandles protocol violations during CONNECT packet parsing. When receiving a CONNECT packet with a zero-length Client ID while CleanSession is set to 0, the broker correctly replies with a CONNACK return code 0x02 (Identifier Rejected) but fails to explicitly close the TCP connection. Since the surrounding conne

thehackerwire@mastodon.social at 2026-05-18T21:00:36.000Z ##

🟠 CVE-2025-56352 - High (7.5)

In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the broker mishandles protocol violations during CONNECT packet parsing. When receiving a CONNECT packet with a zero-length Client ID while CleanSession is set to 0, the bro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T21:00:36.000Z ##

🟠 CVE-2025-56352 - High (7.5)

In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the broker mishandles protocol violations during CONNECT packet parsing. When receiving a CONNECT packet with a zero-length Client ID while CleanSession is set to 0, the bro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-57282
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-18T20:27:12.817000

2 posts

ngrok v4.3.3 and 5.0.0-beta.2 is vulnerable to Command Injection.

CVE-2026-41085
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-18T20:27:12.817000

2 posts

Thermo Fisher Scientific Torrent Suite Dx through 5.14.2 has a privilege escalation vulnerability that may allow an authenticated user with limited access privileges to gain unauthorized administrator-level privileges through exploitation of specific system interfaces.

thehackerwire@mastodon.social at 2026-05-18T21:00:26.000Z ##

🟠 CVE-2026-41085 - High (8.8)

Thermo Fisher Scientific Torrent Suite Dx through 5.14.2 has a privilege escalation vulnerability that may allow an authenticated user with limited access privileges to gain unauthorized administrator-level privileges through exploitation of speci...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T21:00:26.000Z ##

🟠 CVE-2026-41085 - High (8.8)

Thermo Fisher Scientific Torrent Suite Dx through 5.14.2 has a privilege escalation vulnerability that may allow an authenticated user with limited access privileges to gain unauthorized administrator-level privileges through exploitation of speci...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8657
(8.2 HIGH)

EPSS: 0.05%

updated 2026-05-18T20:27:12.817000

4 posts

Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or JSON Patch documents, as attacker-controlled property names and path segments are used to traverse and modify objects without restricting access to specia

offseq at 2026-05-17T01:30:26.459Z ##

⚠️ HIGH severity: CVE-2026-8657 in jsondiffpatch <0.7.6 enables remote prototype pollution via patch APIs. Patch status unconfirmed — avoid untrusted input & monitor vendor updates. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-16T13:00:14.000Z ##

🟠 CVE-2026-8657 - High (8.2)

Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or J...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-17T01:30:26.000Z ##

⚠️ HIGH severity: CVE-2026-8657 in jsondiffpatch <0.7.6 enables remote prototype pollution via patch APIs. Patch status unconfirmed — avoid untrusted input & monitor vendor updates. Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #NodeJS #vuln

##

thehackerwire@mastodon.social at 2026-05-16T13:00:14.000Z ##

🟠 CVE-2026-8657 - High (8.2)

Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or J...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47092
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-18T20:19:31.307000

2 posts

Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability that allows local attackers to execute arbitrary commands by manipulating the COMSPEC environment variable. Attackers can set COMSPEC to an arbitrary binary path before claude-hud performs its version check, causing execFile() to execute the attacker-supplied executable with cmd.exe arguments, resultin

thehackerwire@mastodon.social at 2026-05-18T21:00:00.000Z ##

🟠 CVE-2026-47092 - High (7.8)

Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability that allows local attackers to execute arbitrary commands by manipulating the COMSPEC environment variable. Attackers can set COMSPEC to an arbitrary ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T21:00:00.000Z ##

🟠 CVE-2026-47092 - High (7.8)

Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability that allows local attackers to execute arbitrary commands by manipulating the COMSPEC environment variable. Attackers can set COMSPEC to an arbitrary ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8724
(4.7 MEDIUM)

EPSS: 0.01%

updated 2026-05-18T20:16:40.220000

2 posts

A security flaw has been discovered in Dataease 2.10.20. Impacted is the function SqlparserUtils.transFilter of the file SqlparserUtils.java of the component Data Dashboard. The manipulation results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure.

offseq at 2026-05-17T04:30:26.818Z ##

MEDIUM severity: CVE-2026-8724 in Dataease 2.10.20 allows SQL injection via SqlparserUtils.transFilter. Exploit requires high-priv user. No patch yet — restrict access & monitor for suspicious queries. More: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T04:30:26.000Z ##

MEDIUM severity: CVE-2026-8724 in Dataease 2.10.20 allows SQL injection via SqlparserUtils.transFilter. Exploit requires high-priv user. No patch yet — restrict access & monitor for suspicious queries. More: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #InfoSec

##

CVE-2026-45672
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-18T20:16:39.537000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has set ENABLE_CODE_EXECUTION=false. The feature gate is not enforced on the API endpoint — the configuration says "disabled" but code still executes. This vu

1 repos

https://github.com/CryptReaper12/CVE-2026-45672

thehackerwire@mastodon.social at 2026-05-16T15:59:51.000Z ##

🟠 CVE-2026-45672 - High (8.8)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T15:59:51.000Z ##

🟠 CVE-2026-45672 - High (8.8)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45301
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-18T20:16:38.997000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file uploaded by every user to the platform. This vulnerability is fixed in 0.3.16.

thehackerwire@mastodon.social at 2026-05-16T13:01:07.000Z ##

🟠 CVE-2026-45301 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:01:07.000Z ##

🟠 CVE-2026-45301 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45315
(8.7 HIGH)

EPSS: 0.02%

updated 2026-05-18T20:11:38.523000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/audio/transcriptions/.. The /cache/{path} route serves these files via FileResponse, which sets Content-Type from the on-disk extension and emits no Cont

thehackerwire@mastodon.social at 2026-05-16T13:00:34.000Z ##

🟠 CVE-2026-45315 - High (8.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:00:34.000Z ##

🟠 CVE-2026-45315 - High (8.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41258
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-18T19:59:59.590000

3 posts

OpenMRS is an open source electronic medical record system platform. From 2.7.0 to before 2.7.9 and 2.8.6, the ConceptReferenceRangeUtility.evaluateCriteria() method in OpenMRS Core evaluates database-stored criteria strings as Apache Velocity templates without any sandbox configuration. The VelocityEngine is initialized with only logging properties and noSecureUberspector, leaving the default Ube

offseq at 2026-05-16T07:30:26.862Z ##

🚨 CRITICAL: CVE-2026-41258 impacts OpenMRS Core 2.7.0-2.7.8 & 2.8.0-2.8.5. Privileged users can inject Java via Velocity templates, risking full system compromise. Patch to 2.7.9/2.8.6 now. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-16T07:30:26.000Z ##

🚨 CRITICAL: CVE-2026-41258 impacts OpenMRS Core 2.7.0-2.7.8 & 2.8.0-2.8.5. Privileged users can inject Java via Velocity templates, risking full system compromise. Patch to 2.7.9/2.8.6 now. Details: radar.offseq.com/threat/cve-20 #OffSeq #OpenMRS #vuln #healthcare

##

thehackerwire@mastodon.social at 2026-05-15T17:37:58.000Z ##

🔴 CVE-2026-41258 - Critical (9.1)

OpenMRS is an open source electronic medical record system platform. From 2.7.0 to before 2.7.9 and 2.8.6, the ConceptReferenceRangeUtility.evaluateCriteria() method in OpenMRS Core evaluates database-stored criteria strings as Apache Velocity tem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44717
(9.8 CRITICAL)

EPSS: 0.25%

updated 2026-05-18T19:59:59.590000

3 posts

MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulnerability is fixed in 0.1.1.

offseq at 2026-05-16T04:30:28.787Z ##

🛡️ CRITICAL RCE: CVE-2026-44717 impacts 611711Dark mcp_calculate_server <0.1.1. Unsanitized eval() use enables remote code execution. Upgrade to 0.1.1 immediately to mitigate. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-16T04:30:28.000Z ##

🛡️ CRITICAL RCE: CVE-2026-44717 impacts 611711Dark mcp_calculate_server <0.1.1. Unsanitized eval() use enables remote code execution. Upgrade to 0.1.1 immediately to mitigate. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE #infosec #security

##

thehackerwire@mastodon.social at 2026-05-15T17:36:31.000Z ##

🔴 CVE-2026-44717 - Critical (9.8)

MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45402
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-18T19:53:25.020000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge, knowledge-base contents) without verifying that the caller owns or has been granted access to the file. The file's content then becomes reachable throu

thehackerwire@mastodon.social at 2026-05-16T15:00:12.000Z ##

🟠 CVE-2026-45402 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T15:00:12.000Z ##

🟠 CVE-2026-45402 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44570
(8.3 HIGH)

EPSS: 0.04%

updated 2026-05-18T19:52:38.637000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, restore, and view the contents of other users' memories. Using a newly created non-admin user with no existing memories, it is possible to view existing memor

thehackerwire@mastodon.social at 2026-05-16T13:00:58.000Z ##

🟠 CVE-2026-44570 - High (8.3)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, resto...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:00:58.000Z ##

🟠 CVE-2026-44570 - High (8.3)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, resto...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8524
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-18T19:43:34.423000

1 posts

Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:07.000Z ##

🟠 CVE-2026-8524 - High (8.8)

Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8529
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-18T19:41:53.163000

1 posts

Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted video file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:53.000Z ##

🟠 CVE-2026-8529 - High (8.8)

Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted video file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45035
(0 None)

EPSS: 0.05%

updated 2026-05-18T19:34:25.260000

2 posts

Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1.0.233, Tabby registers itself as the handler for the tabby:// URL scheme on all platforms. The URL scheme handler supports a run command that directly executes OS commands with no user confirmation, sanitization, or sandboxing. An attacker can craft a malicious link (tabby://run?command=...) and deliver it via a websi

offseq at 2026-05-16T06:00:28.451Z ##

🚨 CVE-2026-45035 (CRITICAL, CVSS 9.4): Tabby < 1.0.233 exposes users to RCE via tabby:// links. Any click can run OS commands with user privileges. Patch to 1.0.233+ ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-16T06:00:28.000Z ##

🚨 CVE-2026-45035 (CRITICAL, CVSS 9.4): Tabby < 1.0.233 exposes users to RCE via tabby:// links. Any click can run OS commands with user privileges. Patch to 1.0.233+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #RCE #Tabby #Vuln

##

CVE-2026-8776
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-18T19:22:47.003000

4 posts

A vulnerability has been found in Edimax BR-6428NS 1.10. This vulnerability affects the function formPPTPSetup of the file /goform/formPPTPSetup of the component POST Request Handler. Such manipulation of the argument pptpUserName leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early abou

thehackerwire@mastodon.social at 2026-05-18T03:00:29.000Z ##

🟠 CVE-2026-8776 - High (8.8)

A vulnerability has been found in Edimax BR-6428NS 1.10. This vulnerability affects the function formPPTPSetup of the file /goform/formPPTPSetup of the component POST Request Handler. Such manipulation of the argument pptpUserName leads to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-18T01:30:30.045Z ##

🚨 CVE-2026-8776: HIGH severity buffer overflow in Edimax BR-6428NS v1.10 (formPPTPSetup, pptpUserName). Public exploit, remote attack possible. Vendor unresponsive. Assess exposure & mitigate risk now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-18T03:00:29.000Z ##

🟠 CVE-2026-8776 - High (8.8)

A vulnerability has been found in Edimax BR-6428NS 1.10. This vulnerability affects the function formPPTPSetup of the file /goform/formPPTPSetup of the component POST Request Handler. Such manipulation of the argument pptpUserName leads to buffer ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-18T01:30:30.000Z ##

🚨 CVE-2026-8776: HIGH severity buffer overflow in Edimax BR-6428NS v1.10 (formPPTPSetup, pptpUserName). Public exploit, remote attack possible. Vendor unresponsive. Assess exposure & mitigate risk now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #IoTSecurity

##

CVE-2026-8518
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-18T19:17:26.423000

2 posts

Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T02:00:11.000Z ##

🟠 CVE-2026-8518 - High (8.8)

Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T02:00:11.000Z ##

🟠 CVE-2026-8518 - High (8.8)

Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6346
(8.7 HIGH)

EPSS: 0.00%

updated 2026-05-18T18:39:52.200000

2 posts

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with access to a support packet to obtain sensitive credentials in plaintext via downloading a support packet from the System Console.. Mattermost Advisory ID: MMSA-2026-00

thehackerwire@mastodon.social at 2026-05-18T18:00:16.000Z ##

🟠 CVE-2026-6346 - High (8.7)

Mattermost versions 11.5.x &lt;= 11.5.1, 10.11.x &lt;= 10.11.13, 11.4.x &lt;= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T18:00:16.000Z ##

🟠 CVE-2026-6346 - High (8.7)

Mattermost versions 11.5.x &lt;= 11.5.1, 10.11.x &lt;= 10.11.13, 11.4.x &lt;= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with acces...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8695
(7.5 HIGH)

EPSS: 0.26%

updated 2026-05-18T18:38:29.277000

1 posts

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers can exploit this vulnerability through GDB remote debugging to cause a denial of service or potentially achieve code execution by manipulating thread list

thehackerwire@mastodon.social at 2026-05-15T17:36:22.000Z ##

🟠 CVE-2026-8695 - High (7.5)

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44551
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-18T18:35:23.590000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against the LDAP server. The LdapForm Pydantic model accepts password: str with no minimum length constraint, so an empty string passes validation. The subsequen

thehackerwire@mastodon.social at 2026-05-16T17:00:11.000Z ##

🔴 CVE-2026-44551 - Critical (9.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T17:00:11.000Z ##

🔴 CVE-2026-44551 - Critical (9.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8509
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-18T18:34:39.533000

2 posts

Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T09:00:01.000Z ##

🟠 CVE-2026-8509 - High (8.8)

Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T09:00:01.000Z ##

🟠 CVE-2026-8509 - High (8.8)

Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8511
(9.6 CRITICAL)

EPSS: 0.07%

updated 2026-05-18T18:34:17.750000

2 posts

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T09:59:54.000Z ##

🔴 CVE-2026-8511 - Critical (9.6)

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T09:59:54.000Z ##

🔴 CVE-2026-8511 - Critical (9.6)

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-31431
(7.8 HIGH)

EPSS: 2.57%

updated 2026-05-18T18:32:28

1 posts

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just

100 repos

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431

https://github.com/insomnisec/Detections-CVE-2026-31431

https://github.com/wvverez/CVE-2026-31431-Copy-Fail

https://github.com/Koshmare-Blossom/Copyfail-sh

https://github.com/lonelyor/CVE-2026-31431-exp

https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC

https://github.com/Alfredooe/CVE-2026-31431

https://github.com/MrAriaNet/cPanel-Fix

https://github.com/AdityaBhatt3010/CVE-2026-31431

https://github.com/krisiasty/vcheck

https://github.com/SeanRickerd/cve-2026-31431

https://github.com/desultory/CVE-2026-31431

https://github.com/gagaltotal/cve-2026-31431-copy-fail

https://github.com/First-John/CVE-2026-43500

https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431

https://github.com/JuanBindez/CVE-2026-31431

https://github.com/bigwario/copy-fail-CVE-2026-31431-C

https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431

https://github.com/Boos4721/copyfail-rs

https://github.com/philfry/cve-2026-31431-ftrace

https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs

https://github.com/gbonacini/CVE-2026-31431

https://github.com/guiimoraes/CVE-2026-31431

https://github.com/tgies/copy-fail-c

https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail

https://github.com/0xShe/CVE-2026-31431

https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation

https://github.com/AliHzSec/CVE-2026-31431

https://github.com/aestechno/cve-2026-31431-ansible

https://github.com/povzayd/CVE-2026-31431

https://github.com/XsanFlip/CVE-2026-31431-Patch

https://github.com/jbnetwork-git/copy-fail-check

https://github.com/RoflSecurity/copy_fail

https://github.com/samanzamani/copy-fail-checker

https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite

https://github.com/theori-io/copy-fail-CVE-2026-31431

https://github.com/diemoeve/copyfail-rs

https://github.com/ncmprbll/copy-fail-rs

https://github.com/sammwyy/copyfail-rs

https://github.com/professional-slacker/alg_check

https://github.com/Sl4cK0TH/CVE-2026-31431-PoC

https://github.com/qi4L/CVE-2026-31431-Container-Escape

https://github.com/yuspring/cve-2026-31431-poc

https://github.com/toxy4ny/copy-fail-exploit-on-c-redteam

https://github.com/yxdm02/CVE-2026-31431

https://github.com/kadir/copy-fail-CVE-2026-31431-IOC

https://github.com/ben-slates/CVE-2026-31431-Exploit

https://github.com/wesmar/CVE-2026-31431

https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script

https://github.com/ExploitEoom/CVE-2026-31431

https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection

https://github.com/Dabbleam/CVE-2026-31431-mitigation

https://github.com/malwarekid/CVE-2026-31431

https://github.com/bootsareme/copyfail-deconstructed

https://github.com/adityasingh108/CVE-2026-31431-Metasploit-exploit

https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431

https://github.com/Xerxes-2/CVE-2026-31431-rs

https://github.com/Dullpurple-sloop726/CVE-2026-31431-Linux-Copy-Fail

https://github.com/ZephrFish/CopyFail-CVE-2026-31431

https://github.com/rfxn/copyfail

https://github.com/cyber-joker/copy-fail-python

https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431

https://github.com/sudoytang/copyfail-arm64

https://github.com/EynaExp/Copy-Fail-CVE-2026-31431-modernized

https://github.com/suominen/CVE-2026-31431

https://github.com/pascal-gujer/CVE-2026-31431

https://github.com/sgkdev/page_inject

https://github.com/sec17br/CVE-2026-31431-Copy-Fail

https://github.com/abdullaabdullazade/CVE-2026-31431

https://github.com/darioomatos/cve-2026-31431-copyfail

https://github.com/H1d3r/copy-fail_LPE_Interactive

https://github.com/ErdemOzgen/copy-fail-cve-2026-31431

https://github.com/Huchangzhi/autorootlinux

https://github.com/wuwu001/CVE-2026-31431-exploit

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC

https://github.com/rvizx/CVE-2026-31431

https://github.com/MartinPham/copy-fail-CVE-2026-31431-php

https://github.com/cozystack/copy-fail-blocker

https://github.com/0xBlackash/CVE-2026-31431

https://github.com/rootsecdev/cve_2026_31431

https://github.com/4xura/CVE-2026-31431-Copy-Fail

https://github.com/b5null/CVE-2026-31431-C

https://github.com/mrunalp/block-copyfail

https://github.com/xn0kkx/CVE-2026-31431_CopyFail_LinuxKernel_LPE

https://github.com/Smarttfoxx/copyfail

https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit

https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit

https://github.com/wgnet/wg.copyfail.patch

https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe

https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE

https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431

https://github.com/atgreen/block-copyfail

https://github.com/xeloxa/copyfail-exploit

https://github.com/pedromizz/copy-fail

https://github.com/rippsec/CVE-2026-31431-Copy-Fail

https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag

https://github.com/badsectorlabs/copyfail-go

https://github.com/adysec/cve-2026-31431

frederik@blog.frehi.be at 2026-05-18T19:29:18.000Z ##

Security updates: Debian vs Ubuntu, AlmaLinux vs Rocky Linux

The last couple of weeks were turbulent for the Linux kernel: several critical security problems were disclosed . Three of them are local privilege escalation bugs: they allow any local user to become root. The vulnerabilities are named Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284, CVE-2026-43500), Fragnesia (CVE-2026-46300). The fourth vulnerability, named ssh-keysign-pwn (CVE-2026-46333) allows a user to read root owned files, such as host SSH keys. There are exploits publicly […]

blog.frehi.be/2026/05/18/secur

##

CVE-2026-45230
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T18:31:37

2 posts

DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /api/delete-file endpoint and filesToDelete array parameters that allows unauthenticated attackers to delete arbitrary files by supplying ../ sequences that bypass directory boundary validation. Attackers can exploit the optional and disabled-by-default authentication control to traverse outside the intended application

thehackerwire@mastodon.social at 2026-05-18T19:01:09.000Z ##

🔴 CVE-2026-45230 - Critical (9.1)

DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /api/delete-file endpoint and filesToDelete array parameters that allows unauthenticated attackers to delete arbitrary files by supplying ../ sequences that bypass direc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T19:01:09.000Z ##

🔴 CVE-2026-45230 - Critical (9.1)

DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /api/delete-file endpoint and filesToDelete array parameters that allows unauthenticated attackers to delete arbitrary files by supplying ../ sequences that bypass direc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45495
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-18T18:31:37

2 posts

Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability

CVE-2026-42822
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T18:31:31

4 posts

Improper authentication in Azure Local Disconnected Operations allows an unauthorized attacker to elevate privileges over a network.

nyanbinary at 2026-05-18T20:07:09.020Z ##

RE: infosec.exchange/@perfect10_bo

msrc.microsoft.com/update-guid

What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could gain elevated privileges beyond those normally available to them, allowing actions such as accessing restricted information or performing operations that are typically limited to more highly privileged users or administrators.

:blob_neutral_face:

fr, wtaf is this advisory?

##

thehackerwire@mastodon.social at 2026-05-18T19:01:20.000Z ##

🔴 CVE-2026-42822 - Critical (10)

Improper authentication in Azure Local Disconnected Operations allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

nyanbinary@infosec.exchange at 2026-05-18T20:07:09.000Z ##

RE: infosec.exchange/@perfect10_bo

msrc.microsoft.com/update-guid

What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could gain elevated privileges beyond those normally available to them, allowing actions such as accessing restricted information or performing operations that are typically limited to more highly privileged users or administrators.

:blob_neutral_face:

fr, wtaf is this advisory?

##

thehackerwire@mastodon.social at 2026-05-18T19:01:20.000Z ##

🔴 CVE-2026-42822 - Critical (10)

Improper authentication in Azure Local Disconnected Operations allows an unauthorized attacker to elevate privileges over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39079
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-18T18:31:30

2 posts

An issue in prestashop upsshipping all versions through at least 2.4.0 allows a remote attacker to obtain sensitive information via the /modules/upsshipping/logs/, and /modules/upsshipping/lib/UPSBaseApi.php components

thehackerwire@mastodon.social at 2026-05-18T17:00:12.000Z ##

🟠 CVE-2026-39079 - High (7.5)

An issue in prestashop upsshipping all versions through at least 2.4.0 allows a remote attacker to obtain sensitive information via the /modules/upsshipping/logs/, and /modules/upsshipping/lib/UPSBaseApi.php components

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T17:00:12.000Z ##

🟠 CVE-2026-39079 - High (7.5)

An issue in prestashop upsshipping all versions through at least 2.4.0 allows a remote attacker to obtain sensitive information via the /modules/upsshipping/logs/, and /modules/upsshipping/lib/UPSBaseApi.php components

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44553
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-18T18:29:30.137000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whose admin role has been revoked retains admin privileges within their existing Socket.IO session for as long as they keep the connection alive (via automat

thehackerwire@mastodon.social at 2026-05-16T18:00:01.000Z ##

🟠 CVE-2026-44553 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T18:00:01.000Z ##

🟠 CVE-2026-44553 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7301
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T17:44:44.047000

2 posts

SGLangs multimodal generation runtime scheduler's ROUTER socket binds to 0.0.0.0 by default and contains a sink that calls pickle.loads() on incoming messages, enabling RCE when exposed to the internet.

thehackerwire@mastodon.social at 2026-05-18T16:00:33.000Z ##

🔴 CVE-2026-7301 - Critical (9.8)

SGLangs multimodal generation runtime scheduler's ROUTER socket binds to 0.0.0.0 by default and contains a sink that calls pickle.loads() on incoming messages, enabling RCE when exposed to the internet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T16:00:33.000Z ##

🔴 CVE-2026-7301 - Critical (9.8)

SGLangs multimodal generation runtime scheduler's ROUTER socket binds to 0.0.0.0 by default and contains a sink that calls pickle.loads() on incoming messages, enabling RCE when exposed to the internet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8686
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-18T17:44:14.880000

2 posts

Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet. To remediate this issue, users should upgrade to v5.0.1.

thehackerwire@mastodon.social at 2026-05-16T19:00:00.000Z ##

🟠 CVE-2026-8686 - High (7.5)

Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet.

To remediate this issue, users should upgrade to v5.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T19:00:00.000Z ##

🟠 CVE-2026-8686 - High (7.5)

Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet.

To remediate this issue, users should upgrade to v5.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8719
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-18T17:44:03.697000

4 posts

The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, where any valid OAuth token causes MCP access to be granted without verifying administrator privileges. This makes it possible for authenticated (Subscribe

offseq at 2026-05-17T10:30:27.355Z ##

⚠️ CVE-2026-8719 (HIGH, CVSS 8.8): AI Engine for WordPress v3.4.9 lets any OAuth token holder with Subscriber+ escalate to admin via MCP tools. Restrict OAuth, monitor for fixes. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-17T06:59:49.000Z ##

🟠 CVE-2026-8719 - High (8.8)

The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-17T10:30:27.000Z ##

⚠️ CVE-2026-8719 (HIGH, CVSS 8.8): AI Engine for WordPress v3.4.9 lets any OAuth token holder with Subscriber+ escalate to admin via MCP tools. Restrict OAuth, monitor for fixes. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #PrivilegeEscalation

##

thehackerwire@mastodon.social at 2026-05-17T06:59:49.000Z ##

🟠 CVE-2026-8719 - High (8.8)

The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8739
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-05-18T17:44:03.697000

2 posts

A vulnerability was detected in Sanluan PublicCMS 5.202506.d. The affected element is the function getSignKey of the file publiccms-core/src/main/java/com/publiccms/logic/component/config/SafeConfigComponent.java. The manipulation of the argument privatefile_key results in use of hard-coded cryptographic key . The attack can be executed remotely. The exploit is now public and may be used. The ven

offseq at 2026-05-17T09:00:27.402Z ##

🔒 MEDIUM severity: Sanluan PublicCMS 5.202506.d suffers from a hard-coded cryptographic key (CVE-2026-8739), enabling remote exploitation. No patch yet — restrict access, monitor for updates. Exploit code public. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T09:00:27.000Z ##

🔒 MEDIUM severity: Sanluan PublicCMS 5.202506.d suffers from a hard-coded cryptographic key (CVE-2026-8739), enabling remote exploitation. No patch yet — restrict access, monitor for updates. Exploit code public. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #PublicCMS

##

CVE-2026-8737
(5.3 MEDIUM)

EPSS: 0.05%

updated 2026-05-18T17:44:03.697000

2 posts

A weakness has been identified in Sanluan PublicCMS 5.202506.d. This issue affects the function execute of the file publiccms-trade/src/main/java/com/publiccms/views/directive/trade/TradeAddressListDirective.java of the component Trade Address Query Handler. Executing a manipulation of the argument userId/id can lead to missing authentication. The attack may be launched remotely. The exploit has b

offseq at 2026-05-17T07:30:23.742Z ##

🔎 MEDIUM severity: CVE-2026-8737 affects Sanluan PublicCMS 5.202506.d — missing authentication in Trade Address Query Handler. Public exploit is out. Restrict access & monitor for abuse. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T07:30:23.000Z ##

🔎 MEDIUM severity: CVE-2026-8737 affects Sanluan PublicCMS 5.202506.d — missing authentication in Trade Address Query Handler. Public exploit is out. Restrict access & monitor for abuse. radar.offseq.com/threat/cve-20 #OffSeq #Sanluan #Vulnerability #InfoSec

##

CVE-2026-8507
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-05-18T17:40:45.343000

2 posts

Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) write flaws. When parsing a PKCS12 file, with a >= 1 GiB OCTET STRING (or BIT STRING) attribute on a SAFEBAG, via info() or info_as_hash(), a heap out-of-bounds write would be triggered with remote-code-execution potential (RCE) due to a signed integer overflow in the size calculation passed to Renew().

offseq at 2026-05-18T00:00:36.930Z ##

🚨 CVE-2026-8507 (HIGH): Out-of-bounds write in Crypt::OpenSSL::PKCS12 <=1.94 for Perl. Parsing PKCS12 files with >=1GiB OCTET/BIT STRING may lead to RCE. Patch available for cloud-hosted service — update ASAP. No known exploits. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-18T00:00:36.000Z ##

🚨 CVE-2026-8507 (HIGH): Out-of-bounds write in Crypt::OpenSSL::PKCS12 <=1.94 for Perl. Parsing PKCS12 files with >=1GiB OCTET/BIT STRING may lead to RCE. Patch available for cloud-hosted service — update ASAP. No known exploits. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Perl

##

CVE-2026-45331
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-18T17:36:58.370000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does NOT implement the private keyword for IPv6 — the call raises a ValidationError (which is falsy in a boolean context), so every IPv6 address passes the f

thehackerwire@mastodon.social at 2026-05-16T17:00:01.000Z ##

🟠 CVE-2026-45331 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T17:00:01.000Z ##

🟠 CVE-2026-45331 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45671
(8.0 HIGH)

EPSS: 0.04%

updated 2026-05-18T17:36:58.370000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is referenced in any shared chat. The has_access_to_file() authorization gate unconditionally grants access through its shared-chat branch. It checks neither the

thehackerwire@mastodon.social at 2026-05-16T16:00:11.000Z ##

🟠 CVE-2026-45671 - High (8)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is refer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T16:00:11.000Z ##

🟠 CVE-2026-45671 - High (8)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is refer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45398
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-18T17:36:58.370000

3 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collections, which use raw UUIDs as collection names. Any authenticated user who knows a private knowledge base UUID can read its content through the retrieval

thehackerwire@mastodon.social at 2026-05-16T16:00:00.000Z ##

🟠 CVE-2026-45398 - High (7.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collect...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T16:00:00.000Z ##

🟠 CVE-2026-45398 - High (7.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collect...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-05-15T16:43:22.000Z ##

Tenable Research Advisories listed these two items yesterday.

- Microsoft Foundry Toolkit for VS Code: Command Injection via Python Interpreter Path Leading to Arbitrary Code Execution tenable.com/security/research/ #Linux #macOS #Microsoft #Python

- CVE-2026-45398 - IDOR: Retrieval API Bypasses Knowledge Base Access Controls tenable.com/security/research/ @tenable #infosec #vulnerability #threatresearch

##

CVE-2026-45401
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-18T17:36:58.370000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The HTTP clients used downstream (sync requests, async aiohttp, langchain's WebBaseLoader) follow HTTP 3xx redirects by default and do not re-validate the r

thehackerwire@mastodon.social at 2026-05-16T15:00:02.000Z ##

🟠 CVE-2026-45401 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T15:00:02.000Z ##

🟠 CVE-2026-45401 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44565
(8.1 HIGH)

EPSS: 0.06%

updated 2026-05-18T17:36:58.370000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitized. This allows for users to upload files with names containing dot-segments in the file path and traverse out of the intended uploads directory. Effecti

thehackerwire@mastodon.social at 2026-05-16T14:00:57.000Z ##

🟠 CVE-2026-44565 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitiz...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T14:00:57.000Z ##

🟠 CVE-2026-44565 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitiz...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44826
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-18T17:26:40.167000

2 posts

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is accepted by the server and treated as a normal positive line-item, but with the sign carried through into every downstream computation: line total, sub-tota

thehackerwire@mastodon.social at 2026-05-16T23:59:52.000Z ##

🟠 CVE-2026-44826 - High (7.5)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is acc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T23:59:52.000Z ##

🟠 CVE-2026-44826 - High (7.5)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is acc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46408
(7.6 HIGH)

EPSS: 0.03%

updated 2026-05-18T17:26:40.167000

2 posts

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownership. A logged-in attacker can therefore reuse another user's cart data in their own checkout session. This vulnerability is fixed in 1.0.8.3.

thehackerwire@mastodon.social at 2026-05-16T20:00:06.000Z ##

🟠 CVE-2026-46408 - High (7.6)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T20:00:06.000Z ##

🟠 CVE-2026-46408 - High (7.6)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46407
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-18T17:26:40.167000

2 posts

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token list by supplying that user's admin_id. This can disclose sensitive API tokens belonging to other administrators. This vulnerability is fixed in 1.0.8.3.

thehackerwire@mastodon.social at 2026-05-16T19:59:56.000Z ##

🟠 CVE-2026-46407 - High (8.1)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token li...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T19:59:56.000Z ##

🟠 CVE-2026-46407 - High (8.1)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token li...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45010
(9.1 CRITICAL)

EPSS: 0.12%

updated 2026-05-18T17:25:39.493000

4 posts

phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers can brute-force any user's six-digit TOTP code by submitting POST requests with sequential token values, bypassing two-factor authentication to gain full

thehackerwire@mastodon.social at 2026-05-16T21:01:27.000Z ##

🔴 CVE-2026-45010 - Critical (9.1)

phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-16T01:30:24.815Z ##

🚨 CVE-2026-45010 (CRITICAL): phpMyFAQ <4.1.2 lets unauthenticated attackers brute-force TOTP codes at /admin/check — no rate limiting or session binding. Full admin access risk. Restrict endpoint & monitor now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-16T21:01:27.000Z ##

🔴 CVE-2026-45010 - Critical (9.1)

phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-16T01:30:24.000Z ##

🚨 CVE-2026-45010 (CRITICAL): phpMyFAQ <4.1.2 lets unauthenticated attackers brute-force TOTP codes at /admin/check — no rate limiting or session binding. Full admin access risk. Restrict endpoint & monitor now! radar.offseq.com/threat/cve-20 #OffSeq #infosec #phpMyFAQ #CVE

##

CVE-2026-46366
(7.5 HIGH)

EPSS: 0.06%

updated 2026-05-18T17:25:39.493000

2 posts

phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solution_id_{id}.html endpoint. Attackers can sequentially iterate solution IDs to discover all FAQs including those restricted to specific users or groups, l

thehackerwire@mastodon.social at 2026-05-16T21:01:18.000Z ##

🟠 CVE-2026-46366 - High (7.5)

phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T21:01:18.000Z ##

🟠 CVE-2026-46366 - High (7.5)

phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46364
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-05-18T17:25:39.493000

3 posts

phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthenticated attackers can exploit the public GET /api/captcha endpoint by crafting malicious User-Agent headers to perform time-based blind SQL injection, ext

thehackerwire@mastodon.social at 2026-05-16T21:01:08.000Z ##

🔴 CVE-2026-46364 - Critical (9.8)

phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T21:01:08.000Z ##

🔴 CVE-2026-46364 - Critical (9.8)

phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-16T00:00:36.000Z ##

🚨 CRITICAL: CVE-2026-46364 in phpMyFAQ <4.1.2 allows unauthenticated SQL injection via /api/captcha. Attackers can exfiltrate user creds, admin tokens, and SMTP info. Restrict endpoint & use WAF until patch is confirmed. radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Infosec

##

CVE-2026-3220
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-18T17:05:46.240000

2 posts

The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin before 2.4.2, Speed Optimizer WordPress plugin before 7.7.9 are vulnerable to unauthenticated Stored Cross-Site Scripting (XSS) due to a predictable replacement hash used during the HTML minification process and abusing a regular expression. This allows an attacker to inject arbitrary HTML attributes in the final HTML

3 repos

https://github.com/solarlynxsqueeze/CVE-2026-32202

https://github.com/virus-or-not/CVE-2026-32202

https://github.com/B1tBit/CVE-2026-32201-exploit

thehackerwire@mastodon.social at 2026-05-18T22:02:35.000Z ##

🟠 CVE-2026-3220 - High (8.8)

The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin before 2.4.2, Speed Optimizer WordPress plugin before 7.7.9 are vulnerable to unauthenticated Stored Cross-Site Scripting (XSS) due to a predictable replacement hash ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T22:02:35.000Z ##

🟠 CVE-2026-3220 - High (8.8)

The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin before 2.4.2, Speed Optimizer WordPress plugin before 7.7.9 are vulnerable to unauthenticated Stored Cross-Site Scripting (XSS) due to a predictable replacement hash ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6495
(7.1 HIGH)

EPSS: 0.03%

updated 2026-05-18T17:05:46.240000

2 posts

The Ajax Load More WordPress plugin before 7.8.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin

offseq at 2026-05-18T07:30:26.521Z ##

⚠️ HIGH severity: Reflected XSS in Ajax Load More < 7.8.4 (CVE-2026-6495) lets attackers inject scripts as admin. No patch confirmed — restrict access, monitor for updates, and consider WAF rules. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-18T07:30:26.000Z ##

⚠️ HIGH severity: Reflected XSS in Ajax Load More < 7.8.4 (CVE-2026-6495) lets attackers inject scripts as admin. No patch confirmed — restrict access, monitor for updates, and consider WAF rules. Details: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS

##

CVE-2026-7304
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T15:31:41

2 posts

SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.

thehackerwire@mastodon.social at 2026-05-18T17:00:33.000Z ##

🔴 CVE-2026-7304 - Critical (9.8)

SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T17:00:33.000Z ##

🔴 CVE-2026-7304 - Critical (9.8)

SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41948
(7.7 HIGH)

EPSS: 0.00%

updated 2026-05-18T15:30:45

2 posts

Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse out of their authorized tenant path using unencoded dot sequences in task identifiers or manipulated filename parameters to access internal endpoints su

thehackerwire@mastodon.social at 2026-05-18T16:00:12.000Z ##

🟠 CVE-2026-41948 - High (7.7)

Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T16:00:12.000Z ##

🟠 CVE-2026-41948 - High (7.7)

Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7302
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-05-18T15:30:38

2 posts

SGLangs multimodal generation runtime is vulnerable to an unauthenticated path traversal vulnerability, allowing an attacker to write arbitrary files anywhere the server process has write access, by including ../ sequences in the upload filename when sent to specific endpoints.

thehackerwire@mastodon.social at 2026-05-18T17:00:22.000Z ##

🔴 CVE-2026-7302 - Critical (9.1)

SGLangs multimodal generation runtime is vulnerable to an unauthenticated path traversal vulnerability, allowing an attacker to write arbitrary files anywhere the server process has write access, by including ../ sequences in the upload filename w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T17:00:22.000Z ##

🔴 CVE-2026-7302 - Critical (9.1)

SGLangs multimodal generation runtime is vulnerable to an unauthenticated path traversal vulnerability, allowing an attacker to write arbitrary files anywhere the server process has write access, by including ../ sequences in the upload filename w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42009
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-18T15:30:38

2 posts

A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly handle packets with duplicate sequence numbers. This could lead to unstable packet ordering or undefined behavior, resulting in a denial of service.

thehackerwire@mastodon.social at 2026-05-18T16:00:23.000Z ##

🟠 CVE-2026-42009 - High (7.5)

A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly han...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T16:00:23.000Z ##

🟠 CVE-2026-42009 - High (7.5)

A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly han...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46333
(5.5 MEDIUM)

EPSS: 0.03%

updated 2026-05-18T15:30:37

15 posts

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointe

4 repos

https://github.com/studiogangster/CVE-2026-46333

https://github.com/Aurillium/public-passwd

https://github.com/0xBlackash/CVE-2026-46333

https://github.com/KaraZajac/CHARON

frederik@blog.frehi.be at 2026-05-18T19:29:18.000Z ##

Security updates: Debian vs Ubuntu, AlmaLinux vs Rocky Linux

The last couple of weeks were turbulent for the Linux kernel: several critical security problems were disclosed . Three of them are local privilege escalation bugs: they allow any local user to become root. The vulnerabilities are named Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284, CVE-2026-43500), Fragnesia (CVE-2026-46300). The fourth vulnerability, named ssh-keysign-pwn (CVE-2026-46333) allows a user to read root owned files, such as host SSH keys. There are exploits publicly […]

blog.frehi.be/2026/05/18/secur

##

LAG_Netzpolitik_BW@linke.social at 2026-05-18T15:48:23.000Z ##

CVE-2026-46333 - War wohl 6 jahre lang bekannt ohne das gehandelt wurde - gotekky.com/guides/security/cv

##

jon@domum.social at 2026-05-17T18:22:10.000Z ##

#Ubuntu still doesn't have a patch or even a security notice for #sshkeysignpwn ...

How is this everyone else has been patched for days!

#Debian had a fix Friday morning...#DomumSocial is running on Debian, but in my day job I'm stuck with Ubuntu.

If you're also stuck with Ubuntu there is a mitigation:

`sudo sysctl -w kernel.yama.ptrace_scope=3`

I've tested this against the know exploit code at github.com/0xdeadbeefnetwork/s

This will disable the vulnerable ptrace call until the next reboot

Seeking confirmation of my theory I was able to find:
almalinux.org/blog/2026-05-15-

you can also set "yama.ptrace_scope" to "2" which will only allow root to use ptrace (and will also allow resetting it w/o reboot). The link above has more explanations and directions for setting it persistently across reboot for now.

This will break `strace` and `gdb`!

#Linux #sysadmin #security

##

secdb at 2026-05-17T13:03:45.762Z ##

🚨 CVE-2026-46333 (ssh-keysign-pwn)

In the Linux kernel, the following vulnerability has been resolved:

ptrace: slightly saner 'get_dumpable()' logic

The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.

And almost all users do in fact use it only for the case where the task
has a mm pointer.

But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).

It's not what this flag was designed for, but it is what it is.

The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.

Make it all make a bit more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/


##

sourceware@fosstodon.org at 2026-05-17T11:05:36.000Z ##

To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).

Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.

##

beyondmachines1 at 2026-05-17T08:01:08.315Z ##

Linux Kernel Race Condition 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords

A six-year-old Linux kernel race condition (CVE-2026-46333) allows local attackers to steal SSH private keys and password hashes by hijacking file descriptors during process termination. The flaw affects major distributions including Ubuntu and Debian, and a public exploit is available.

**Apply the latest Linux kernel patches ASAP to all affected systems (Ubuntu 22.04/24.04/26.04, Debian 13, Arch, CentOS 9, Raspberry Pi OS, CloudLinux 8/9/10), and rotate all SSH host keys on systems that allowed shell access to untrusted users. Until patched, restrict local shell access to trusted users only and monitor for suspicious use of pidfd_getfd or SUID binaries like ssh-keysign and chage.**

beyondmachines.net/event_detai

##

alpinelinux@fosstodon.org at 2026-05-16T11:50:43.000Z ##

New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)

- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207

These have been backported all the way down to Alpine Linux 3.16.

Edit: These versions fix ssh-keysign-pwn, not Fragnesia

##

sebastian@abshoff.social at 2026-05-16T05:41:23.000Z ##

Kernel-Updates am Morgen vertreiben Kummer und Sorgen. 😇

security-tracker.debian.org/tr

##

LAG_Netzpolitik_BW@linke.social at 2026-05-18T15:48:23.000Z ##

CVE-2026-46333 - War wohl 6 jahre lang bekannt ohne das gehandelt wurde - gotekky.com/guides/security/cv

##

linux@activitypub.awakari.com at 2026-05-15T14:28:06.000Z ## Linux Kernel ptrace Exit-race Vulnerability / ssh-keysign-pwn (CVE-2026-46333) — Mitigation and Kernel Update on CloudLinux Right after the kernel privilege-escalation chain in the XFRM/ESP subsy...

#KernelCare #CVE #Vulnerability #Live #Patching #kernel #AlmaLinux #CloudLinux

Origin | Interest | Match ##

secdb@infosec.exchange at 2026-05-17T13:03:45.000Z ##

🚨 CVE-2026-46333 (ssh-keysign-pwn)

In the Linux kernel, the following vulnerability has been resolved:

ptrace: slightly saner 'get_dumpable()' logic

The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.

And almost all users do in fact use it only for the case where the task
has a mm pointer.

But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).

It's not what this flag was designed for, but it is what it is.

The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.

Make it all make a bit more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#sshkeysignpwn #cve202646333 #linux #kernel

##

beyondmachines1@infosec.exchange at 2026-05-17T08:01:08.000Z ##

Linux Kernel Race Condition 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords

A six-year-old Linux kernel race condition (CVE-2026-46333) allows local attackers to steal SSH private keys and password hashes by hijacking file descriptors during process termination. The flaw affects major distributions including Ubuntu and Debian, and a public exploit is available.

**Apply the latest Linux kernel patches ASAP to all affected systems (Ubuntu 22.04/24.04/26.04, Debian 13, Arch, CentOS 9, Raspberry Pi OS, CloudLinux 8/9/10), and rotate all SSH host keys on systems that allowed shell access to untrusted users. Until patched, restrict local shell access to trusted users only and monitor for suspicious use of pidfd_getfd or SUID binaries like ssh-keysign and chage.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

alpinelinux@fosstodon.org at 2026-05-16T11:50:43.000Z ##

New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)

- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207

These have been backported all the way down to Alpine Linux 3.16.

Edit: These versions fix ssh-keysign-pwn, not Fragnesia

##

letoams@defcon.social at 2026-05-15T21:51:08.000Z ##

If you are changing sysctl kernel.yama.ptrace_scope because of the ssh-keygen-pwn exploit almalinux.org/blog/2026-05-15- on fedora/rhel, be aware that your sysctl will be competing with /usr/lib/sysctl.d/10-default-yama-scope.conf so better change it in that file.

##

harrysintonen@infosec.exchange at 2026-05-15T18:57:54.000Z ##

#Debian has released kernel update that fixes the CVE-2026-46333 (ssh-keysign-pwn) vulnerability.

Debian stable (trixie) kernel update: lists.debian.org/debian-securi

Debian oldstable (bookworm) kernel update: lists.debian.org/debian-securi

##

CVE-2026-31635
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-18T15:16:25.370000

2 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix oversized RESPONSE authenticator length check rxgk_verify_response() decodes auth_len from the packet and is supposed to verify that it fits in the remaining bytes. The existing check is inverted, so oversized RESPONSE authenticators are accepted and passed to rxgk_decrypt_skb(), which can later reach skb_to_sgvec() w

CVE-2026-7498
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-18T09:31:56

4 posts

Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Basamak Information Technology Consulting and Organization Trade Ltd. Co. DernekWeb allows Stored XSS. This issue affects DernekWeb: through 30122025.

thehackerwire@mastodon.social at 2026-05-18T18:00:36.000Z ##

🟠 CVE-2026-7498 - High (8.8)

Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Basamak Information Technology Consulting and Organization Trade Ltd. Co. DernekWeb allows Stored XSS.

This issue affects DernekWeb: through 301...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-18T10:30:26.959Z ##

HIGH-severity XSS (CVE-2026-7498) in DernekWeb up to v30122025: improper input neutralization allows stored script injection. No patch yet. Use WAF rules & monitor for updates. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-18T18:00:36.000Z ##

🟠 CVE-2026-7498 - High (8.8)

Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Basamak Information Technology Consulting and Organization Trade Ltd. Co. DernekWeb allows Stored XSS.

This issue affects DernekWeb: through 301...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-18T10:30:26.000Z ##

HIGH-severity XSS (CVE-2026-7498) in DernekWeb up to v30122025: improper input neutralization allows stored script injection. No patch yet. Use WAF rules & monitor for updates. Details: radar.offseq.com/threat/cve-20 #OffSeq #XSS #Vuln #InfoSec

##

CVE-2026-6347
(7.6 HIGH)

EPSS: 0.00%

updated 2026-05-18T09:31:56

2 posts

Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields in the Mattermost Calls plugin which allows an attacker with access to a support packet to obtain TURN server credentials via the plaintext values present in the exported plugin configuration.. Mattermost Advisory ID: MMSA-2026-00605

thehackerwire@mastodon.social at 2026-05-18T18:00:26.000Z ##

🟠 CVE-2026-6347 - High (7.6)

Mattermost versions 11.5.x &lt;= 11.5.1, 10.11.x &lt;= 10.11.13, 11.4.x &lt;= 11.4.3 fail to sanitize sensitive configuration fields in the Mattermost Calls plugin which allows an attacker with access to a support packet to obtain TURN server cred...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T18:00:26.000Z ##

🟠 CVE-2026-6347 - High (7.6)

Mattermost versions 11.5.x &lt;= 11.5.1, 10.11.x &lt;= 10.11.13, 11.4.x &lt;= 11.4.3 fail to sanitize sensitive configuration fields in the Mattermost Calls plugin which allows an attacker with access to a support packet to obtain TURN server cred...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8786
(6.3 MEDIUM)

EPSS: 0.03%

updated 2026-05-18T06:31:18

2 posts

A vulnerability has been found in Tencent WeKnora up to 0.3.6. Affected by this issue is the function getKnowledgeBaseForInitialization of the file internal/handler/initialization.go of the component Config API Endpoint. The manipulation of the argument kbId leads to authorization bypass. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.

offseq at 2026-05-18T06:00:26.886Z ##

🔎 CVE-2026-8786: Tencent WeKnora 0.3.0 – 0.3.6 has a MEDIUM severity auth bypass in the Config API (kbId manipulation). No patch yet — restrict access & monitor updates. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-18T06:00:26.000Z ##

🔎 CVE-2026-8786: Tencent WeKnora 0.3.0 – 0.3.6 has a MEDIUM severity auth bypass in the Config API (kbId manipulation). No patch yet — restrict access & monitor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Tencent #AppSec

##

CVE-2026-8775
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-18T03:32:43

4 posts

A flaw has been found in Edimax BR-6428NS 1.10. This affects the function formL2TPSetup of the file /goform/formL2TPSetup of the component POST Request Handler. This manipulation of the argument L2TPUserName causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond

offseq at 2026-05-18T03:00:25.707Z ##

⚠️ Buffer overflow (HIGH severity, CVE-2026-8775) in Edimax BR-6428NS v1.10 — remote exploit possible via L2TPUserName, no patch, public exploit out. Restrict network access or replace device. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-18T03:00:19.000Z ##

🟠 CVE-2026-8775 - High (8.8)

A flaw has been found in Edimax BR-6428NS 1.10. This affects the function formL2TPSetup of the file /goform/formL2TPSetup of the component POST Request Handler. This manipulation of the argument L2TPUserName causes buffer overflow. It is possible ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-18T03:00:25.000Z ##

⚠️ Buffer overflow (HIGH severity, CVE-2026-8775) in Edimax BR-6428NS v1.10 — remote exploit possible via L2TPUserName, no patch, public exploit out. Restrict network access or replace device. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Infosec #RouterSecurity

##

thehackerwire@mastodon.social at 2026-05-18T03:00:19.000Z ##

🟠 CVE-2026-8775 - High (8.8)

A flaw has been found in Edimax BR-6428NS 1.10. This affects the function formL2TPSetup of the file /goform/formL2TPSetup of the component POST Request Handler. This manipulation of the argument L2TPUserName causes buffer overflow. It is possible ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43500
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-17T18:31:33

4 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-o

14 repos

https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4

https://github.com/0xlane/pagecache-guard

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/haydenjames/dirty-frag-check

https://github.com/First-John/CVE-2026-43500

https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan

https://github.com/krisiasty/vcheck

https://github.com/vorkampfer/dirty_frag_mitigation

https://github.com/linnemanlabs/dirtyfrag-arm64

https://github.com/liamromanis101/DirtyFrag-Detector

https://github.com/metalx1993/dirtyfrag-patches

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/XRSecCD/202605_dirty_frag

https://github.com/AK777177/Dirty-Frag-Analysis

frederik@blog.frehi.be at 2026-05-18T19:29:18.000Z ##

Security updates: Debian vs Ubuntu, AlmaLinux vs Rocky Linux

The last couple of weeks were turbulent for the Linux kernel: several critical security problems were disclosed . Three of them are local privilege escalation bugs: they allow any local user to become root. The vulnerabilities are named Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284, CVE-2026-43500), Fragnesia (CVE-2026-46300). The fourth vulnerability, named ssh-keysign-pwn (CVE-2026-46333) allows a user to read root owned files, such as host SSH keys. There are exploits publicly […]

blog.frehi.be/2026/05/18/secur

##

ghostwriter@phpc.social at 2026-05-17T11:57:53.000Z ##

#DirtyFrag #vulnerability: Universal Linux LPE

Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.

github.com/V4bel/dirtyfrag

#CVE

##

sourceware@fosstodon.org at 2026-05-17T11:05:36.000Z ##

To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).

Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.

##

PC_Fluesterer@social.tchncs.de at 2026-05-17T06:57:38.000Z ##

Ist die Aufregung um die neuen Linux-Fehler berechtigt?

Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:

CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").

Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).

Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen

##

CVE-2026-8733
(6.3 MEDIUM)

EPSS: 0.03%

updated 2026-05-17T06:30:32

2 posts

A vulnerability was found in Investintech SlimPDFReader up to 2.0.13. Affected by this vulnerability is the function sub_3B4610 of the file SlimPDFReader.exe. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor responded to the initial vulnerability report by the researcher with a note

offseq at 2026-05-17T06:00:27.085Z ##

MEDIUM severity: CVE-2026-8733 in Investintech SlimPDFReader v2.0.0 – 2.0.13 allows stack-based buffer overflow. Product is discontinued, no patch available. Public exploit code is out, but not actively exploited. Migrate now. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T06:00:27.000Z ##

MEDIUM severity: CVE-2026-8733 in Investintech SlimPDFReader v2.0.0 – 2.0.13 allows stack-based buffer overflow. Product is discontinued, no patch available. Public exploit code is out, but not actively exploited. Migrate now. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #PDF

##

CVE-2026-8725
(7.3 HIGH)

EPSS: 0.04%

updated 2026-05-17T03:30:29

2 posts

A weakness has been identified in CoreWorxLab CAAL up to 1.6.0. The affected element is an unknown function of the file src/caal/webhooks.py of the component test-hass Endpoint. This manipulation causes server-side request forgery. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about thi

offseq at 2026-05-17T03:00:29.747Z ##

🛡️ CVE-2026-8725: SSRF in CoreWorxLab CAAL v1.0 – 1.6.0 (MEDIUM). Remote, unauthenticated attackers can trigger server requests. No patch; restrict outbound traffic & monitor logs. Exploit is public. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T03:00:29.000Z ##

🛡️ CVE-2026-8725: SSRF in CoreWorxLab CAAL v1.0 – 1.6.0 (MEDIUM). Remote, unauthenticated attackers can trigger server requests. No patch; restrict outbound traffic & monitor logs. Exploit is public. radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Vuln #BlueTeam

##

CVE-2026-46728
(8.2 HIGH)

EPSS: 0.00%

updated 2026-05-17T00:31:39

4 posts

Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.

offseq at 2026-05-17T00:00:36.044Z ##

🔒 CVE-2026-46728 (HIGH, CVSS 8.2) in denx U-Boot <2026.04 lets local privileged attackers bypass FIT signature checks due to hashed-nodes omission. Restrict local access & watch for patches. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-16T22:59:52.000Z ##

🟠 CVE-2026-46728 - High (8.2)

Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-17T00:00:36.000Z ##

🔒 CVE-2026-46728 (HIGH, CVSS 8.2) in denx U-Boot <2026.04 lets local privileged attackers bypass FIT signature checks due to hashed-nodes omission. Restrict local access & watch for patches. radar.offseq.com/threat/cve-20 #OffSeq #Uboot #Infosec #Firmware

##

thehackerwire@mastodon.social at 2026-05-16T22:59:52.000Z ##

🟠 CVE-2026-46728 - High (8.2)

Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2020-17103
(7.0 None)

EPSS: 0.35%

updated 2026-05-16T15:31:13

4 posts

, aka 'Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-17134, CVE-2020-17136.

3 repos

https://github.com/arch1m3d/MiniPlasma-Detection

https://github.com/0xDimas/MiniPlasma

https://github.com/Nightmare-Eclipse/MiniPlasma

beyondmachines1 at 2026-05-18T11:01:07.607Z ##

Windows Cloud Filter Zero-Day Exploit 'MiniPlasma' Grants SYSTEM Privileges

A zero-day exploit named 'MiniPlasma' allows local privilege escalation to SYSTEM on fully patched Windows systems by abusing a regressed vulnerability in the Cloud Filter driver. The flaw appears to be a re-emergence of CVE-2020-17103.

**Until Microsoft releases a fix, restrict who can log in locally to your Windows machines (especially shared workstations, VDI, and jump servers) and use AppLocker or Windows Defender Application Control to block the public MiniPlasma.exe exploit. On servers that don't need OneDrive/cloud file syncing, disable or remove the Cloud Files filter driver (cldflt.sys) to remove the vulnerable component entirely.**

beyondmachines.net/event_detai

##

campuscodi@mastodon.social at 2026-05-16T23:52:23.000Z ##

Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft

github.com/Nightmare-Eclipse/M

##

beyondmachines1@infosec.exchange at 2026-05-18T11:01:07.000Z ##

Windows Cloud Filter Zero-Day Exploit 'MiniPlasma' Grants SYSTEM Privileges

A zero-day exploit named 'MiniPlasma' allows local privilege escalation to SYSTEM on fully patched Windows systems by abusing a regressed vulnerability in the Cloud Filter driver. The flaw appears to be a re-emergence of CVE-2020-17103.

**Until Microsoft releases a fix, restrict who can log in locally to your Windows machines (especially shared workstations, VDI, and jump servers) and use AppLocker or Windows Defender Application Control to block the public MiniPlasma.exe exploit. On servers that don't need OneDrive/cloud file syncing, disable or remove the Cloud Files filter driver (cldflt.sys) to remove the vulnerable component entirely.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

campuscodi@mastodon.social at 2026-05-16T23:52:23.000Z ##

Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft

github.com/Nightmare-Eclipse/M

##

CVE-2026-45375
(9.0 CRITICAL)

EPSS: 0.04%

updated 2026-05-16T01:16:17.333000

2 posts

SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / icon.json) into the Settings → Marketplace UI without HTML escaping. The kernel-side helper sanitizePackageDisplayStrings in kernel/bazaar/package.go HTML-

thehackerwire@mastodon.social at 2026-05-17T17:00:29.000Z ##

🔴 CVE-2026-45375 - Critical (9)

SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / ic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T17:00:29.000Z ##

🔴 CVE-2026-45375 - Critical (9)

SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / ic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43904
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-16T01:16:16.447000

2 posts

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to remaining scanline width before writing pixels. The raw packet path (line 403) correctly clamps with std::min, but RLE paths skip this check. A crafted

thehackerwire@mastodon.social at 2026-05-17T14:00:48.000Z ##

🟠 CVE-2026-43904 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T14:00:48.000Z ##

🟠 CVE-2026-43904 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35194
(8.1 HIGH)

EPSS: 0.05%

updated 2026-05-16T00:32:14

2 posts

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java

thehackerwire@mastodon.social at 2026-05-17T00:00:02.000Z ##

🟠 CVE-2026-35194 - High (8.1)

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulner...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T00:00:02.000Z ##

🟠 CVE-2026-35194 - High (8.1)

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulner...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45400
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-15T23:55:30

2 posts

### Summary In the open-webui project, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. ### Details In the current project, URL validation is performed using the function validate_url. <img width="1323" height="1145" alt="QQ20260322-202854-22-1" src="https://github.com/user-attachments/assets/896d19f2-c7c3-499a-9052-12aea756ac47" /> The curre

thehackerwire@mastodon.social at 2026-05-16T14:59:51.000Z ##

🟠 CVE-2026-45400 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T14:59:51.000Z ##

🟠 CVE-2026-45400 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45675
(8.1 HIGH)

EPSS: 0.05%

updated 2026-05-15T23:55:05

2 posts

## Summary The LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The regular signup handler (`signup_handler` in auths.py, line 663) was explicitly patched to prevent this race with the comment *"Insert with default role first to avoid TOCTOU race"*, but the LDAP and OAuth code paths were never updated with the same fix. ##

thehackerwire@mastodon.social at 2026-05-16T16:59:51.000Z ##

🟠 CVE-2026-45675 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T16:59:51.000Z ##

🟠 CVE-2026-45675 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44554
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-15T23:52:50

2 posts

# Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overwrite ## Affected Component Retrieval web/YouTube processing endpoints: - `backend/open_webui/routers/retrieval.py` (lines 1810-1837, `process_web`) - `backend/open_webui/routers/retrieval.py` (the parallel `process_youtube` endpoint) - `backend/open_webui/routers/retrieval.py` (line 1445, `save_docs_to_vector_db` cal

thehackerwire@mastodon.social at 2026-05-16T18:00:10.000Z ##

🟠 CVE-2026-44554 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T18:00:10.000Z ##

🟠 CVE-2026-44554 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44555
(7.6 HIGH)

EPSS: 0.04%

updated 2026-05-15T23:52:35

2 posts

# Base Model Routing Bypasses Access Control via Model Chaining ## Affected Component Model chaining via `base_model_id`: - `backend/open_webui/routers/models.py` (lines 170-214, `create_new_model`) - `backend/open_webui/routers/models.py` (lines 254-308, `import_models`) - `backend/open_webui/main.py` (lines 1696-1711, base model resolution in chat completion) - `backend/open_webui/routers/open

thehackerwire@mastodon.social at 2026-05-16T18:59:51.000Z ##

🟠 CVE-2026-44555 - High (7.6)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T18:59:51.000Z ##

🟠 CVE-2026-44555 - High (7.6)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44552
(8.7 HIGH)

EPSS: 0.03%

updated 2026-05-15T23:52:30

2 posts

# Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Enable Cross-Instance Cache Poisoning ## Affected Component Tool server and terminal server Redis cache: - `backend/open_webui/utils/tools.py` (line 841, tool_servers SET) - `backend/open_webui/utils/tools.py` (line 850, tool_servers GET) - `backend/open_webui/utils/tools.py` (line 976, terminal_servers SET) - `backend/

thehackerwire@mastodon.social at 2026-05-16T17:59:51.000Z ##

🟠 CVE-2026-44552 - High (8.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis da...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T17:59:51.000Z ##

🟠 CVE-2026-44552 - High (8.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis da...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44714
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-15T23:49:54

1 posts

### Summary `ScriptExecution.correctlySpends()` contains two fast-path verification bugs for standard `P2PKH` and native `P2WPKH` spends in `core/src/main/java/org/bitcoinj/script/ScriptExecution.java`. In both branches, bitcoinj verifies an attacker-controlled signature/public-key pair but fails to verify that the public key is the one committed to by the output being spent. As a result, any att

thehackerwire@mastodon.social at 2026-05-15T17:36:40.000Z ##

🟠 CVE-2026-44714 - High (7.5)

The bitcoinj library is a Java implementation of the Bitcoin protocol. Prior to 0.17.1, ScriptExecution.correctlySpends() contains two fast-path verification bugs for standard P2PKH and native P2WPKH spends in core/src/main/java/org/bitcoinj/scrip...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42155(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-05-15T23:48:44

2 posts

Affected Version: OpenMage LTS ≤ 20.16.0 (confirmed on `20.16.0`) Affected File: `https://github.com/OpenMage/magento-lts/blob/main/app/code/core/Mage/Api/Model/Session.php` – `start()` method ## Summary The XML-RPC / SOAP API session ID is generated using an outdated, time-based construction rather than a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG): ```php The XML-RPC /

offseq at 2026-05-16T03:00:26.714Z ##

🚨 CRITICAL: CVE-2026-42155 in OpenMage magento-lts (<20.18.0). Insecure, time-based session ID generation enables API session hijacking via brute-force attacks. Upgrade to 20.18.0+ ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-16T03:00:26.000Z ##

🚨 CRITICAL: CVE-2026-42155 in OpenMage magento-lts (<20.18.0). Insecure, time-based session ID generation enables API session hijacking via brute-force attacks. Upgrade to 20.18.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Magento #Vuln #APIsecurity

##

CVE-2026-23998
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-15T23:48:24

2 posts

### Summary A vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, this could allow an attacker to impersonate an enrolled Windows device and retrieve sensitive configuration data. ### Impact Fleet’s Windows MDM management endpoint relies on mutual TLS (mTLS) client certificates to a

thehackerwire@mastodon.social at 2026-05-17T19:00:10.000Z ##

🟠 CVE-2026-23998 - High (7.5)

Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T19:00:10.000Z ##

🟠 CVE-2026-23998 - High (7.5)

Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27886(CVSS UNKNOWN)

EPSS: 0.11%

updated 2026-05-15T23:44:52

2 posts

### Summary of CVE-2026-27886 Vulnerability Details - CVE: CVE-2026-27886 - CVSS v3.1 Vector: `CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N` (9.3 — Critical) - Affected Versions: `@strapi/strapi` <=5.36.1 - How to Patch: Immediately update your Strapi to >=5.37.0 ### Description of CVE-2026-27886 Strapi versions prior to 5.37.0 did not sufficiently sanitize query parameters w

thehackerwire@mastodon.social at 2026-05-17T18:59:59.000Z ##

🟠 CVE-2026-27886 - High (7.5)

Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:59:59.000Z ##

🟠 CVE-2026-27886 - High (7.5)

Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46367
(7.6 HIGH)

EPSS: 0.01%

updated 2026-05-15T21:31:45

2 posts

phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event handlers, stealing admin session cookies and achieving full application takeover when visitors view affected FAQ pages.

thehackerwire@mastodon.social at 2026-05-16T19:00:10.000Z ##

🟠 CVE-2026-46367 - High (7.6)

phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event han...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T19:00:10.000Z ##

🟠 CVE-2026-46367 - High (7.6)

phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event han...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8696
(7.5 HIGH)

EPSS: 0.23%

updated 2026-05-15T21:31:45

2 posts

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread information responses. Attackers can trigger the vulnerability by causing qsThreadInfo to fail after qfThreadInfo successfully allocates RDebugPid structures, res

thehackerwire@mastodon.social at 2026-05-16T14:01:07.000Z ##

🟠 CVE-2026-8696 - High (7.5)

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread informati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T14:01:07.000Z ##

🟠 CVE-2026-8696 - High (7.5)

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread informati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46359
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-15T21:31:42

2 posts

phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metacharacters in display names or JWT claims can break out of string literals and execute arbitrary database queries.

thehackerwire@mastodon.social at 2026-05-16T20:00:17.000Z ##

🟠 CVE-2026-46359 - High (7.5)

phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T20:00:17.000Z ##

🟠 CVE-2026-46359 - High (7.5)

phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8558
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-15T21:16:39.133000

2 posts

Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-17T00:00:13.000Z ##

🟠 CVE-2026-8558 - High (8.8)

Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T00:00:13.000Z ##

🟠 CVE-2026-8558 - High (8.8)

Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43907
(8.3 HIGH)

EPSS: 0.04%

updated 2026-05-15T19:43:22.767000

2 posts

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp leads to a heap-based out-of-bounds write when processing crafted DPX image files. The function computes buffer sizes using 32-bit signed integer arithmeti

thehackerwire@mastodon.social at 2026-05-17T15:00:45.000Z ##

🟠 CVE-2026-43907 - High (8.3)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp le...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T15:00:45.000Z ##

🟠 CVE-2026-43907 - High (8.3)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp le...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42897
(8.1 HIGH)

EPSS: 12.34%

updated 2026-05-15T19:35:52.963000

25 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

1 repos

https://github.com/atiilla/CVE-2026-42897

undercodenews@mastodon.social at 2026-05-18T22:13:12.000Z ##

Microsoft Exchange Zero-Day CVE-2026-42897 Exploited in the Wild While Patch Still Missing + Video

Introduction: A Silent Threat Inside Enterprise Email Systems A newly discovered Microsoft Exchange zero-day vulnerability is currently being actively exploited, leaving organizations exposed while a formal patch remains unavailable. Tracked as CVE-2026-42897, the flaw affects Outlook Web Access (OWA), a widely used web-based email interface in enterprise environments.…

undercodenews.com/microsoft-ex

##

Matchbook3469@mastodon.social at 2026-05-18T18:02:17.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-05-11 to 2026-05-17

Roundup | CRITICAL
CVEs: CVE-2026-20182, CVE-2026-42897, CVE-2026-42945

Cybersecurity roundup for 2026-05-11 to 2026-05-17. 3 CVE advisories, 3 breach reports, 1 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#CyberSecurity #APT #CyberNews

##

Analyst207@mastodon.social at 2026-05-18T16:15:54.000Z ##

Microsoft Exchange Servers Targeted in Active Exploitation

Microsoft has sounded the alarm on a critical vulnerability in on-premise Exchange Servers, known as CVE-2026-42897, that's currently being exploited by hackers - and the company is urging affected users to act fast. A temporary fix is in place, with a permanent patch on the way.

osintsights.com/microsoft-exch

#Cve202642897 #MicrosoftExchangeServers #EmergingThreats #SpoofingVulnerability #CrosssiteScripting

##

youranonnewsirc@nerdculture.de at 2026-05-18T15:11:11.000Z ##

Here's a professional summary of recent developments:

Fast16 malware, predating Stuxnet, is confirmed as a nuclear weapons simulation sabotage tool (May 18). A Microsoft Exchange vulnerability (CVE-2026-42897) is actively exploited. US-Iran tensions heighten after Trump's warnings of military action (May 18). Malta becomes the first country to offer ChatGPT Plus nationwide as a public service (May 17).

#Cybersecurity #Geopolitics #TechNews

##

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

thehackerwire@mastodon.social at 2026-05-17T20:00:44.000Z ##

🟠 CVE-2026-42897 - High (8.1)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thecybermind at 2026-05-17T08:16:10.482Z ##

This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.

thecybermind.co/2026/05/17/wee

##

youranonnewsirc@nerdculture.de at 2026-05-17T02:49:16.000Z ##

**Global Briefing: May 17, 2026**

Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.

Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.

Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.

#AnonNews_irc #Cybersecurity #News

##

doener@chaos.social at 2026-05-16T20:10:02.000Z ##

Microsoft Exchange Server Spoofing Vulnerability

msrc.microsoft.com/update-guid

##

youranonnewsirc@nerdculture.de at 2026-05-16T18:57:15.000Z ##

Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).

#Cybersecurity #AnonNews_irc #News

##

guardingpearsoftware@mastodon.social at 2026-05-16T13:29:41.000Z ##

techcommunity.microsoft.com/bl

##

guardingpearsoftware@mastodon.social at 2026-05-16T13:29:41.000Z ##

Microsoft has released mitigations for a high-severity Microsoft Exchange Server vulnerability that is being actively exploited in attacks.

The flaw enables threat actors to execute arbitrary code through a cross-site scripting (XSS) attack targeting Outlook on the web users.

Tracked as CVE-2026-42897, the vulnerability affects Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE).

##

CapTechGroup@mastodon.social at 2026-05-16T12:53:38.000Z ##

CVE-2026-42897 exploits improper HTML sanitization in OWA, allowing JavaScript execution within the email rendering context. The script inherits authentication tokens, accesses the full DOM, and can read emails, harvest...

captechgroup.com/about-us/thre

##

allaboutsecurity@mastodon.social at 2026-05-16T08:38:50.000Z ##

CVE-2026-42897: CISA warnt vor aktiv ausgenutzter XSS-Lücke in Microsoft Exchange Server

all-about-security.de/cve-2026

#cve #microsoft #itsecurity

##

youranonnewsirc@nerdculture.de at 2026-05-18T15:11:11.000Z ##

Here's a professional summary of recent developments:

Fast16 malware, predating Stuxnet, is confirmed as a nuclear weapons simulation sabotage tool (May 18). A Microsoft Exchange vulnerability (CVE-2026-42897) is actively exploited. US-Iran tensions heighten after Trump's warnings of military action (May 18). Malta becomes the first country to offer ChatGPT Plus nationwide as a public service (May 17).

#Cybersecurity #Geopolitics #TechNews

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

thehackerwire@mastodon.social at 2026-05-17T20:00:44.000Z ##

🟠 CVE-2026-42897 - High (8.1)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thecybermind@infosec.exchange at 2026-05-17T08:16:10.000Z ##

This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.

thecybermind.co/2026/05/17/wee

##

youranonnewsirc@nerdculture.de at 2026-05-17T02:49:16.000Z ##

**Global Briefing: May 17, 2026**

Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.

Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.

Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.

#AnonNews_irc #Cybersecurity #News

##

youranonnewsirc@nerdculture.de at 2026-05-16T18:57:15.000Z ##

Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).

#Cybersecurity #AnonNews_irc #News

##

secdb@infosec.exchange at 2026-05-15T20:00:14.000Z ##

🚨 [CISA-2026:0515] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-42897 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Cross-Site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Microsoft
- Notes: msrc.microsoft.com/update-guid ; learn.microsoft.com/en-us/exch ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260515 #cisa20260515 #cve_2026_42897 #cve202642897

##

cisakevtracker@mastodon.social at 2026-05-15T18:00:44.000Z ##

CVE ID: CVE-2026-42897
Vendor: Microsoft
Product: Microsoft
Date Added: 2026-05-15
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

rogeragrimes@infosec.exchange at 2026-05-15T17:49:54.000Z ##

High critical cross-site scripting (CSS) vuln in Microsoft Exchange Server 2016 being used in the wild

cve.org/CVERecord?id=CVE-2026-

##

AAKL@infosec.exchange at 2026-05-15T17:33:14.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2026- #Microsoft #CISA #zeroday #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-05-15T17:01:07.000Z ##

Microsoft Warns of Actively Exploited Zero-Day in Exchange Server OWA

Microsoft is warning of an actively exploited spoofing vulnerability (CVE-2026-42897) in on-premises Exchange Server that allows attackers to execute arbitrary JavaScript via Outlook Web Access XSS.

**If you run on-premises Microsoft Exchange Server (2016, 2019, or Subscription Edition), make sure the Exchange Emergency Mitigation Service (EEMS) is enabled so the M2.1.x mitigation for CVE-2026-42897 is active, or run the Exchange on-premises Mitigation Tool manually if your network is air-gapped. Keep the mitigation on even if it breaks OWA Print Calendar or inline images, and check if you can apply the permanent patch once Microsoft releases it.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2026-34253
(8.2 HIGH)

EPSS: 0.07%

updated 2026-05-15T18:31:42

1 posts

A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, leading to a stack buffer underflow that can cause application crashes and potentially allow code execution.

thehackerwire@mastodon.social at 2026-05-15T16:27:43.000Z ##

🟠 CVE-2026-34253 - High (8.2)

A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, lea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39054
(7.3 HIGH)

EPSS: 1.69%

updated 2026-05-15T18:31:41

2 posts

Oinone Pamirs 7.0.0 contains a command injection vulnerability in CommandHelper.executeCommands. The method starts a shell process and writes attacker-controlled command strings directly to the process standard input without sanitization. In affected deployments, this can result in arbitrary operating system command execution.

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-38728
(7.5 HIGH)

EPSS: 0.10%

updated 2026-05-15T18:31:38

1 posts

An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to cause a denial of service via the SMTPStream._write, lib/smtp-stream.js components

thehackerwire@mastodon.social at 2026-05-15T16:27:52.000Z ##

🟠 CVE-2026-38728 - High (7.5)

An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to cause a denial of service via the SMTPStream._write, lib/smtp-stream.js components

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42334
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-15T18:25:21.933000

2 posts

Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Prior to 6.13.9, 7.8.9, 8.22.1, and 9.1.6, a vulnerability allows bypassing Mongoose’s sanitizeFilter query sanitization mechanism via the $nor operator. When sanitizeFilter is enabled, Mongoose wraps query operators in $eq to neutralize them. However, prior to the fix, $nor was not included in the set of l

thehackerwire@mastodon.social at 2026-05-17T23:59:49.000Z ##

🟠 CVE-2026-42334 - High (7.5)

Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Prior to 6.13.9, 7.8.9, 8.22.1, and 9.1.6, a vulnerability allows bypassing Mongoose’s sanitizeFilter query sanitization mechanism via the $nor operator....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T23:59:49.000Z ##

🟠 CVE-2026-42334 - High (7.5)

Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Prior to 6.13.9, 7.8.9, 8.22.1, and 9.1.6, a vulnerability allows bypassing Mongoose’s sanitizeFilter query sanitization mechanism via the $nor operator....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43908
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-15T18:07:55.057000

2 posts

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside ConvertCbYCrYToRGB() causes the function to compute a large negative pointer offset into the output buffer, producing an out-of-bounds write that crashes the

thehackerwire@mastodon.social at 2026-05-17T17:00:20.000Z ##

🟠 CVE-2026-43908 - High (8.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside Conv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T17:00:20.000Z ##

🟠 CVE-2026-43908 - High (8.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside Conv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24712
(7.3 HIGH)

EPSS: 2.87%

updated 2026-05-15T15:31:42

2 posts

Northern.tech CFEngine Enterprise and Community before 3.21.8, 3.24.3, and 3.27.0 allows Command injection.

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-44523
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-05-15T15:16:52.960000

2 posts

Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as short as 1 byte. This vulnerability is fixed in 0.19.4.

thehackerwire@mastodon.social at 2026-05-17T18:00:46.000Z ##

🔴 CVE-2026-44523 - Critical (10)

Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as shor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:00:46.000Z ##

🔴 CVE-2026-44523 - Critical (10)

Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as shor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42031
(9.8 CRITICAL)

EPSS: 9.11%

updated 2026-05-15T14:59:11.840000

2 posts

CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Prior to 2.10.10 and 2.11.5, a vulnerability in datastore_search_sql allowed attackers to inject SQL in order to gain access to private resources and PostgreSQL system information This vulnerability is fixed in 2.10.10 and 2.11.5.

Nuclei template

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-44592
(9.4 CRITICAL)

EPSS: 0.02%

updated 2026-05-15T14:44:49.877000

2 posts

Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-registered worker UUID. The resulting session has PeerAuth::Open, i.e. it sees jobs from every organisation, and can immediately NarPush/NarUploaded arbitr

thehackerwire@mastodon.social at 2026-05-17T18:00:26.000Z ##

🔴 CVE-2026-44592 - Critical (9.4)

Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:00:26.000Z ##

🔴 CVE-2026-44592 - Critical (9.4)

Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41702
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-15T09:31:42

1 posts

VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during an operation performed by a SETUID binary. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed.

CVE-2026-45665
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-15T01:55:56

2 posts

### Summary A Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically, DOMPurify is executed before the marked library). This vulnerability allows a compromised or malicious administrator to plant a malicious payload in the global banner. Crucially, this vector enables Privilege Escalation, as the malicious banner is rende

thehackerwire@mastodon.social at 2026-05-16T13:00:24.000Z ##

🟠 CVE-2026-45665 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:00:24.000Z ##

🟠 CVE-2026-45665 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8574
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:38

1 posts

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T16:59:54.000Z ##

🟠 CVE-2026-8574 - High (8.3)

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8520
(8.3 HIGH)

EPSS: 0.06%

updated 2026-05-15T00:31:37

2 posts

Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T08:00:00.000Z ##

🟠 CVE-2026-8520 - High (8.3)

Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T08:00:00.000Z ##

🟠 CVE-2026-8520 - High (8.3)

Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8526
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:37

1 posts

Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:34.000Z ##

🟠 CVE-2026-8526 - High (8.8)

Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8513
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T10:00:15.000Z ##

🟠 CVE-2026-8513 - High (8.3)

Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T10:00:15.000Z ##

🟠 CVE-2026-8513 - High (8.3)

Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8512
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T10:00:04.000Z ##

🟠 CVE-2026-8512 - High (8.3)

Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T10:00:04.000Z ##

🟠 CVE-2026-8512 - High (8.3)

Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8510
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T09:00:13.000Z ##

🟠 CVE-2026-8510 - High (7.5)

Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T09:00:13.000Z ##

🟠 CVE-2026-8510 - High (7.5)

Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8514
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T01:00:54.000Z ##

🟠 CVE-2026-8514 - High (8.3)

Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T01:00:54.000Z ##

🟠 CVE-2026-8514 - High (8.3)

Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8530
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-17T01:00:34.000Z ##

🟠 CVE-2026-8530 - High (8.3)

Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T01:00:34.000Z ##

🟠 CVE-2026-8530 - High (8.3)

Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8527
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-15T00:31:36

1 posts

Insufficient validation of untrusted input in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:44.000Z ##

🟠 CVE-2026-8527 - High (8.8)

Insufficient validation of untrusted input in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8525
(8.3 HIGH)

EPSS: 0.06%

updated 2026-05-15T00:31:36

1 posts

Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:16.000Z ##

🟠 CVE-2026-8525 - High (8.3)

Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8523
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

1 posts

Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:36:57.000Z ##

🟠 CVE-2026-8523 - High (8.3)

Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8534
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

1 posts

Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:03:50.000Z ##

🟠 CVE-2026-8534 - High (8.3)

Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity:...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8548
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

1 posts

Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:39:45.000Z ##

🟠 CVE-2026-8548 - High (8.3)

Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8542
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:30:30

1 posts

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:05:17.000Z ##

🟠 CVE-2026-8542 - High (8.3)

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8515
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:30:29

2 posts

Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T01:59:53.000Z ##

🟠 CVE-2026-8515 - High (8.3)

Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T01:59:53.000Z ##

🟠 CVE-2026-8515 - High (8.3)

Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8575
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-14T22:16:51.050000

1 posts

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T17:00:04.000Z ##

🟠 CVE-2026-8575 - High (8.3)

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8533
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-14T22:16:47.413000

1 posts

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:03:40.000Z ##

🟠 CVE-2026-8533 - High (8.3)

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8531
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-14T22:16:47.267000

2 posts

Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-17T01:00:43.000Z ##

🟠 CVE-2026-8531 - High (8.8)

Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T01:00:43.000Z ##

🟠 CVE-2026-8531 - High (8.8)

Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8519
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-14T22:16:46.123000

2 posts

Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T07:59:50.000Z ##

🟠 CVE-2026-8519 - High (8.8)

Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T07:59:50.000Z ##

🟠 CVE-2026-8519 - High (8.8)

Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8521
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-14T21:30:54

2 posts

Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T08:00:10.000Z ##

🟠 CVE-2026-8521 - High (7.5)

Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T08:00:10.000Z ##

🟠 CVE-2026-8521 - High (7.5)

Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8540
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

1 posts

Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:04:00.000Z ##

🟠 CVE-2026-8540 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8549
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

1 posts

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:39:55.000Z ##

🟠 CVE-2026-8549 - High (8.8)

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8547
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-14T21:30:54

1 posts

Insufficient policy enforcement in Passwords in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:38:19.000Z ##

🟠 CVE-2026-8547 - High (7.5)

Insufficient policy enforcement in Passwords in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8555
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

1 posts

Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:00:14.000Z ##

🟠 CVE-2026-8555 - High (8.8)

Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8621
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:53

2 posts

Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Crabbox-Org headers in requests authenticated with a shared token to bypass authorization checks and access owner/org-scoped lease operations belonging to v

thehackerwire@mastodon.social at 2026-05-17T17:00:39.000Z ##

🟠 CVE-2026-8621 - High (8.8)

Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Cra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T17:00:39.000Z ##

🟠 CVE-2026-8621 - High (8.8)

Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Cra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44586
(8.3 HIGH)

EPSS: 0.05%

updated 2026-05-14T21:22:56.313000

2 posts

SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes stored XSS, and because SiYuan's Electron windows are created with nodeIntegration: true and contextIsolation: false, a successful payload can call Node.j

thehackerwire@mastodon.social at 2026-05-17T18:59:50.000Z ##

🟠 CVE-2026-44586 - High (8.3)

SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:59:50.000Z ##

🟠 CVE-2026-44586 - High (8.3)

SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8522
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:19:23.923000

2 posts

Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T08:59:51.000Z ##

🟠 CVE-2026-8522 - High (8.8)

Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T08:59:51.000Z ##

🟠 CVE-2026-8522 - High (8.8)

Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8517
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-14T21:19:23.923000

2 posts

Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T02:00:02.000Z ##

🟠 CVE-2026-8517 - High (8.8)

Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Cri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T02:00:02.000Z ##

🟠 CVE-2026-8517 - High (8.8)

Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Cri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8532
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:19:23.923000

1 posts

Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:40:05.000Z ##

🟠 CVE-2026-8532 - High (8.8)

Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8544
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:19:23.923000

1 posts

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:38:08.000Z ##

🟠 CVE-2026-8544 - High (8.8)

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8551
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:19:23.923000

1 posts

Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:05:07.000Z ##

🟠 CVE-2026-8551 - High (8.8)

Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8557
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-14T21:19:23.923000

1 posts

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:04:57.000Z ##

🟠 CVE-2026-8557 - High (7.5)

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44516
(7.6 HIGH)

EPSS: 0.03%

updated 2026-05-14T20:54:42

2 posts

### Summary The `LoggingRestClientCustomizer` in the `web` module automatically intercepts all outgoing HTTP calls made via Spring's `RestClient` and logs the full request body, response body, and response headers. When an error response is received, this information is included in the thrown `HttpClientErrorException` message, which is logged at ERROR level by Spring's default exception handling

thehackerwire@mastodon.social at 2026-05-18T01:59:52.000Z ##

🟠 CVE-2026-44516 - High (7.6)

Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T01:59:52.000Z ##

🟠 CVE-2026-44516 - High (7.6)

Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44542
(9.1 CRITICAL)

EPSS: 0.64%

updated 2026-05-14T20:54:33

2 posts

### **Summary** Attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape the intended shared directory. As a result, an unauthenticated attacker possessing a valid public share hash with delete permissions enabled can delete arbitrary files outside the shared directory within the share owner’s configured storage sc

thehackerwire@mastodon.social at 2026-05-17T20:00:35.000Z ##

🔴 CVE-2026-44542 - Critical (9.1)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T20:00:35.000Z ##

🔴 CVE-2026-44542 - Critical (9.1)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45338
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-14T20:19:57

2 posts

## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in `_process_picture_url()` in `backend/open_webui/utils/oauth.py` (line ~1338). The function fetches arbitrary URLs from OAuth `picture` claims without applying `validate_url()`, allowing an attacker to force the server to make HTTP requests to internal resources and exfiltrate the full response. ## Vulnerable Code ```python #

thehackerwire@mastodon.social at 2026-05-16T13:00:48.000Z ##

🟠 CVE-2026-45338 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:00:48.000Z ##

🟠 CVE-2026-45338 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42945
(8.1 HIGH)

EPSS: 0.15%

updated 2026-05-14T20:17:05.413000

27 posts

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond it

22 repos

https://github.com/byezero/nginx-cve-2026-42945-check

https://github.com/hnytgl/cve-2026-42945

https://github.com/ChamsBouzaiene/ai-vuln-rediscovery-nginx-cve-2026-42945

https://github.com/rheodev/CVE-2026-42945

https://github.com/DepthFirstDisclosures/Nginx-Rift

https://github.com/0xBlackash/CVE-2026-42945

https://github.com/Renison-Gohel/CVE-2026-42945-NGINX-Rift

https://github.com/tal7aouy/nginx-cve-2026-42945

https://github.com/MateusVerass/nGixshell

https://github.com/nanwinata/nginxrift-CVE-2026-42945

https://github.com/sibersan/web-server-audit_CVE-2026-42945

https://github.com/soksofos/wazuh-nginx-cve-2026-42945-sca-lab

https://github.com/dinosn/cve-2026-42945-nginx32-lab

https://github.com/forxiucn/nginx-cve-2026-42945-poc

https://github.com/friparia/NGINX_RIFT_SCAN_CVE_2026_42945

https://github.com/oseasfr/Scanner_CVE_2026-42945

https://github.com/realityone/cve-2026-42945-scan

https://github.com/iammerrida-source/nginx-rift-detect

https://github.com/jelasin/CVE-2026-42945

https://github.com/chenqin231/CVE-2026-42945

https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC

https://github.com/cipherspy/CVE-2026-42945-POC

youranonnewsirc@nerdculture.de at 2026-05-18T23:10:52.000Z ##

Geopolitical: US-China held cyber discussions, Iran seized a vessel near the Strait of Hormuz, and Ukraine experienced drone attacks on Moscow. Tech: Microsoft Edge enhanced password security; Colorado and Georgia enacted new AI legislation. Cybersecurity: Instructure paid hackers' ransom after a breach, and a critical NGINX vulnerability (CVE-2026-42945) is under active exploitation.

#AnonNews_irc #Cybersecurity #News

##

Matchbook3469@mastodon.social at 2026-05-18T18:02:17.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-05-11 to 2026-05-17

Roundup | CRITICAL
CVEs: CVE-2026-20182, CVE-2026-42897, CVE-2026-42945

Cybersecurity roundup for 2026-05-11 to 2026-05-17. 3 CVE advisories, 3 breach reports, 1 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#CyberSecurity #APT #CyberNews

##

secpoint@mastodon.social at 2026-05-18T15:56:29.000Z ##

Scan for possible exposure indicators related to NGINX Rift, CVE-2026-42945, with the SecPoint Penetrator.

This is a serious NGINX rewrite module vulnerability that may lead to worker crashes and, under specific conditions, potential code execution.

Our detection helps organizations identify systems that show remote indicators associated with this vulnerability, enabling faster prioritization and remediation.

#SecPoint #NGINX #CyberSecurity #VulnerabilityScanning #Penetrator

##

netsecio@mastodon.social at 2026-05-18T15:28:28.000Z ##

📰 Critical 18-Year-Old 'NGINX Rift' Vulnerability (CVE-2026-42945) Under Active Attack

🚨 CRITICAL NGINX FLAW! An 18-year-old bug 'NGINX Rift' (CVE-2026-42945) is actively exploited for DoS & RCE. Affects millions of web servers. Patch immediately! #NGINX #CVE #Infosec #PatchNow

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/ng

##

patrickcmiller at 2026-05-18T14:12:01.021Z ##

Experts warn of active exploitation of critical NGINX flaw CVE-2026-42945 securityaffairs.com/192289/unc

##

undercodenews@mastodon.social at 2026-05-18T12:06:35.000Z ##

NGINX Rift Sparks Urgent Security Concerns as Active Exploitation Begins Days After Disclosure

Introduction to the NGINX Rift Crisis A newly disclosed vulnerability affecting both NGINX Plus and NGINX Open Source has rapidly become one of the most discussed cybersecurity threats of 2026. Tracked as CVE-2026-42945 and nicknamed “NGINX Rift,” the flaw carries a severe CVSS v4 score of 9.2 and is already being actively exploited in the wild just days after public…

undercodenews.com/nginx-rift-s

##

undercodenews@mastodon.social at 2026-05-18T11:09:14.000Z ##

NGINX Rift: Critical F5 NGINX Vulnerability Exploited Within Days as Millions of Servers Face Attack Risk

Introduction A newly disclosed vulnerability affecting F5 NGINX has rapidly escalated into a major cybersecurity emergency. Tracked as CVE-2026-42945 and now widely referred to as “NGINX Rift,” the flaw moved from public disclosure to real-world exploitation in only three days. Security researchers warn that attackers are already scanning and targeting exposed…

undercodenews.com/nginx-rift-c

##

humancodersnews@mastodon.social at 2026-05-18T11:00:18.000Z ##

Nginx RIFT (CVE-2026-42945) : comprendre la faille vieille de 18 ans
➡️ cryptolab.re/posts/2026/nginx-

##

offseq at 2026-05-18T09:00:27.236Z ##

🚨 CRITICAL: Active exploitation of NGINX heap buffer overflow (CVE-2026-42945) in ngx_http_rewrite_module. Remote DoS on default, RCE possible if ASLR is off. Patch now! Official fix by F5. radar.offseq.com/threat/exploi

##

undercodenews@mastodon.social at 2026-05-18T07:32:48.000Z ##

NGINX Rift Sparks Alarm as Hackers Begin Exploiting Critical CVE-2026-42945 Flaw Across Internet Infrastructure

Introduction A newly disclosed security flaw in NGINX has quickly escalated into a major cybersecurity concern after researchers confirmed active exploitation attempts in the wild. The vulnerability, identified as CVE-2026-42945 and nicknamed “NGINX Rift,” affects both NGINX Plus and the open-source edition of NGINX, software that powers a massive portion of…

undercodenews.com/nginx-rift-s

##

undercodenews@mastodon.social at 2026-05-17T21:55:28.000Z ##

Silent Cyber Apocalypse: NGINX Zero-Day CVE-2026-42945 Actively Exploited as Microsoft 365 Accounts Are Hijacked in Multi-Stage Phishing War

Massive Cybersecurity Escalation Across Core Internet Infrastructure A rapidly escalating wave of cyber incidents is shaking core internet infrastructure, with attackers actively exploiting a newly disclosed NGINX vulnerability tracked as CVE-2026-42945. Reports indicate that the flaw is not just theoretical—it is already being…

undercodenews.com/silent-cyber

##

cyberveille@mastobot.ping.moi at 2026-05-17T20:43:54.000Z ##

📢 NGINX Rift : RCE critique via un heap overflow vieux de 18 ans (CVE-2026-42945)
📝 ## 🔍 Contexte

Publié le 13 mai 2026 par Zhenpeng (Leo) Lin, chercheur chez DepthFirst AI, cet article prése...
📖 cyberveille : cyberveille.ch/posts/2026-05-1
🌐 source : depthfirst.com/research/nginx-
#CVE_2026_40701 #CVE_2026_42934 #Cyberveille

##

Analyst207@mastodon.social at 2026-05-17T15:14:56.000Z ##

NGINX Flaw CVE-2026-42945 Actively Exploited, Threatens Worker Crashes and RCE

A newly discovered NGINX flaw, CVE-2026-42945, is being actively exploited, posing a significant threat of worker crashes and remote code execution (RCE) through specially crafted HTTP requests. This high-severity vulnerability, with a CVSS score of 9.2, has been lurking in NGINX versions since 2008,…

osintsights.com/nginx-flaw-cve

#Nginx #Cve202642945 #RemoteCodeExecution #HeapBufferOverflow #VulnerabilityExploitation

##

secdb at 2026-05-17T13:10:26.317Z ##

🚨 CVE-2026-42945 (NGINX Rift)

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/


##

youranonnewsirc@nerdculture.de at 2026-05-16T18:49:19.000Z ##

Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.

#Cybersecurity #Geopolitics #TechNews

##

nomaakip@sk.nomaakip.xyz at 2026-05-16T10:43:07.062Z ##

https://nvd.nist.gov/vuln/detail/CVE-2026-42945

##

offseq at 2026-05-16T10:30:26.124Z ##

🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. radar.offseq.com/threat/poc-co

##

Sempf at 2026-05-16T03:11:18.797Z ##

And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??

discourse.ifin.network/t/cve-2

##

youranonnewsirc@nerdculture.de at 2026-05-18T23:10:52.000Z ##

Geopolitical: US-China held cyber discussions, Iran seized a vessel near the Strait of Hormuz, and Ukraine experienced drone attacks on Moscow. Tech: Microsoft Edge enhanced password security; Colorado and Georgia enacted new AI legislation. Cybersecurity: Instructure paid hackers' ransom after a breach, and a critical NGINX vulnerability (CVE-2026-42945) is under active exploitation.

#AnonNews_irc #Cybersecurity #News

##

patrickcmiller@infosec.exchange at 2026-05-18T14:12:01.000Z ##

Experts warn of active exploitation of critical NGINX flaw CVE-2026-42945 securityaffairs.com/192289/unc

##

offseq@infosec.exchange at 2026-05-18T09:00:27.000Z ##

🚨 CRITICAL: Active exploitation of NGINX heap buffer overflow (CVE-2026-42945) in ngx_http_rewrite_module. Remote DoS on default, RCE possible if ASLR is off. Patch now! Official fix by F5. radar.offseq.com/threat/exploi #OffSeq #NGINX #Vuln #Patch

##

Analyst207@mastodon.social at 2026-05-17T15:14:56.000Z ##

NGINX Flaw CVE-2026-42945 Actively Exploited, Threatens Worker Crashes and RCE

A newly discovered NGINX flaw, CVE-2026-42945, is being actively exploited, posing a significant threat of worker crashes and remote code execution (RCE) through specially crafted HTTP requests. This high-severity vulnerability, with a CVSS score of 9.2, has been lurking in NGINX versions since 2008,…

osintsights.com/nginx-flaw-cve

#Nginx #Cve202642945 #RemoteCodeExecution #HeapBufferOverflow #VulnerabilityExploitation

##

secdb@infosec.exchange at 2026-05-17T13:10:26.000Z ##

🚨 CVE-2026-42945 (NGINX Rift)

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#nginxrift #cve202642945 #nginx

##

youranonnewsirc@nerdculture.de at 2026-05-16T18:49:19.000Z ##

Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.

#Cybersecurity #Geopolitics #TechNews

##

offseq@infosec.exchange at 2026-05-16T10:30:26.000Z ##

🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. radar.offseq.com/threat/poc-co #OffSeq #NGINX #Vuln #InfoSec

##

Sempf@infosec.exchange at 2026-05-16T03:11:18.000Z ##

And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??

discourse.ifin.network/t/cve-2

##

fbinin@mastodon.fbin.in at 2026-05-15T17:34:26.000Z ##

@beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: security-tracker.debian.org/tr

##

CVE-2026-45303
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-14T20:16:11

2 posts

### Summary Through the HTML rendering view, scripts can be injected and executed. The finding resulted from a penetration test for a customer. It is suspected that the root cause of the issue lies within the core of Open WebUI, which is why it is being reported as a security issue here. Tested on Open WebUI 0.5.4. ### Details The frontend provides a function to visualize the HTML content of a c

thehackerwire@mastodon.social at 2026-05-16T14:00:48.000Z ##

🟠 CVE-2026-45303 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML conten...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T14:00:48.000Z ##

🟠 CVE-2026-45303 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML conten...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44578
(8.6 HIGH)

EPSS: 4.00%

updated 2026-05-14T18:34:38.530000

2 posts

Next.js is a React framework for building full-stack web applications. From 13.4.13 to before 15.5.16 and 16.2.5, self-hosted applications using the built-in Node.js server can be vulnerable to server-side request forgery through crafted WebSocket upgrade requests. An attacker can cause the server to proxy requests to arbitrary internal or external destinations, which may expose internal services

Nuclei template

7 repos

https://github.com/dwisiswant0/next-16.2.4-pocs

https://github.com/ynsmroztas/nextssrf

https://github.com/dinosn/CVE-2026-44578

https://github.com/0xBlackash/CVE-2026-44578

https://github.com/tocong282/CVE-2026-44578-PoC

https://github.com/love07oj/nextjs-cve-2026-44578

https://github.com/panchocosil/verify-ghsa-c4j6-fc7j-m34r

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-43284
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-14T18:33:53

4 posts

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when

28 repos

https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4

https://github.com/Percivalll/Dirty-Frag-Kubernetes-PoC

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/whosfault/CVE-2026-43284

https://github.com/linnemanlabs/dirtyfrag-arm64

https://github.com/6abc/Copy-Fail-CVE-2026-31431-dirty-frag-CVE-2026-43284

https://github.com/grabesec/XCP_ng_CVE-2026-43284_tester

https://github.com/haydenjames/dirty-frag-check

https://github.com/ChernStepanov/DirtyFrag-for-dummies

https://github.com/ryan2929/CVE-2026-43284-

https://github.com/liamromanis101/DirtyFrag-Detector

https://github.com/suominen/CVE-2026-43284

https://github.com/XRSecCD/202605_dirty_frag

https://github.com/0xlane/pagecache-guard

https://github.com/dixyes/dirtypatch

https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe

https://github.com/metalx1993/dirtyfrag-patches

https://github.com/DXC-0/linux-lpe-sigma

https://github.com/krisiasty/vcheck

https://github.com/0xBlackash/CVE-2026-43284

https://github.com/scriptzteam/Paranoid-Dirty-Frag-CVE-2026-43284

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/AK777177/Dirty-Frag-Analysis

https://github.com/xd20111/CVE-2026-43284

https://github.com/First-John/CVE-2026-43500

https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan

https://github.com/FrosterDL/CVE-2026-43284

https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag

frederik@blog.frehi.be at 2026-05-18T19:29:18.000Z ##

Security updates: Debian vs Ubuntu, AlmaLinux vs Rocky Linux

The last couple of weeks were turbulent for the Linux kernel: several critical security problems were disclosed . Three of them are local privilege escalation bugs: they allow any local user to become root. The vulnerabilities are named Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284, CVE-2026-43500), Fragnesia (CVE-2026-46300). The fourth vulnerability, named ssh-keysign-pwn (CVE-2026-46333) allows a user to read root owned files, such as host SSH keys. There are exploits publicly […]

blog.frehi.be/2026/05/18/secur

##

ghostwriter@phpc.social at 2026-05-17T11:57:53.000Z ##

#DirtyFrag #vulnerability: Universal Linux LPE

Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.

github.com/V4bel/dirtyfrag

#CVE

##

sourceware@fosstodon.org at 2026-05-17T11:05:36.000Z ##

To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).

Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.

##

PC_Fluesterer@social.tchncs.de at 2026-05-17T06:57:38.000Z ##

Ist die Aufregung um die neuen Linux-Fehler berechtigt?

Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:

CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").

Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).

Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen

##

CVE-2026-20182
(10.0 CRITICAL)

EPSS: 25.95%

updated 2026-05-14T18:33:03

13 posts

May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.&nbsp; A vulnerability in the peering authentica

1 repos

https://github.com/fangbarristerbar/CVE-2026-20182-POC

Matchbook3469@mastodon.social at 2026-05-18T18:02:17.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-05-11 to 2026-05-17

Roundup | CRITICAL
CVEs: CVE-2026-20182, CVE-2026-42897, CVE-2026-42945

Cybersecurity roundup for 2026-05-11 to 2026-05-17. 3 CVE advisories, 3 breach reports, 1 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#CyberSecurity #APT #CyberNews

##

blog@insicurezzadigitale.com at 2026-05-18T15:39:00.000Z ##

UAT-8616: il gruppo d’élite sfrutta il sesto zero-day Cisco SD-WAN e prende di mira governi europei e asiatici

Un threat actor altamente sofisticato, UAT-8616, sfrutta CVE-2026-20182 — vulnerabilità critica CVSS 10.0 nel Cisco Catalyst SD-WAN — per compromettere organizzazioni governative, diplomatiche e della difesa in Europa e Asia Centrale. È la sesta zero-day sulla piattaforma SD-WAN nel 2026. La CISA ha aggiunto il CVE al catalogo KEV il 15 maggio.

insicurezzadigitale.com/uat-86

##

PC_Fluesterer@social.tchncs.de at 2026-05-18T06:53:20.000Z ##

Cisco: Noch ein Zero-Day mit „perfekter 10“

Im Februar wurde eine weltweite Warnung verbreitet, weil Cisco SD-WAN Produkte Sicherheitslücken enthielten, die bereits seit mindestens 2023 für Angriffe ausgenutzt wurden (Zero-Day). Cisco hat Updates veröffentlicht, mit denen diese Sicherheitslücken geschlossen werden sollten. Jetzt kommt der Witz. Forscher des Sicherheitsunternehmens Rapid7 haben die Sicherheitslücke CVE-2026-20127 weiter untersucht und dabei eine weitere Sicherheitslücke gefunden! Sie hat die Nummer CVE-2026-20182 und die Risiko-Einstufung 10 von 10 bekommen. Auch diese Sicherheitslücke wird bereits für Angriffe ausgenutzt

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #hersteller #hintertr #spionage #UnplugTrump #backdoor

##

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

thecybermind at 2026-05-17T08:16:10.482Z ##

This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.

thecybermind.co/2026/05/17/wee

##

oversecurity@mastodon.social at 2026-05-16T14:53:21.000Z ##

Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks

Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-...

🔗️ [Bleepingcomputer] link.is.it/iXcd6x

##

youranonnewsirc@nerdculture.de at 2026-05-16T07:27:16.000Z ##

Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):

Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.

Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.

Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.

#AnonNews_irc #Cybersecurity #News

##

blog@insicurezzadigitale.com at 2026-05-18T15:39:00.000Z ##

UAT-8616: il gruppo d’élite sfrutta il sesto zero-day Cisco SD-WAN e prende di mira governi europei e asiatici

Un threat actor altamente sofisticato, UAT-8616, sfrutta CVE-2026-20182 — vulnerabilità critica CVSS 10.0 nel Cisco Catalyst SD-WAN — per compromettere organizzazioni governative, diplomatiche e della difesa in Europa e Asia Centrale. È la sesta zero-day sulla piattaforma SD-WAN nel 2026. La CISA ha aggiunto il CVE al catalogo KEV il 15 maggio.

insicurezzadigitale.com/uat-86

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

thecybermind@infosec.exchange at 2026-05-17T08:16:10.000Z ##

This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.

thecybermind.co/2026/05/17/wee

##

oversecurity@mastodon.social at 2026-05-16T14:53:21.000Z ##

Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks

Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-...

🔗️ [Bleepingcomputer] link.is.it/iXcd6x

##

youranonnewsirc@nerdculture.de at 2026-05-16T07:27:16.000Z ##

Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):

Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.

Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.

Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.

#AnonNews_irc #Cybersecurity #News

##

AAKL@infosec.exchange at 2026-05-15T16:38:43.000Z ##

Interesting. This was posted yesterday.

Tenable: Frequently asked questions about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182) tenable.com/blog/faq-about-the @tenable #infosec #Cisco #vulnerability

##

CVE-2025-15024
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-14T18:33:03

2 posts

Improper Control of Generation of Code ('Code Injection') vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Remote Code Inclusion. This issue affects Library Automation System: from v.19.5 before v.22.1.

thehackerwire@mastodon.social at 2026-05-17T23:59:59.000Z ##

🟠 CVE-2025-15024 - High (8.8)

Improper Control of Generation of Code ('Code Injection') vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Remote Code Inclusion.

This issue affect...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T23:59:59.000Z ##

🟠 CVE-2025-15024 - High (8.8)

Improper Control of Generation of Code ('Code Injection') vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Remote Code Inclusion.

This issue affect...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41615
(9.6 CRITICAL)

EPSS: 0.10%

updated 2026-05-14T18:33:03

2 posts

Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-05-17T20:00:53.000Z ##

🔴 CVE-2026-41615 - Critical (9.6)

Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T20:00:53.000Z ##

🔴 CVE-2026-41615 - Critical (9.6)

Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44513
(8.8 HIGH)

EPSS: 0.12%

updated 2026-05-14T18:30:57.103000

2 posts

Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, a trust_remote_code bypass in DiffusionPipeline.from_pretrained allows arbitrary remote code execution despite the user passing trust_remote_code=False (or omitting it, which is the default). The vulnerability has three variants, all sharing the same root cause — the trust_remote_code gate was implemented inside Diffusio

thehackerwire@mastodon.social at 2026-05-18T02:00:11.000Z ##

🟠 CVE-2026-44513 - High (8.8)

Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, a trust_remote_code bypass in DiffusionPipeline.from_pretrained allows arbitrary remote code execution despite the user passing trust_remote_code=False (or omitting it, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T02:00:11.000Z ##

🟠 CVE-2026-44513 - High (8.8)

Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, a trust_remote_code bypass in DiffusionPipeline.from_pretrained allows arbitrary remote code execution despite the user passing trust_remote_code=False (or omitting it, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44827
(8.8 HIGH)

EPSS: 0.12%

updated 2026-05-14T18:30:57.103000

2 posts

Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, diffusers 0.37.0 allows remote code execution without the trust_remote_code=True safeguard when loading pipelines from Hugging Face Hub repositories. The _resolve_custom_pipeline_and_cls function in pipeline_loading_utils.py performs string interpolation on the custom_pipeline parameter using f"{custom_pipeline}.py". Whe

thehackerwire@mastodon.social at 2026-05-18T02:00:01.000Z ##

🟠 CVE-2026-44827 - High (8.8)

Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, diffusers 0.37.0 allows remote code execution without the trust_remote_code=True safeguard when loading pipelines from Hugging Face Hub repositories. The _resolve_custom...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T02:00:01.000Z ##

🟠 CVE-2026-44827 - High (8.8)

Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, diffusers 0.37.0 allows remote code execution without the trust_remote_code=True safeguard when loading pipelines from Hugging Face Hub repositories. The _resolve_custom...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-15023
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-14T18:19:37.060000

2 posts

Incorrect Authorization vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Library Automation System: from v.19.5 before v.22.1.

thehackerwire@mastodon.social at 2026-05-18T00:00:09.000Z ##

🟠 CVE-2025-15023 - High (8.8)

Incorrect Authorization vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Exploiting Incorrectly Configured Access Control Security Levels.

This iss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-18T00:00:09.000Z ##

🟠 CVE-2025-15023 - High (8.8)

Incorrect Authorization vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Exploiting Incorrectly Configured Access Control Security Levels.

This iss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6473
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-14T15:32:05

1 posts

Integer wraparound in multiple PostgreSQL server features allows an unprivileged database user to cause the server to undersize an allocation and write out-of-bounds. This may execute arbitrary code as the operating system user running the database. In applications that pass gigabyte-scale user inputs to the relevant database functions, the application input provider may achieve a segmentation f

mastokukei@social.josko.org at 2026-05-17T18:01:39.000Z ##

CVE-2026-6473.
- **AI in Legal and Ethical Contexts**: Debates on AI-generated content, legal definitions of "data," and AI's impact on professions like journalism and academia.
- **Data Centers and Energy Consumption**: Environmental impact, energy demands, and local resource strain from AI data centers.
- **Cybersecurity Vulnerabilities**: Reports on security issues like Microsoft BitLocker backdoor, Grafana Labs source code theft, and Linux kernel vulnerabilities.
- [2/3]

##

CVE-2026-43660
(7.5 HIGH)

EPSS: 0.12%

updated 2026-05-13T21:16:47.520000

1 posts

A validation issue was addressed with improved logic. This issue is fixed in Safari 26.5, iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.

CapTechGroup@mastodon.social at 2026-05-16T14:50:57.000Z ##

Apple's May 11th update addressed 84 vulnerabilities spanning iOS, macOS, Safari, tvOS, watchOS, and visionOS. WebKit alone accounts for 13+ CVEs including CVE-2026-28883 and CVE-2026-43660. Kernel-level privilege escalation...

captechgroup.com/about-us/thre

##

CVE-2026-28883
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-13T21:16:41.903000

1 posts

A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.5, iOS 26.5 and iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing maliciously crafted web content may lead to an unexpected process crash.

CapTechGroup@mastodon.social at 2026-05-16T14:50:57.000Z ##

Apple's May 11th update addressed 84 vulnerabilities spanning iOS, macOS, Safari, tvOS, watchOS, and visionOS. WebKit alone accounts for 13+ CVEs including CVE-2026-28883 and CVE-2026-43660. Kernel-level privilege escalation...

captechgroup.com/about-us/thre

##

CVE-2026-8043
(9.6 CRITICAL)

EPSS: 0.10%

updated 2026-05-13T20:34:20.310000

1 posts

External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side attacks.

Analyst207@mastodon.social at 2026-05-18T12:16:33.000Z ##

Major Vendors Patch Critical Flaws Amid Cyber Threat Surge

A critical flaw in Ivanti Xtraction, tracked as CVE-2026-8043, allows remote attackers to read sensitive files and launch client-side attacks - but fortunately, patches are now available to fix this high-risk vulnerability.

osintsights.com/major-vendors-

#IvantiXtraction #Cve20268043 #SupplyChain #InformationDisclosure #ClientsideAttacks

##

CVE-2026-34659
(9.6 CRITICAL)

EPSS: 3.74%

updated 2026-05-13T19:38:48.113000

2 posts

Adobe Connect versions 2025.9.15, 2025.8.157 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could result in arbitrary code execution in the context of the current user. An attacker could exploit this vulnerability to execute arbitrary code. Exploitation of this issue requires user interaction in that a victim must visit a maliciously crafted URL or interact with

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-0265(CVSS UNKNOWN)

EPSS: 0.08%

updated 2026-05-13T18:31:07

1 posts

An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure acc

1 repos

https://github.com/tstephens1080/palo-alto-cve-2026-0265-checker

beyondmachines1@infosec.exchange at 2026-05-15T18:01:08.000Z ##

Authentication Bypass Flaw in Palo Alto Networks PAN-OS Sparks Severity Dispute

Palo Alto Networks disclosed a high-severity authentication bypass vulnerability (CVE-2026-0265) in PAN-OS affecting firewalls and Panorama appliances using Cloud Authentication Service. The flaw allows unauthenticated attackers to bypass security controls on management interfaces and GlobalProtect portals.

**Make sure all PAN-OS firewall and Panorama management interfaces are isolated from the internet and accessible only from trusted internal networks. If you use Cloud Authentication Service (CAS), upgrade PAN-OS to a fixed version ASAP, or as a temporary fix switch the authentication profile to SAML or RADIUS until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-40701
(4.8 MEDIUM)

EPSS: 0.03%

updated 2026-05-13T16:27:11.127000

1 posts

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_ssl_module module when the ssl_verify_client directive is set to "on" or "optional," and the ssl_ocsp directive is set to "on" or the leaf parameters are configured with a resolver. With this configuration, an unauthenticated attacker can send requests along with conditions beyond its control that may cause a heap-use-after-free

linux@activitypub.awakari.com at 2026-05-16T17:30:01.000Z ## Debian Bookworm nginx Denial of Service Fix DSA-6278-1 CVE-2026-40701 Multiple vulnerabilities were discoverd in Nginx, a high-performance web and reverse proxy server, which could result in bypass...

#Debian #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

CVE-2026-45091
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-05-13T16:24:39

2 posts

In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every minted unseal token. JWS payload is base64-encoded JSON, NOT encrypted. Any party who could observe a minted token (CI build logs, container env dumps, kubectl describe pod, Sentry/Rollbar stack traces, log aggregators) could decode the payload and ext

1 repos

https://github.com/HORKimhab/CVE-2026-45091

beyondmachines1 at 2026-05-17T11:01:06.991Z ##

Critical TOTP Secret Leak Discovered in sealed-env Enterprise Mode

The sealed-env npm package patched a critical vulnerability (CVE-2026-45091) that leaked plaintext TOTP secrets in unseal tokens, allowing attackers to bypass two-factor authentication.

**If you use the sealed-env npm package (versions 0.1.0-alpha.1 through 0.1.0-alpha.3), upgrade ASAP to 0.1.0-alpha.4 or later, as your TOTP secrets may be exposed in token logs, CI/CD build logs, container dumps, or third-party tools like Sentry. After upgrading you must rotate all TOTP secrets, re-seal any environment files protected by the vulnerable versions since the upgrade is a breaking change. Then review historical logs to purge any captured tokens.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-05-17T11:01:06.000Z ##

Critical TOTP Secret Leak Discovered in sealed-env Enterprise Mode

The sealed-env npm package patched a critical vulnerability (CVE-2026-45091) that leaked plaintext TOTP secrets in unseal tokens, allowing attackers to bypass two-factor authentication.

**If you use the sealed-env npm package (versions 0.1.0-alpha.1 through 0.1.0-alpha.3), upgrade ASAP to 0.1.0-alpha.4 or later, as your TOTP secrets may be exposed in token logs, CI/CD build logs, container dumps, or third-party tools like Sentry. After upgrading you must rotate all TOTP secrets, re-seal any environment files protected by the vulnerable versions since the upgrade is a breaking change. Then review historical logs to purge any captured tokens.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-40361
(8.4 HIGH)

EPSS: 0.07%

updated 2026-05-13T15:34:52.573000

2 posts

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

CVE-2026-36983
(7.3 HIGH)

EPSS: 5.71%

updated 2026-05-12T19:36:42.187000

2 posts

D-Link DCS-932L v2.18.01 is vulnerable to Command Injection in the function sub_42EF14 of the file /bin/alphapd. The manipulation of the argument LightSensorControl leads to command injection.

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-40369
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-12T18:30:50

4 posts

Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/orinimron123/CVE-2026-40369-EXPLOIT

mastokukei@social.josko.org at 2026-05-17T09:01:43.000Z ##

debates, LLM-generated code in projects, and controversies around AI policies in open-source.
- **Cybersecurity and Vulnerabilities**: Updates on vulnerabilities (e.g., CVE-2026-40369, BitLocker bypass), exploits, and security practices.
- **Linux and Open-Source Software**: Updates on Linux distributions (Debian 13.5, Arch Linux), open-source projects, and discussions about migrating from proprietary systems.
- **Eurovision Song Contest (ESC)**: Live discussions, technical [2/3]

##

mastokukei@social.josko.org at 2026-05-16T18:01:44.000Z ##

energy consumption, and the strain on local resources.
- **Cybersecurity and Vulnerabilities**: Updates on vulnerabilities (e.g., CVE-2026-40369, BitLocker bypass), exploits, and security practices in open-source projects and enterprise systems.
- **Linux and Open-Source Software**: Updates on Linux distributions (e.g., Debian 13.5, Arch Linux), open-source projects, and discussions about migrating from proprietary systems.
- **Tech Industry Shifts**: Reorganizations at [2/3]

##

lobsters@mastodon.social at 2026-05-16T06:20:12.000Z ##

CVE-2026-40369: Arbitrary Kernel Address Increment via NtQuerySystemInformation lobste.rs/s/lwtmzl #security #windows
github.com/orinimron123/CVE-20

##

lobsters@mastodon.social at 2026-05-16T06:20:12.000Z ##

CVE-2026-40369: Arbitrary Kernel Address Increment via NtQuerySystemInformation lobste.rs/s/lwtmzl #security #windows
github.com/orinimron123/CVE-20

##

CVE-2026-8051
(7.2 HIGH)

EPSS: 1.46%

updated 2026-05-12T15:31:49

2 posts

OS command injection in Ivanti Virtual Traffic Manager before version 22.9r4 allows a remote authenticated attacker with admin privileges to achieve remote code execution.

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-0300
(9.8 CRITICAL)

EPSS: 14.43%

updated 2026-05-12T15:31:19

1 posts

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal

8 repos

https://github.com/qassam-315/PAN-OS-User-ID-Buffer-Overflow-PoC

https://github.com/shizuku198411/CVE-2026-0300

https://github.com/TailwindRG/cve-2026-0300-audit

https://github.com/bannned-bit/CVE-2026-0300-PANOS

https://github.com/0xBlackash/CVE-2026-0300

https://github.com/p3Nt3st3r-sTAr/CVE-2026-0300-POC

https://github.com/mr-r3b00t/CVE-2026-0300

https://github.com/ByteWraith1/CVE-2026-0300

linux@activitypub.awakari.com at 2026-05-11T12:00:00.000Z ## Cybersecurity news weekly roundup May 11, 2026 Palo Alto firewall zero-day gave attackers root access Attackers exploited CVE-2026-0300 against exposed PAN-OS User-ID Authentication Portals, gainin...

#All #Articles #Cybersecurity #News #credential #theft #patch #management #remote #code #execution

Origin | Interest | Match ##

CVE-2026-7256
(8.8 HIGH)

EPSS: 1.21%

updated 2026-05-12T06:31:46

2 posts

** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device by sending a crafted HTTP request.

secdb at 2026-05-18T00:01:49.575Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

secdb@infosec.exchange at 2026-05-18T00:01:49.000Z ##

📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 1956

Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141

Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194

Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51

Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57

Top EPSS Score:
- CVE-2026-20182 - 37.95 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42897 - 12.34 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-42031 - 9.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-44578 - 4.00 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-36983 - 3.50 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-34659 - 3.47 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-24712 - 2.29 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39054 - 1.35 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-8051 - 1.04 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-7256 - 0.83 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-7411
(10.0 CRITICAL)

EPSS: 0.13%

updated 2026-05-11T16:22:43

1 posts

In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host files

1 repos

https://github.com/CryptReaper12/CVE-2026-7411

sayzard@mastodon.sayzard.org at 2026-05-17T05:38:02.000Z ##

Vulnerability Cve-2026-7411

Eclipse BaSyx Java Server SDK 버전 2.0.0-milestone-10 이전에서 Submodel HTTP API의 부적절한 경로 정규화 취약점(CVE-2026-7411)이 발견되었습니다. 인증되지 않은 원격 공격자가 악의적으로 조작된 fileName 파라미터를 이용해 경로 탐색 공격을 수행, 임의의 파일을 서버 파일 시스템에 쓸 수 있어 원격 코드 실행(RCE) 및 시스템 완전 장악이 가능합니다. 이 취약점은 네트워크 공격 벡터, 낮은 공격 복잡도, 권한 요구 없음으로 CVSS 10점의 치명적 위험도를 가집니다. 해당 SDK를 사용하는 AI 인프라 및 서비스 개발자는 즉시 버전 업데이트 및 보안 패치를 적용해야 합니다.

db.gcve.eu/vuln/cve-2026-7411

#security #cve #pathtraversal #rce #eclipse

##

CVE-2026-7412
(8.6 HIGH)

EPSS: 0.03%

updated 2026-05-06T16:16:12.510000

1 posts

In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, the Operation Delegation feature fails to validate the destination URI of delegated requests. An unauthenticated remote attacker can exploit this design flaw to force the BaSyx server to execute blind HTTP POST requests to arbitrary internal or external targets. This allows an attacker to bypass network segmentation and pivot i

sayzard@mastodon.sayzard.org at 2026-05-17T05:38:11.000Z ##

Vulnerability Cve-2026-7412

Eclipse BaSyx Java Server SDK 버전 2.0.0-milestone-10 이전에서 Operation Delegation 기능이 위임 요청의 대상 URI를 검증하지 않아 인증되지 않은 원격 공격자가 임의의 내부 또는 외부 대상에 대해 블라인드 HTTP POST 요청을 실행할 수 있는 SSRF 취약점(CVE-2026-7412)이 발견되었습니다. 이 취약점은 네트워크 분할을 우회하고 내부 IT/OT 인프라 또는 클라우드 메타데이터 서비스(IMDS)를 공격하는 데 악용될 수 있습니다. CVSS 점수는 8.6으로 높은 심각도를 가집니다.

db.gcve.eu/vuln/cve-2026-7412

#security #ssrf #eclipse #vulnerability #sdk

##

CVE-2026-39987
(9.8 CRITICAL)

EPSS: 81.84%

updated 2026-04-27T16:30:09

1 posts

## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint `/terminal/ws` lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., `/ws`) that correctly call `validate_auth()` for authentication, the `/terminal/ws` endpoint only checks the

Nuclei template

9 repos

https://github.com/fevar54/marimo_CVE-2026-39987_RCE_PoC

https://github.com/h3raklez/CVE-2026-39987

https://github.com/keraattin/CVE-2026-39987

https://github.com/0xdeadroot/CVE-2026-39987-marimo-rce

https://github.com/Nxploited/CVE-2026-39987

https://github.com/Dhiaelhak-Rached/CVE-2026-39987-lab-or-marimo-cve-lab

https://github.com/mki9/CVE-2026-39987_exploit

https://github.com/rootdirective-sec/CVE-2026-39987-Lab

https://github.com/0xBlackash/CVE-2026-39987

undercodenews@mastodon.social at 2026-05-18T12:10:31.000Z ##

Critical Pre-Authentication RCE in Marimo Notebook Framework (CVE-2026-39987) Exposes AI and Data Science Systems to Full Compromise

Introduction A newly discovered critical vulnerability in the Marimo Python notebook framework has raised serious concerns across the AI and data science ecosystem. The flaw, identified as CVE-2026-39987, allows unauthenticated remote attackers to execute system-level commands without any credentials. Because Marimo is widely used in…

undercodenews.com/critical-pre

##

AAKL@infosec.exchange at 2026-05-15T16:47:24.000Z ##

New.

VulnCheck: Nine Years and Still Swinging: CVE-2017-9841 Remains One of the Most Actively Targeted Vulnerabilities in Canaries vulncheck.com/blog/cve-2017-98 @vulncheck #infosec #vulnerability

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 75.81%

updated 2026-04-16T19:59:38.107000

2 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

12 repos

https://github.com/hg0434hongzh0/CVE-2026-34197

https://github.com/LAT-06/CVE-2026-34197

https://github.com/hnytgl/cve-2026-34197

https://github.com/Catherines77/ActiveMQ-EXPtools

https://github.com/rootdirective-sec/CVE-2026-34197-Lab

https://github.com/dinosn/CVE-2026-34197

https://github.com/keraattin/CVE-2026-34197

https://github.com/DEVSECURITYSPRO/CVE-2026-34197

https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-

https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197

https://github.com/0xBlackash/CVE-2026-34197

nyanbinary at 2026-05-16T19:52:55.433Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary@infosec.exchange at 2026-05-16T19:52:55.000Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

CVE-2026-3172
(8.1 HIGH)

EPSS: 0.06%

updated 2026-04-15T00:35:42.020000

1 posts

Buffer overflow in parallel HNSW index build in pgvector 0.6.0 through 0.8.1 allows a database user to leak sensitive data from other relations or crash the database server.

mastokukei@social.josko.org at 2026-05-18T18:01:48.000Z ##

development tools (GitHub, GitLab, Kubernetes, Envoy Gateway).
- **Cybersecurity**: Security advisories (VSV00019, CVE-2026-3172), vulnerabilities in NGINX, SSH, and AI-generated bug reports affecting Linux security mailing lists.
- **Tech Industry and Corporate News**: AI acquisitions (Anthropic acquiring Stainless), legal battles (Elon Musk vs. OpenAI), and corporate shifts (Tesla Solar Roof pivot, Microsoft’s AI integrations).
- **Renewable Energy and Sustainability**: [2/4]

##

CVE-2026-32201
(6.5 MEDIUM)

EPSS: 8.71%

updated 2026-04-14T18:30:55

1 posts

Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

1 repos

https://github.com/B1tBit/CVE-2026-32201-exploit

PC_Fluesterer@social.tchncs.de at 2026-05-16T09:56:35.000Z ##

Neue Windows Zero-Day Sicherheitslücken

Inzwischen ist der Zoo der neu veröffentlichten Zero-Day Sicherheitslücken in Microsoft (MS) Windows auf 5 Exemplare angewachsen. Ein anonymer Entwickler, der unter den Pseudonymen Nightmare-Eclipse oder Chaotic Eclipse auftritt, hat gerade zwei weitere bis dato unbekannte Sicherheitslücken in Windows publik gemacht. Die nennt er GreenPlasma und YellowKey. Im April hatte er bereits drei andere Lücken veröffentlicht: BlueHammer, RedSun und UnDefend. Von denen hat als einziger BlueHammer eine CVE-Nummer bekommen (CVE-2026-32201) und wurde von MS mit den Updates im April

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #Microsoft #sicherheit #unplugMicrosoft #UnplugTrump #windows #wissen

##

CVE-2026-24154
(7.6 HIGH)

EPSS: 0.03%

updated 2026-04-03T19:04:33.083000

2 posts

NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker with physical access coul inject incorrect command line arguments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, data tampering, and information disclosure.

nyanbinary at 2026-05-16T21:10:08.280Z ##

sigh...

github.com/CVEProject/cve-sche - supporting media in CVE descriptions have the optional field base64 which should indicate if the value field is base64 encoded.

Except one CNA (Nvidia) appears to get this consistently wrong...

Example: github.com/CVEProject/cvelistV

##

nyanbinary@infosec.exchange at 2026-05-16T21:10:08.000Z ##

sigh...

github.com/CVEProject/cve-sche - supporting media in CVE descriptions have the optional field base64 which should indicate if the value field is base64 encoded.

Except one CNA (Nvidia) appears to get this consistently wrong...

Example: github.com/CVEProject/cvelistV

##

CVE-2026-4289
(7.3 HIGH)

EPSS: 0.04%

updated 2026-03-17T00:31:40

1 posts

A security vulnerability has been detected in Tiandy Easy7 Integrated Management Platform up to 7.17.0. This affects an unknown function of the file /rest/preSetTemplate/getRecByTemplateId. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure bu

1 repos

https://github.com/atiilla/CVE-2026-42897

AAKL@infosec.exchange at 2026-05-15T17:33:14.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2026- #Microsoft #CISA #zeroday #infosec #vulnerability

##

CVE-2026-20127
(10.0 CRITICAL)

EPSS: 58.95%

updated 2026-02-25T18:31:45

1 posts

A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not

7 repos

https://github.com/BugFor-Pings/CVE-2026-20127_EXP

https://github.com/randeepajayasekara/CVE-2026-20127

https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE

https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127

https://github.com/gigachadusers/cve-2026-20127

https://github.com/sfewer-r7/CVE-2026-20127

https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE

PC_Fluesterer@social.tchncs.de at 2026-05-18T06:53:20.000Z ##

Cisco: Noch ein Zero-Day mit „perfekter 10“

Im Februar wurde eine weltweite Warnung verbreitet, weil Cisco SD-WAN Produkte Sicherheitslücken enthielten, die bereits seit mindestens 2023 für Angriffe ausgenutzt wurden (Zero-Day). Cisco hat Updates veröffentlicht, mit denen diese Sicherheitslücken geschlossen werden sollten. Jetzt kommt der Witz. Forscher des Sicherheitsunternehmens Rapid7 haben die Sicherheitslücke CVE-2026-20127 weiter untersucht und dabei eine weitere Sicherheitslücke gefunden! Sie hat die Nummer CVE-2026-20182 und die Risiko-Einstufung 10 von 10 bekommen. Auch diese Sicherheitslücke wird bereits für Angriffe ausgenutzt

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #hersteller #hintertr #spionage #UnplugTrump #backdoor

##

CVE-2018-4063
(8.8 HIGH)

EPSS: 1.88%

updated 2025-12-15T15:18:49.987000

2 posts

An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.

nyanbinary at 2026-05-16T19:52:55.433Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary@infosec.exchange at 2026-05-16T19:52:55.000Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

CVE-2023-22518
(9.8 CRITICAL)

EPSS: 94.38%

updated 2025-10-24T13:38:59.063000

2 posts

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but

Nuclei template

9 repos

https://github.com/bibo318/CVE-2023-22518

https://github.com/C1ph3rX13/CVE-2023-22518

https://github.com/ForceFledgling/CVE-2023-22518

https://github.com/Lilly-dox/Exploit-CVE-2023-22518

https://github.com/davidfortytwo/CVE-2023-22518

https://github.com/RevoltSecurities/CVE-2023-22518

https://github.com/0x0d3ad/CVE-2023-22518

https://github.com/ductink98lhp/analyze-Exploit-CVE-2023-22518-Confluence

https://github.com/0x00sector/CVE_2023_22518_Checker

thecybermind at 2026-05-17T18:02:04.244Z ##

CVE‑2023‑22518 is a critical broken authentication flaw in Atlassian Confluence that allows unauthenticated attackers to reset the instance and create a new admin account. Active exploitation confirms the urgency for immediate patching and external access restriction.

thecybermind.co/2026/05/17/cve

##

thecybermind@infosec.exchange at 2026-05-17T18:02:04.000Z ##

CVE‑2023‑22518 is a critical broken authentication flaw in Atlassian Confluence that allows unauthenticated attackers to reset the instance and create a new admin account. Active exploitation confirms the urgency for immediate patching and external access restriction.

thecybermind.co/2026/05/17/cve

##

CVE-2023-38831
(7.8 HIGH)

EPSS: 93.88%

updated 2025-10-22T00:32:49

2 posts

RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a user attempts to view a benign file within a ZIP archive. The issue occurs because a ZIP archive may include a benign file (such as an ordinary .JPG file) and also a folder that has the same name as the benign file, and the contents of the folder (which may include executable content) are processed during an attempt to ac

61 repos

https://github.com/Malwareman007/CVE-2023-38831

https://github.com/ignis-sec/CVE-2023-38831-RaRCE

https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial

https://github.com/anelya0333/Exploiting-CVE-2023-38831

https://github.com/Garck3h/cve-2023-38831

https://github.com/yangdayyy/cve-2023-38831

https://github.com/UnHackerEnCapital/PDFernetRemotelo

https://github.com/GOTonyGO/CVE-2023-38831-winrar

https://github.com/khanhtranngoccva/cve-2023-38831-poc

https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC

https://github.com/VictoriousKnight/CVE-2023-38831_Exploit

https://github.com/lightningspeed221/Winrar-Exploit-CVE-2023-38831

https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc

https://github.com/r1yaz/winDED

https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831

https://github.com/SugiB3o/Keylog_CVE2023-38831

https://github.com/s4m98/winrar-cve-2023-38831-poc-gen

https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784

https://github.com/ImagineNotChetng/WinRAR-Exploit-Builder

https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831

https://github.com/kuyrathdaro/cve-2023-38831

https://github.com/ruycr4ft/CVE-2023-38831

https://github.com/RomainBayle08/CVE-2023-38831

https://github.com/b1tg/CVE-2023-38831-winrar-exploit

https://github.com/malvika-thakur/CVE-2023-38831

https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit

https://github.com/sh770/CVE-2023-38831

https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE

https://github.com/FirFirdaus/CVE-2023-38831

https://github.com/PascalAsch/CVE-2023-38831-KQL

https://github.com/ngothienan/CVE-2023-38831

https://github.com/Ben1B3astt/CVE-2023-38831_ReverseShell_Winrar

https://github.com/technicalcorp0/CVE-2023-38831-Exploit

https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT

https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc

https://github.com/z3r0sw0rd/CVE-2023-38831-PoC

https://github.com/yezzfusl/cve_2023_38831_scanner

https://github.com/MyStuffYT/CVE-2023-38831-POC

https://github.com/HDCE-inc/CVE-2023-38831

https://github.com/sudo-py-dev/CVE-2023-38831

https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831

https://github.com/SpamixOfficial/CVE-2023-38831

https://github.com/TranKuBao/winrar_CVE2023-38831

https://github.com/Mich-ele/CVE-2023-38831-winrar

https://github.com/kehrijksen/CVE-2023-38831

https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831

https://github.com/RonF98/CVE-2023-38831-POC

https://github.com/mishra0230/CVE-2023-38831

https://github.com/ML-K-eng/CVE-2023-38831-Exploit-and-Detection

https://github.com/akhomlyuk/cve-2023-38831

https://github.com/youmulijiang/evil-winrar

https://github.com/Nielk74/CVE-2023-38831

https://github.com/xaitax/WinRAR-CVE-2023-38831

https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution

https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC

https://github.com/olowostandard1/CVE-2023-38831-WinRAR-Vulnerability-Analysis

https://github.com/idkwastaken/CVE-2023-38831

https://github.com/MaorBuskila/Windows-X64-RAT

https://github.com/asepsaepdin/CVE-2023-38831

https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit

https://github.com/thegr1ffyn/CVE-2023-38831

thecybermind at 2026-05-18T13:56:37.963Z ##

Threat Brief: WinRAR Arbitrary Code Execution – CVE‑2023‑38831

CVE‑2023‑38831 is a critical WinRAR directory traversal vulnerability enabling arbitrary code execution through specially crafted archive files. Actively exploited in the wild, the flaw allows attackers to execute malicious payloads when users attempt to open benign-looking files, creating a high-risk client-side execution surface across enterprise environments.

thecybermind.co/2026/05/18/win

##

thecybermind@infosec.exchange at 2026-05-18T13:56:37.000Z ##

Threat Brief: WinRAR Arbitrary Code Execution – CVE‑2023‑38831

CVE‑2023‑38831 is a critical WinRAR directory traversal vulnerability enabling arbitrary code execution through specially crafted archive files. Actively exploited in the wild, the flaw allows attackers to execute malicious payloads when users attempt to open benign-looking files, creating a high-risk client-side execution surface across enterprise environments.

thecybermind.co/2026/05/18/win

##

CVE-2025-6793
(9.4 CRITICAL)

EPSS: 87.03%

updated 2025-07-14T17:16:32.440000

1 posts

Marvell QConvergeConsole QLogicDownloadImpl Directory Traversal Arbitrary File Deletion and Information Disclosure Vulnerability. This vulnerability allows remote attackers to delete arbitrary files and disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the QLogicDownlo

metasploit@infosec.exchange at 2026-05-15T19:09:38.000Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

CVE-2024-48760
(9.8 CRITICAL)

EPSS: 66.58%

updated 2025-01-23T18:32:22

1 posts

An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.

metasploit@infosec.exchange at 2026-05-15T19:09:38.000Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

metasploit@infosec.exchange at 2026-05-15T19:09:38.000Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

CVE-2024-49767
(7.5 HIGH)

EPSS: 1.09%

updated 2025-01-03T12:15:26.257000

2 posts

Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can

nyanbinary at 2026-05-16T19:52:55.433Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary@infosec.exchange at 2026-05-16T19:52:55.000Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary at 2026-05-16T19:52:55.433Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary@infosec.exchange at 2026-05-16T19:52:55.000Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

CVE-2012-1182(CVSS UNKNOWN)

EPSS: 78.55%

updated 2023-02-02T05:05:16

1 posts

The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call.

1 repos

https://github.com/gousseine-systems/vuln-rabilit-windows7

analog_feelings@tech.lgbt at 2026-05-17T21:11:20.000Z ##

anyone knows how to exploit CVE-2012-1182 in samba? I wanna execute shell commands as root on an old router, so that I can get ssh/telnet access

##

frederik@blog.frehi.be at 2026-05-18T19:29:18.000Z ##

Security updates: Debian vs Ubuntu, AlmaLinux vs Rocky Linux

The last couple of weeks were turbulent for the Linux kernel: several critical security problems were disclosed . Three of them are local privilege escalation bugs: they allow any local user to become root. The vulnerabilities are named Copy Fail (CVE-2026-31431), Dirty Frag (CVE-2026-43284, CVE-2026-43500), Fragnesia (CVE-2026-46300). The fourth vulnerability, named ssh-keysign-pwn (CVE-2026-46333) allows a user to read root owned files, such as host SSH keys. There are exploits publicly […]

blog.frehi.be/2026/05/18/secur

##

agresor at 2026-05-18T14:43:38.060Z ##

Fragnesia (CVE-2026-46300) i DirtyDecrypt (CVE-2026-31635) ( nfsec.pl/security/6722 )

youtube.com/watch?v=dWAPcXh8UEE

##

giggls@karlsruhe-social.de at 2026-05-18T09:14:38.000Z ##

Hm #Debian hat immer noch keinen #fragnesia fix.
security-tracker.debian.org/tr

##

sourceware@fosstodon.org at 2026-05-17T11:05:36.000Z ##

To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).

Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.

##

PC_Fluesterer@social.tchncs.de at 2026-05-17T06:57:38.000Z ##

Ist die Aufregung um die neuen Linux-Fehler berechtigt?

Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:

CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").

Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).

Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen

##

agresor@infosec.exchange at 2026-05-18T14:43:38.000Z ##

Fragnesia (CVE-2026-46300) i DirtyDecrypt (CVE-2026-31635) ( nfsec.pl/security/6722 ) #linux #kernel #security

youtube.com/watch?v=dWAPcXh8UEE

##

giggls@karlsruhe-social.de at 2026-05-18T09:14:38.000Z ##

Hm #Debian hat immer noch keinen #fragnesia fix.
security-tracker.debian.org/tr

##

Grub_09@mastodon.uno at 2026-05-15T18:24:21.000Z ##

Fragnesia: una nuova vulnerabilità di escalation dei privilegi nel kernel Linux

Scoperta una nuova falla di sicurezza nel kernel Linux, chiamata Fragnesia (CVE-2026-46300), che consente a un utente locale non privilegiato di ottenere i privilegi di amministratore (root) su una distribuzione GNU/Linux.

@linux #UnoLinux #gnulinux #linux

#kernellinux #gnulinuxitalia #linuxitalia #fragnesia

#vulnerabilitalinux

laseroffice.it/blog/2026/05/14

##

CVE-2026-44633
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T18:00:36.000Z ##

🟠 CVE-2026-44633 - High (8.1)

Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint acce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:00:36.000Z ##

🟠 CVE-2026-44633 - High (8.1)

Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint acce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43906
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T15:00:35.000Z ##

🟠 CVE-2026-43906 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a heap-based buffer overflow in the HEIF decoder of OpenImageIO allows out-of-bounds ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T15:00:35.000Z ##

🟠 CVE-2026-43906 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a heap-based buffer overflow in the HEIF decoder of OpenImageIO allows out-of-bounds ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43905
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T15:00:23.000Z ##

🟠 CVE-2026-43905 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T15:00:23.000Z ##

🟠 CVE-2026-43905 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43903
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T14:00:37.000Z ##

🟠 CVE-2026-43903 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, sgiinput.cpp:265,274 use OIIO_DASSERT for bounds checking in the RLE decode loop. In ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T14:00:37.000Z ##

🟠 CVE-2026-43903 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, sgiinput.cpp:265,274 use OIIO_DASSERT for bounds checking in the RLE decode loop. In ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43909
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T14:00:25.000Z ##

🟠 CVE-2026-43909 - High (8.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T14:00:25.000Z ##

🟠 CVE-2026-43909 - High (8.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44699
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq at 2026-05-16T09:00:28.867Z ##

⚠️ CRITICAL: CVE-2026-44699 in libjwt (3.0.0 – 3.3.2) lets attackers forge JWTs by exploiting HMAC verification with a zero-length key if RSA JWKs lack the alg parameter. Patch to 3.3.3 or confirm vendor remediation! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-16T09:00:28.000Z ##

⚠️ CRITICAL: CVE-2026-44699 in libjwt (3.0.0 – 3.3.2) lets attackers forge JWTs by exploiting HMAC verification with a zero-length key if RSA JWKs lack the alg parameter. Patch to 3.3.3 or confirm vendor remediation! radar.offseq.com/threat/cve-20 #OffSeq #JWT #Infosec

##

CVE-2026-24401
(0 None)

EPSS: 0.04%

1 posts

N/A

linux@activitypub.awakari.com at 2026-05-14T20:48:06.000Z ## Ubuntu 26.04 LTS Avahi Critical DoS Fix USN-8269-1 CVE-2026-24401 Several security issues were fixed in Avahi.

#Ubuntu #Linux #Distribution #- #Security #Advisories

Origin | Interest | Match ##

Visit counter For Websites