## Updated at UTC 2026-05-22T12:58:10.459548

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-8679 7.5 0.00% 4 0 2026-05-22T09:16:32.887000 The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Re
CVE-2026-45250 7.8 0.02% 4 1 2026-05-22T08:16:14.847000 The setcred(2) system call is only available to privileged users. However, befo
CVE-2026-9018 8.8 0.00% 2 0 2026-05-22T06:31:44 The Easy Elements for Elementor – Addons & Website Templates plugin for WordPres
CVE-2026-4834 7.5 0.00% 2 0 2026-05-22T06:31:44 The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'sear
CVE-2026-41054 7.8 0.01% 1 0 2026-05-22T04:16:24.770000 In `src/havegecmd.c`, the `socket_handler` function performs a credential check
CVE-2026-34908 10.0 0.00% 4 0 2026-05-22T03:30:33 A malicious actor with access to the network could exploit an Improper Access Co
CVE-2026-9264 0 0.00% 2 0 2026-05-22T02:16:35.073000 A cross-site scripting (XSS) vulnerability in SketchUp 2026's Dynamic Components
CVE-2026-34911 7.7 0.00% 2 0 2026-05-22T02:16:34.667000 A malicious actor with access to the network and low privileges could exploit a
CVE-2026-34910 10.0 0.00% 4 0 2026-05-22T02:16:34.527000 A malicious actor with access to the network could exploit an Improper Input Val
CVE-2026-34909 10.0 0.00% 4 0 2026-05-22T02:16:34.390000 A malicious actor with access to the network could exploit a Path Traversal vuln
CVE-2026-33000 9.1 0.00% 4 0 2026-05-22T02:16:33.933000 A malicious actor with access to the network and high privileges could exploit a
CVE-2026-46473 7.5 0.00% 4 0 2026-05-22T00:32:19 Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand. Secret
CVE-2026-6960 9.8 0.00% 4 0 2026-05-21T22:16:48.643000 The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file upload
CVE-2026-28764 7.8 0.01% 1 0 2026-05-21T21:31:36 MediaArea MediaInfoLib LXF element parsing heap-based buffer overflow vulnerabil
CVE-2026-47114 8.8 0.00% 2 0 2026-05-21T21:30:35 IINA before 1.4.3 contains a user-assisted command execution vulnerability that
CVE-2026-47102 8.8 0.00% 2 0 2026-05-21T21:16:32.557000 LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /us
CVE-2026-47101 8.8 0.00% 2 0 2026-05-21T21:16:32.413000 LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API key
CVE-2026-34926 6.7 0.00% 9 1 2026-05-21T20:16:14.027000 A directory traversal vulnerability in the Apex One (on-premise) server could al
CVE-2025-34291 8.8 9.49% 5 1 2026-05-21T20:16:13.520000 Langflow versions up to and including 1.6.9 contain a chained vulnerability that
CVE-2026-24216 7.8 0.06% 1 0 2026-05-21T20:08:32.900000 NVIDIA BioNemo for Linux contains a vulnerability where a user could cause a des
CVE-2026-4858 8.0 0.03% 1 0 2026-05-21T19:43:31.373000 Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.
CVE-2026-20239 7.5 0.02% 1 0 2026-05-21T19:42:21.353000 In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform
CVE-2026-48207 9.8 0.00% 4 0 2026-05-21T19:16:53.700000 Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializ
CVE-2026-39531 9.3 0.00% 1 0 2026-05-21T19:10:36.607000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-9089 8.8 0.00% 1 0 2026-05-21T19:10:21.527000 The ConnectWise Automate™ Agent does not fully verify the authenticity of compon
CVE-2026-48235 8.2 0.00% 1 0 2026-05-21T19:10:12.323000 Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/r
CVE-2026-48242 8.1 0.00% 1 0 2026-05-21T19:10:12.323000 Open ISES Tickets before 3.44.2 contains hardcoded MySQL database connection cre
CVE-2026-45251 7.8 0.02% 2 0 2026-05-21T19:01:22.710000 A file descriptor can be closed while a thread is blocked in a poll(2) or select
CVE-2026-45253 8.4 0.02% 2 0 2026-05-21T19:01:01.833000 ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) a
CVE-2026-8631 9.8 0.02% 1 0 2026-05-21T18:58:41.297000 A potential security vulnerability has been identified in the HP Linux Imaging a
CVE-2026-48241 8.1 0.00% 2 0 2026-05-21T18:33:15 Open ISES Tickets before 3.44.2 contains hardcoded MySQL database credentials in
CVE-2026-43494 None 0.02% 2 0 2026-05-21T18:33:09 In the Linux kernel, the following vulnerability has been resolved: net/rds: re
CVE-2026-47783 8.1 0.05% 1 0 2026-05-21T17:06:40.670000 In memcached before 1.6.42, username data for SASL password database authenticat
CVE-2026-47784 8.1 0.05% 1 0 2026-05-21T17:06:33.240000 In memcached before 1.6.42, password data for SASL password database authenticat
CVE-2026-9111 8.8 0.02% 1 0 2026-05-21T16:56:46.883000 Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allow
CVE-2026-9114 8.8 0.03% 1 0 2026-05-21T16:56:26.853000 Use after free in QUIC in Google Chrome on prior to 148.0.7778.179 allowed a rem
CVE-2026-9118 8.8 0.03% 1 0 2026-05-21T16:45:19.020000 Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed
CVE-2026-9119 8.8 0.02% 1 0 2026-05-21T16:44:34.153000 Heap buffer overflow in WebRTC in Google Chrome on prior to 148.0.7778.179 allow
CVE-2026-9123 7.5 0.00% 1 0 2026-05-21T16:31:56.420000 Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS
CVE-2026-9126 8.8 0.03% 1 0 2026-05-21T16:23:01.260000 Use after free in DOM in Google Chrome on prior to 148.0.7778.179 allowed a remo
CVE-2026-47372 9.1 0.01% 2 0 2026-05-21T16:04:53.813000 Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values
CVE-2026-23734 0 0.04% 1 0 2026-05-21T16:04:53.813000 XWiki Platform is a generic wiki platform. Versions prior to 18.1.0-rc-1, 17.10.
CVE-2026-33137 0 0.04% 1 0 2026-05-21T16:04:53.813000 XWiki Platform is a generic wiki platform offering runtime services for applicat
CVE-2026-40092 7.5 0.06% 1 0 2026-05-21T16:04:53.813000 nimiq-blockchain provides persistent block storage for Nimiq's Rust implementati
CVE-2026-0393 0 0.05% 1 0 2026-05-21T16:04:33.830000 The affected product may expose credentials remotely between low privileged visu
CVE-2026-45255 7.5 0.03% 2 0 2026-05-21T15:35:16 When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, the
CVE-2025-71217 7.8 0.00% 2 0 2026-05-21T15:34:18 An origin validation error vulnerability in the Trend Micro Apex One (mac) agent
CVE-2025-71214 7.8 0.00% 2 0 2026-05-21T15:34:18 An origin validation error vulnerability in the Trend Micro Apex One (mac) agent
CVE-2026-34927 7.8 0.00% 8 0 2026-05-21T15:34:18 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-45207 7.8 0.00% 3 0 2026-05-21T15:34:18 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-45206 7.8 0.00% 3 0 2026-05-21T15:34:18 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2025-71211 9.8 0.00% 2 0 2026-05-21T15:34:17 A vulnerability in the Trend Micro Apex One management console could allow a rem
CVE-2025-13479 7.5 0.00% 2 0 2026-05-21T15:34:17 Authorization bypass through User-Controlled key vulnerability in PosCube Hardwa
CVE-2026-42001 7.5 0.02% 1 0 2026-05-21T15:27:51.530000 Insufficient Validation of Autoprimary SOA Queries
CVE-2026-2740 8.4 0.00% 2 0 2026-05-21T15:26:35.653000 Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus
CVE-2026-24188 8.2 0.04% 1 0 2026-05-21T15:26:35.653000 NVIDIA TensorRT contains a vulnerability where an attacker could cause an out-of
CVE-2026-9157 8.4 0.02% 2 0 2026-05-21T15:24:25.330000 Improper input validation, Unrestricted upload of file with dangerous type vulne
CVE-2026-9082 6.5 0.01% 4 5 2026-05-21T15:24:25.330000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-39405 0 0.05% 1 0 2026-05-21T15:24:25.330000 Frappe Learning Management System (LMS) is a learning system that helps users st
CVE-2026-39310 8.6 0.06% 1 0 2026-05-21T15:24:25.330000 Trilium Notes is a cross-platform, hierarchical note taking application focused
CVE-2026-40165 8.7 0.02% 1 0 2026-05-21T15:24:25.330000 authentik is an open-source identity provider. Versions 2025.12.4 and prior, and
CVE-2026-9133 7.7 0.02% 1 0 2026-05-21T15:24:25.330000 Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before ve
CVE-2026-44052 7.5 0.03% 2 0 2026-05-21T15:20:19.040000 Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output
CVE-2026-44051 8.1 0.04% 2 0 2026-05-21T15:20:19.040000 An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows
CVE-2026-44050 9.9 0.14% 2 0 2026-05-21T15:20:19.040000 A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk
CVE-2026-44049 7.5 0.19% 2 0 2026-05-21T15:20:19.040000 An out-of-bounds write due to improper null termination in convert_charset() in
CVE-2026-44048 8.8 0.14% 2 0 2026-05-21T15:20:19.040000 A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in N
CVE-2026-44055 7.5 0.23% 2 0 2026-05-21T15:20:19.040000 A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 al
CVE-2026-5118 9.8 0.00% 4 4 2026-05-21T15:19:30.540000 The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation
CVE-2026-6279 9.8 0.10% 2 0 2026-05-21T15:19:30.540000 The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthe
CVE-2026-45444 10.0 0.04% 1 0 2026-05-21T15:19:30.540000 Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift
CVE-2026-9139 9.8 0.13% 2 0 2026-05-21T15:17:59.850000 Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded crede
CVE-2026-9141 9.8 0.22% 2 0 2026-05-21T15:17:59.850000 Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication
CVE-2026-9144 7.6 0.04% 1 0 2026-05-21T15:17:59.850000 Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-sit
CVE-2025-71216 7.8 0.00% 2 0 2026-05-21T15:16:22.037000 A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agen
CVE-2025-71213 7.8 0.00% 2 0 2026-05-21T15:05:28.023000 An origin validation error vulnerability in Trend Micro Apex One could allow a l
CVE-2025-71212 7.8 0.00% 2 0 2026-05-21T15:05:28.023000 A link following vulnerability in the Trend Micro Apex One scan engine could all
CVE-2025-71210 9.8 0.00% 4 0 2026-05-21T15:05:28.023000 A vulnerability in the Trend Micro Apex One management console could allow a rem
CVE-2026-34930 7.8 0.00% 2 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-34929 7.8 0.00% 2 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-34928 7.8 0.00% 2 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-45208 7.8 0.00% 2 0 2026-05-21T15:05:28.023000 A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow
CVE-2026-46333 7.1 0.01% 9 4 2026-05-21T14:16:48.910000 In the Linux kernel, the following vulnerability has been resolved: ptrace: sli
CVE-2008-4250 9.8 93.62% 2 4 2026-05-21T12:57:17.353000 The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
CVE-2009-1537 8.8 74.07% 2 0 2026-05-21T12:57:12.850000 Unspecified vulnerability in the QuickTime Movie Parser Filter in quartz.dll in
CVE-2010-0806 8.8 88.22% 2 0 2026-05-21T12:57:10.303000 Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in
CVE-2010-0249 8.8 88.64% 3 0 2026-05-21T12:57:01.463000 Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 o
CVE-2009-3459 8.8 90.52% 2 0 2026-05-21T12:56:49.133000 Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x bef
CVE-2026-5433 9.1 0.26% 2 0 2026-05-21T09:32:17 Honeywell Control Network Module (CNM) contains command injection vulnerability
CVE-2026-44062 7.5 0.19% 2 0 2026-05-21T09:32:16 A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 t
CVE-2026-44068 7.6 0.11% 2 0 2026-05-21T09:32:16 Incomplete sanitization of extended attribute (EA) path components in Netatalk 2
CVE-2026-44060 7.5 0.08% 2 0 2026-05-21T09:32:10 An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a
CVE-2026-44047 8.8 0.08% 2 0 2026-05-21T09:32:09 An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 throu
CVE-2026-42959 7.5 0.04% 1 0 2026-05-21T00:31:30 NLnet Labs Unbound up to and including version 1.25.0 has a denial of service vu
CVE-2026-44390 5.3 0.04% 1 0 2026-05-21T00:31:30 NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability when h
CVE-2026-33278 9.8 0.24% 2 0 2026-05-21T00:31:30 NLnet Labs Unbound 1.19.1 up to and including version 1.25.0 has a vulnerability
CVE-2026-41292 7.5 0.06% 1 0 2026-05-21T00:30:27 NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degrada
CVE-2026-44608 5.9 0.04% 1 0 2026-05-20T22:52:48.303000 NLnet Labs Unbound 1.14.0 up to and including version 1.25.0 has a locking incon
CVE-2026-42960 10.0 0.02% 1 0 2026-05-20T22:51:43.680000 NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning
CVE-2026-42944 7.5 0.04% 1 0 2026-05-20T22:50:49.877000 NLnet Labs Unbound 1.14.0 up to and including version 1.25.0 has a vulnerability
CVE-2026-42923 5.3 0.04% 1 0 2026-05-20T22:50:35.780000 NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability in the
CVE-2026-42534 5.3 0.03% 1 0 2026-05-20T22:50:00.157000 NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability in the
CVE-2026-32792 5.3 0.04% 1 0 2026-05-20T22:44:09.940000 NLnet Labs Unbound 1.6.2 up to and including version 1.25.0 has a denial of serv
CVE-2026-9120 8.8 0.03% 1 0 2026-05-20T21:31:40 Use after free in WebRTC in Google Chrome prior to 148.0.7778.179 allowed a remo
CVE-2026-9117 7.5 0.02% 1 0 2026-05-20T21:31:40 Type Confusion in GFX in Google Chrome on Linux, ChromeOS prior to 148.0.7778.17
CVE-2026-9121 8.8 0.02% 1 0 2026-05-20T21:31:40 Out of bounds read in GPU in Google Chrome on prior to 148.0.7778.179 allowed a
CVE-2026-9112 8.8 0.03% 1 0 2026-05-20T21:31:39 Use after free in GPU in Google Chrome on Windows prior to 148.0.7778.179 allowe
CVE-2026-41091 7.8 12.10% 6 1 2026-05-20T19:06:36.850000 Improper link resolution before file access ('link following') in Microsoft Defe
CVE-2026-45584 8.1 0.04% 3 1 2026-05-20T18:56:32.350000 Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker
CVE-2026-45498 4.0 2.27% 5 0 2026-05-20T18:31:35 Microsoft Defender Denial of Service Vulnerability
CVE-2026-24207 9.8 0.10% 1 0 2026-05-20T17:30:43.320000 NVIDIA Triton Inference Server contains a vulnerability where an attacker could
CVE-2026-20223 10.0 0.05% 8 1 2026-05-20T17:30:40.450000 A vulnerability in the&nbsp;access validation of internal REST APIs of Cisco Sec
CVE-2026-8598 9.1 0.05% 1 0 2026-05-20T17:30:40.450000 An undocumented configuration export port is accessible on some models of ZKTec
CVE-2026-40622 None 0.02% 1 0 2026-05-20T15:35:29 NLnet Labs Unbound 1.16.2 up to and including version 1.25.0 has a vulnerability
CVE-2026-45585 6.8 0.09% 5 2 2026-05-20T15:35:28 Microsoft is aware of a security feature bypass vulnerability in Windows publicl
CVE-2026-9064 7.5 0.08% 1 0 2026-05-20T14:02:12.280000 A flaw was found in 389-ds-base. The get_ldapmessage_controls_ext() function in
CVE-2026-44933 7.8 0.01% 1 0 2026-05-20T14:01:24.027000 `PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this ro
CVE-2026-9065 0 0.03% 1 0 2026-05-20T14:01:24.027000 SureCart version prior to 4.2.1 are vulnerable to authenticated SQL injection vi
CVE-2026-9059 0 0.03% 1 0 2026-05-20T14:01:24.027000 NextGEN Gallery version prior to 4.2.1 are vulnerable to authenticated SQL injec
CVE-2026-5200 8.8 0.04% 1 0 2026-05-20T13:54:54.890000 The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution
CVE-2026-8953 9.6 0.04% 1 0 2026-05-19T18:45:32.087000 Sandbox escape due to use-after-free in the Disability Access APIs component. Th
CVE-2026-6068 6.5 0.12% 1 0 2026-05-19T15:31:21 NASM contains a heap use after free vulnerability in response file (-@) processi
CVE-2026-45829 0 0.14% 1 2 2026-05-19T14:16:46.977000 A pre-authentication, code injection vulnerability in version 1.0.0 or later of
CVE-2020-17103 7.0 0.33% 1 4 2026-05-18T13:16:28.530000 Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-42897 8.1 10.03% 1 1 2026-05-15T19:35:52.963000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-42945 8.1 0.27% 3 28 2026-05-14T21:30:40 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo
CVE-2026-44578 8.6 4.48% 1 7 template 2026-05-14T18:34:38.530000 Next.js is a React framework for building full-stack web applications. From 13.4
CVE-2026-40369 7.8 0.02% 4 2 2026-05-14T17:52:50.143000 Untrusted pointer dereference in Windows Kernel allows an authorized attacker to
CVE-2026-0265 0 0.06% 1 1 2026-05-13T18:17:47.830000 An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en
CVE-2026-28910 3.3 0.01% 1 0 2026-05-13T14:02:20.380000 This issue was addressed with improved permissions checking. This issue is fixed
CVE-2026-0300 9.8 14.43% 1 9 2026-05-12T18:47:21.360000 A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Capti
CVE-2026-1502 None 0.07% 4 0 2026-05-10T21:30:22 CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.
CVE-2026-34474 7.5 0.05% 1 1 2026-05-07T15:15:06.770000 Sensitive data exposure leading to admin/WLAN credential leak in ZTE ZXHN H298A
CVE-2026-5140 8.8 0.06% 3 0 2026-05-04T14:16:35.190000 Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TU
CVE-2013-0422 9.8 93.61% 1 0 2026-04-21T19:02:35.430000 Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attacker
CVE-2024-12802 9.1 0.06% 5 0 2026-04-15T00:35:42.020000 SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the s
CVE-2025-6919 9.8 0.04% 1 1 2026-04-15T00:35:42.020000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-34472 7.1 0.15% 1 1 2026-04-08T16:05:42.877000 Unauthenticated credential disclosure in the wizard interface in ZTE ZXHN H188A
CVE-2026-3102 6.3 0.26% 6 2 2026-02-26T21:32:34 A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affe
CVE-2026-26980 9.4 54.31% 4 3 2026-02-20T19:22:53.637000 Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 all
CVE-2024-9643 9.8 19.09% 1 0 2025-09-19T19:33:43.980000 The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authenticatio
CVE-2024-45337 9.1 30.30% 1 4 2025-01-31T15:30:44 Applications and libraries which misuse the ServerConfig.PublicKeyCallback callb
CVE-2010-5139 None 0.32% 1 0 2023-02-01T05:07:57 Integer overflow in wxBitcoin and bitcoind before 0.3.11 allows remote attackers
CVE-2021-25740 3.1 0.51% 1 0 2023-02-01T05:06:20 A security issue was discovered with Kubernetes that could enable users to send
CVE-2026-25606 0 0.00% 2 0 N/A
CVE-2026-9011 0 0.00% 2 0 N/A
CVE-2026-46300 0 0.00% 2 8 N/A
CVE-2026-47243 0 0.00% 2 0 N/A
CVE-2026-0001 0 0.00% 1 2 N/A
CVE-2026-47746 0 0.00% 1 0 N/A
CVE-2026-46712 0 0.00% 1 0 N/A
CVE-2026-46714 0 0.00% 1 0 N/A
CVE-2026-48115 0 0.00% 1 0 N/A
CVE-2026-46713 0 0.00% 1 0 N/A
CVE-2026-4294 0 0.00% 1 25 N/A

CVE-2026-8679
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-22T09:16:32.887000

4 posts

The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playlist ID via the audioigniter_playlist_id query var or the /audioigniter/playlist/{id}/ rewrite rule and returning playlist track data without performing a

thehackerwire@mastodon.social at 2026-05-22T10:00:01.000Z ##

🟠 CVE-2026-8679 - High (7.5)

The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-22T09:00:41.045Z ##

🔈 CVE-2026-8679 (HIGH): AudioIgniter Music Player plugin ≤2.0.2 lets unauthenticated attackers access any playlist's metadata — including private & draft tracks — via insecure playlist ID handling. Restrict access & monitor for patches. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-22T10:00:01.000Z ##

🟠 CVE-2026-8679 - High (7.5)

The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-22T09:00:41.000Z ##

🔈 CVE-2026-8679 (HIGH): AudioIgniter Music Player plugin ≤2.0.2 lets unauthenticated attackers access any playlist's metadata — including private & draft tracks — via insecure playlist ID handling. Restrict access & monitor for patches. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-45250
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-22T08:16:14.847000

4 posts

The setcred(2) system call is only available to privileged users. However, before the privilege level of the caller is checked, the user-supplied list of supplementary groups is copied into a fixed-size kernel stack buffer without first validating its length. If the supplied list exceeds the capacity of that buffer, a stack buffer overflow occurs. Because the bounds check on the supplementary g

1 repos

https://github.com/venglin/setcred

thehackerwire@mastodon.social at 2026-05-22T05:00:30.000Z ##

🟠 CVE-2026-45250 - High (7.8)

The setcred(2) system call is only available to privileged users. However, before the privilege level of the caller is checked, the user-supplied list of supplementary groups is copied into a fixed-size kernel stack buffer without first validatin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T05:00:30.000Z ##

🟠 CVE-2026-45250 - High (7.8)

The setcred(2) system call is only available to privileged users. However, before the privilege level of the caller is checked, the user-supplied list of supplementary groups is copied into a fixed-size kernel stack buffer without first validatin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

xeiaso.net@bsky.brid.gy at 2026-05-21T15:37:30.627Z ##

"No way to prevent this" say users of only language where this regularly happens https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45250/

"No way to prevent this" say u...

##

cadey@pony.social at 2026-05-21T15:37:30.000Z ##

"No way to prevent this" say users of only language where this regularly happens

xeiaso.net/shitposts/no-way-to

##

CVE-2026-9018
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-22T06:31:44

2 posts

The Easy Elements for Elementor – Addons & Website Templates plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.4.5 via the `easyel_handle_register()` function. This is due to the `wp_ajax_nopriv_eel_register` AJAX handler iterating the attacker-controlled `custom_meta` POST array and writing every supplied key-value pair to the newly created user's

thehackerwire@mastodon.social at 2026-05-22T06:01:01.000Z ##

🟠 CVE-2026-9018 - High (8.8)

The Easy Elements for Elementor – Addons & Website Templates plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.4.5 via the `easyel_handle_register()` function. This is due to the `wp_ajax_nopriv_e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T06:01:01.000Z ##

🟠 CVE-2026-9018 - High (8.8)

The Easy Elements for Elementor – Addons & Website Templates plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.4.5 via the `easyel_handle_register()` function. This is due to the `wp_ajax_nopriv_e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4834
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-22T06:31:44

2 posts

The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'search_key' parameter in all versions up to, and including, 1.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be

thehackerwire@mastodon.social at 2026-05-22T04:59:48.000Z ##

🟠 CVE-2026-4834 - High (7.5)

The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'search_key' parameter in all versions up to, and including, 1.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T04:59:48.000Z ##

🟠 CVE-2026-4834 - High (7.5)

The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'search_key' parameter in all versions up to, and including, 1.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41054
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-22T04:16:24.770000

1 posts

In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privi

thehackerwire@mastodon.social at 2026-05-20T19:01:24.000Z ##

🟠 CVE-2026-41054 - High (7.8)

In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowle...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34908
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-05-22T03:30:33

4 posts

A malicious actor with access to the network could exploit an Improper Access Control vulnerability found in UniFi OS devices to make unauthorized changes to the system.

offseq at 2026-05-22T06:00:27.057Z ##

🚨 CVE-2026-34908 (CVSS 10.0): Ubiquiti UniFi OS Server has a critical improper access control flaw, allowing unauthenticated remote compromise. No patch yet — restrict network access & monitor vendor updates. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-22T03:00:10.000Z ##

🔴 CVE-2026-34908 - Critical (10)

A malicious actor with access to the network could exploit an Improper Access Control vulnerability found in UniFi OS devices to make unauthorized changes to the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-22T06:00:27.000Z ##

🚨 CVE-2026-34908 (CVSS 10.0): Ubiquiti UniFi OS Server has a critical improper access control flaw, allowing unauthenticated remote compromise. No patch yet — restrict network access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #UniFi #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-05-22T03:00:10.000Z ##

🔴 CVE-2026-34908 - Critical (10)

A malicious actor with access to the network could exploit an Improper Access Control vulnerability found in UniFi OS devices to make unauthorized changes to the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9264
(0 None)

EPSS: 0.00%

updated 2026-05-22T02:16:35.073000

2 posts

A cross-site scripting (XSS) vulnerability in SketchUp 2026's Dynamic Components feature allows remote code execution and local file exfiltration through maliciously crafted SKP files. The vulnerability stems from improper input sanitization in the component options window, enabling attackers to execute arbitrary system commands and read local files without user interaction by exploiting an embedd

offseq at 2026-05-22T03:00:23.946Z ##

⚠️ CRITICAL: CVE-2026-9264 in Trimble SketchUp 2026 allows RCE & file exfiltration via malicious SKP files (Dynamic Components, IE11 browser). No patch yet. Avoid untrusted SKP files. More: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-22T03:00:23.000Z ##

⚠️ CRITICAL: CVE-2026-9264 in Trimble SketchUp 2026 allows RCE & file exfiltration via malicious SKP files (Dynamic Components, IE11 browser). No patch yet. Avoid untrusted SKP files. More: radar.offseq.com/threat/cve-20 #OffSeq #SketchUp #Vuln #InfoSec

##

CVE-2026-34911
(7.7 HIGH)

EPSS: 0.00%

updated 2026-05-22T02:16:34.667000

2 posts

A malicious actor with access to the network and low privileges could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to obtain sensitive information.

thehackerwire@mastodon.social at 2026-05-22T04:00:28.000Z ##

🟠 CVE-2026-34911 - High (7.7)

A malicious actor with access to the network and low privileges could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to obtain sensitive information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T04:00:28.000Z ##

🟠 CVE-2026-34911 - High (7.7)

A malicious actor with access to the network and low privileges could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to obtain sensitive information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34910
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-05-22T02:16:34.527000

4 posts

A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

offseq at 2026-05-22T04:30:26.107Z ##

🚨 CVE-2026-34910: CRITICAL improper input validation in Ubiquiti UniFi OS Server allows unauthenticated command injection (CVSS 10.0). No patch yet. Restrict network access & monitor vendor updates. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-22T03:00:30.000Z ##

🔴 CVE-2026-34910 - Critical (10)

A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-22T04:30:26.000Z ##

🚨 CVE-2026-34910: CRITICAL improper input validation in Ubiquiti UniFi OS Server allows unauthenticated command injection (CVSS 10.0). No patch yet. Restrict network access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Ubiquiti #Infosec

##

thehackerwire@mastodon.social at 2026-05-22T03:00:30.000Z ##

🔴 CVE-2026-34910 - Critical (10)

A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34909
(10.0 CRITICAL)

EPSS: 0.00%

updated 2026-05-22T02:16:34.390000

4 posts

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to access an underlying account.

offseq at 2026-05-22T07:30:26.604Z ##

🔒 CRITICAL: CVE-2026-34909 - Path Traversal in Ubiquiti UniFi OS Server (CVSS 10). Allows arbitrary file access & manipulation. No patch yet — restrict access & monitor! Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-22T03:00:20.000Z ##

🔴 CVE-2026-34909 - Critical (10)

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to access an underlying account.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-22T07:30:26.000Z ##

🔒 CRITICAL: CVE-2026-34909 - Path Traversal in Ubiquiti UniFi OS Server (CVSS 10). Allows arbitrary file access & manipulation. No patch yet — restrict access & monitor! Details: radar.offseq.com/threat/cve-20 #OffSeq #UniFi #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-05-22T03:00:20.000Z ##

🔴 CVE-2026-34909 - Critical (10)

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to access an underlying account.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33000
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-05-22T02:16:33.933000

4 posts

A malicious actor with access to the network and high privileges could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

thehackerwire@mastodon.social at 2026-05-22T04:00:38.000Z ##

🔴 CVE-2026-33000 - Critical (9.1)

A malicious actor with access to the network and high privileges could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-22T01:30:31.277Z ##

🚨 CVE-2026-33000 (CVSS 9.1): Ubiquiti UniFi OS Server has a critical improper input validation flaw. High-privileged attackers on the network can execute command injection. Mitigation steps not published yet. Stay tuned: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-22T04:00:38.000Z ##

🔴 CVE-2026-33000 - Critical (9.1)

A malicious actor with access to the network and high privileges could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-22T01:30:31.000Z ##

🚨 CVE-2026-33000 (CVSS 9.1): Ubiquiti UniFi OS Server has a critical improper input validation flaw. High-privileged attackers on the network can execute command injection. Mitigation steps not published yet. Stay tuned: radar.offseq.com/threat/cve-20 #OffSeq #Infosec #UniFiOS

##

CVE-2026-46473
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-22T00:32:19

4 posts

Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand. Secrets were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.

offseq at 2026-05-22T00:00:37.354Z ##

🚩 HIGH severity: CVE-2026-46473 in Authen::TOTP (<0.1.1, Perl) — secrets generated with rand are predictable, weakening TOTP security. Upgrade to 0.1.1+ when possible. More: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-21T21:00:43.000Z ##

🟠 CVE-2026-46473 - High (7.5)

Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand.

Secrets were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-22T00:00:37.000Z ##

🚩 HIGH severity: CVE-2026-46473 in Authen::TOTP (<0.1.1, Perl) — secrets generated with rand are predictable, weakening TOTP security. Upgrade to 0.1.1+ when possible. More: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Perl #MFA #CVE202646473

##

thehackerwire@mastodon.social at 2026-05-21T21:00:43.000Z ##

🟠 CVE-2026-46473 - High (7.5)

Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand.

Secrets were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6960
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-21T22:16:48.643000

4 posts

The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'bookingpress_validate_submitted_booking_form_func' function in all versions up to, and including, 5.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulne

thehackerwire@mastodon.social at 2026-05-21T23:00:05.000Z ##

🔴 CVE-2026-6960 - Critical (9.8)

The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'bookingpress_validate_submitted_booking_form_func' function in all versions up to, and including, 5.6. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-21T22:30:12.594Z ##

🔴 CRITICAL: CVE-2026-6960 in BookingPress Appointment Booking Pro (≤5.6) allows unauthenticated file uploads — risk of RCE! Remove signature fields & monitor uploads. No patch yet — stay vigilant. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-21T23:00:05.000Z ##

🔴 CVE-2026-6960 - Critical (9.8)

The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'bookingpress_validate_submitted_booking_form_func' function in all versions up to, and including, 5.6. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-21T22:30:12.000Z ##

🔴 CRITICAL: CVE-2026-6960 in BookingPress Appointment Booking Pro (≤5.6) allows unauthenticated file uploads — risk of RCE! Remove signature fields & monitor uploads. No patch yet — stay vigilant. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #CyberAlert

##

CVE-2026-28764
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T21:31:36

1 posts

MediaArea MediaInfoLib LXF element parsing heap-based buffer overflow vulnerability

thehackerwire@mastodon.social at 2026-05-21T12:00:07.000Z ##

🟠 CVE-2026-28764 - High (7.8)

MediaArea MediaInfoLib LXF element parsing heap-based buffer overflow vulnerability

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47114
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T21:30:35

2 posts

IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attackers can deliver a crafted URL via a browser that passes unvalidated mpv_options/input-commands parameters into the mpv runtime, causing arbitrary command e

thehackerwire@mastodon.social at 2026-05-21T21:00:33.000Z ##

🟠 CVE-2026-47114 - High (8.8)

IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attacker...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T21:00:33.000Z ##

🟠 CVE-2026-47114 - High (8.8)

IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attacker...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47102
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T21:16:32.557000

2 posts

LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /user/update endpoint. While the endpoint correctly restricts users to updating only their own account, it does not restrict which fields may be changed. A user who can reach this endpoint can set their role to proxy_admin, gaining full administrative access to LiteLLM including all users, teams, keys, models, and prompt

thehackerwire@mastodon.social at 2026-05-21T22:00:58.000Z ##

🟠 CVE-2026-47102 - High (8.8)

LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /user/update endpoint. While the endpoint correctly restricts users to updating only their own account, it does not restrict which fields may be changed. A user who can r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:00:58.000Z ##

🟠 CVE-2026-47102 - High (8.8)

LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /user/update endpoint. While the endpoint correctly restricts users to updating only their own account, it does not restrict which fields may be changed. A user who can r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47101
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T21:16:32.413000

2 posts

LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When generating a key, the allowed_routes field is stored without verifying that the specified routes fall within the user's own permissions. A key created with access to admin-only routes can then be used to reach those routes successfully, bypassing the role-ba

thehackerwire@mastodon.social at 2026-05-21T22:00:45.000Z ##

🟠 CVE-2026-47101 - High (8.8)

LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When generating a key, the allowed_routes field is stored without verifying that the specified routes fall wit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:00:45.000Z ##

🟠 CVE-2026-47101 - High (8.8)

LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When generating a key, the allowed_routes field is stored without verifying that the specified routes fall wit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34926
(6.7 MEDIUM)

EPSS: 0.00%

updated 2026-05-21T20:16:14.027000

9 posts

A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations. This vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained adminis

1 repos

https://github.com/HORKimhab/CVE-2026-34926

beyondmachines1 at 2026-05-22T09:01:07.391Z ##

Trend Micro Patches Actively Exploited Directory Traversal in Apex One

Trend Micro patched eight vulnerabilities in Apex One and Vision One, including a directory traversal flaw (CVE-2026-34926) that is exploited in the wild to inject malicious code into security agents.

**If you're using Trend Micro Apex One (on-premise) or Vision One, you are under attack. Immediately update to the patched versions (SP1 CP Build 18012 / SP1 Build 17079 for on-premise, or agent build 14.0.20731+ for cloud) since one of its flaws is actively exploited to push malware through your own security tools. Even if the exploited flaw requires authentication, obviously that is not difficult to obtain for hackers.**

beyondmachines.net/event_detai

##

Analyst207@mastodon.social at 2026-05-22T07:16:42.000Z ##

CISA Flags Actively Exploited Langflow, Trend Micro Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm on two major vulnerabilities, CVE-2025-34291 and CVE-2026-34926, currently being exploited by hackers, and is requiring federal agencies to patch them by June 4, 2026. These weaknesses, found in Langflow and Trend Micro Apex One, could…

osintsights.com/cisa-flags-act

#KnownExploitedVulnerabilities #Cve202534291 #Cve202634926 #Langflow #TrendMicro

##

Matchbook3469@mastodon.social at 2026-05-21T23:39:29.000Z ##

🟡 New security advisory:

CVE-2026-34926 affects multiple systems.

• Impact: Security weakness that could be exploited
• Risk: Potential for targeted attacks
• Mitigation: Schedule patching in your next maintenance window

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #ZeroDay #ThreatIntel

##

secdb at 2026-05-21T22:00:19.005Z ##

🚨 [CISA-2026:0521] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-34291 (secdb.nttzen.cloud/cve/detail/)
- Name: Langflow Origin Validation Error Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/langflow-ai/langflow ; github.com/langflow-ai/langflo; github.com/langflow-ai/langflo ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34926 (secdb.nttzen.cloud/cve/detail/)
- Name: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Trend Micro
- Product: Apex One
- Notes: success.trendmicro.com/en-US/s ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-05-21T20:01:09.000Z ##

CVE ID: CVE-2026-34926
Vendor: Trend Micro
Product: Apex One
Date Added: 2026-05-21
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

beyondmachines1@infosec.exchange at 2026-05-22T09:01:07.000Z ##

Trend Micro Patches Actively Exploited Directory Traversal in Apex One

Trend Micro patched eight vulnerabilities in Apex One and Vision One, including a directory traversal flaw (CVE-2026-34926) that is exploited in the wild to inject malicious code into security agents.

**If you're using Trend Micro Apex One (on-premise) or Vision One, you are under attack. Immediately update to the patched versions (SP1 CP Build 18012 / SP1 Build 17079 for on-premise, or agent build 14.0.20731+ for cloud) since one of its flaws is actively exploited to push malware through your own security tools. Even if the exploited flaw requires authentication, obviously that is not difficult to obtain for hackers.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-05-21T22:00:19.000Z ##

🚨 [CISA-2026:0521] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-34291 (secdb.nttzen.cloud/cve/detail/)
- Name: Langflow Origin Validation Error Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/langflow-ai/langflow ; github.com/langflow-ai/langflo; github.com/langflow-ai/langflo ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34926 (secdb.nttzen.cloud/cve/detail/)
- Name: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Trend Micro
- Product: Apex One
- Notes: success.trendmicro.com/en-US/s ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260521 #cisa20260521 #cve_2025_34291 #cve_2026_34926 #cve202534291 #cve202634926

##

cisakevtracker@mastodon.social at 2026-05-21T20:01:09.000Z ##

CVE ID: CVE-2026-34926
Vendor: Trend Micro
Product: Apex One
Date Added: 2026-05-21
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2026-05-21T18:58:09.000Z ##

EITW ../ in Trend Micro Apex One. :brdAlert:

success.trendmicro.com/en-US/s

CVE-2026-34926

TrendAI has released updates to Apex One (on-premise), Apex One as a Service and Vision One - Standard Endpoint Protection (SEP) to resolve multiple vulnerabilities.

##

CVE-2025-34291
(8.8 HIGH)

EPSS: 9.49%

updated 2026-05-21T20:16:13.520000

5 posts

Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the ref

1 repos

https://github.com/amnnrth/CVE-2025-34291_cors_security_scanner

Analyst207@mastodon.social at 2026-05-22T07:16:42.000Z ##

CISA Flags Actively Exploited Langflow, Trend Micro Vulnerabilities

The Cybersecurity and Infrastructure Security Agency (CISA) has sounded the alarm on two major vulnerabilities, CVE-2025-34291 and CVE-2026-34926, currently being exploited by hackers, and is requiring federal agencies to patch them by June 4, 2026. These weaknesses, found in Langflow and Trend Micro Apex One, could…

osintsights.com/cisa-flags-act

#KnownExploitedVulnerabilities #Cve202534291 #Cve202634926 #Langflow #TrendMicro

##

secdb at 2026-05-21T22:00:19.005Z ##

🚨 [CISA-2026:0521] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-34291 (secdb.nttzen.cloud/cve/detail/)
- Name: Langflow Origin Validation Error Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/langflow-ai/langflow ; github.com/langflow-ai/langflo; github.com/langflow-ai/langflo ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34926 (secdb.nttzen.cloud/cve/detail/)
- Name: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Trend Micro
- Product: Apex One
- Notes: success.trendmicro.com/en-US/s ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-05-21T20:00:52.000Z ##

CVE ID: CVE-2025-34291
Vendor: Langflow
Product: Langflow
Date Added: 2026-05-21
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-05-21T22:00:19.000Z ##

🚨 [CISA-2026:0521] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-34291 (secdb.nttzen.cloud/cve/detail/)
- Name: Langflow Origin Validation Error Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/langflow-ai/langflow ; github.com/langflow-ai/langflo; github.com/langflow-ai/langflo ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34926 (secdb.nttzen.cloud/cve/detail/)
- Name: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Trend Micro
- Product: Apex One
- Notes: success.trendmicro.com/en-US/s ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260521 #cisa20260521 #cve_2025_34291 #cve_2026_34926 #cve202534291 #cve202634926

##

cisakevtracker@mastodon.social at 2026-05-21T20:00:52.000Z ##

CVE ID: CVE-2025-34291
Vendor: Langflow
Product: Langflow
Date Added: 2026-05-21
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-24216
(7.8 HIGH)

EPSS: 0.06%

updated 2026-05-21T20:08:32.900000

1 posts

NVIDIA BioNemo for Linux contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-05-21T04:00:22.000Z ##

🟠 CVE-2026-24216 - High (7.8)

NVIDIA BioNemo for Linux contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4858
(8.0 HIGH)

EPSS: 0.03%

updated 2026-05-21T19:43:31.373000

1 posts

Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.x <= 10.11.14 fail to check integration URL for path traversal which allows an malicious authenticated user to call an arbitrary API via system admin Mattermost auth token using via path traversal in integration action URL.. Mattermost Advisory ID: MMSA-2026-00640

thehackerwire@mastodon.social at 2026-05-21T12:00:29.000Z ##

🟠 CVE-2026-4858 - High (8)

Mattermost versions 11.6.x &lt;= 11.6.0, 11.5.x &lt;= 11.5.3, 11.4.x &lt;= 11.4.4, 10.11.x &lt;= 10.11.14 fail to check integration URL for path traversal which allows an malicious authenticated user to call an arbitrary API via system admin Matt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20239
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-21T19:42:21.353000

1 posts

In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a role that has access to the `_internal` index could view session cookies and response bodies that contain sensitive data.

thehackerwire@mastodon.social at 2026-05-20T19:00:24.000Z ##

🟠 CVE-2026-20239 - High (7.5)

In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a role that has access to the `_internal` index could view session cookies and r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-48207
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-21T19:16:53.700000

4 posts

Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deserializes attacker-controlled data using PyFory Python-native mode with strict mode disabled and relies on DeserializationPolicy to restrict unsafe classes,

offseq at 2026-05-21T21:00:11.330Z ##

🚨 CRITICAL: CVE-2026-48207 in Apache Fory <1.0.0 — Deserialization flaw in PyFory ReduceSerializer bypasses DeserializationPolicy, risking RCE if strict mode is off. Upgrade to 1.0.0+ ASAP! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-21T20:00:29.000Z ##

🔴 CVE-2026-48207 - Critical (9.8)

Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deseri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-21T21:00:11.000Z ##

🚨 CRITICAL: CVE-2026-48207 in Apache Fory <1.0.0 — Deserialization flaw in PyFory ReduceSerializer bypasses DeserializationPolicy, risking RCE if strict mode is off. Upgrade to 1.0.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202648207 #Vulnerability #ApacheFory

##

thehackerwire@mastodon.social at 2026-05-21T20:00:29.000Z ##

🔴 CVE-2026-48207 - Critical (9.8)

Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deseri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39531
(9.3 CRITICAL)

EPSS: 0.00%

updated 2026-05-21T19:10:36.607000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wp Directory Kit WP Directory Kit allows Blind SQL Injection. This issue affects WP Directory Kit: from n/a through 1.5.0.

thehackerwire@mastodon.social at 2026-05-21T17:00:10.000Z ##

🔴 CVE-2026-39531 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wp Directory Kit WP Directory Kit allows Blind SQL Injection.

This issue affects WP Directory Kit: from n/a through 1.5.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9089
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T19:10:21.527000

1 posts

The ConnectWise Automate™ Agent does not fully verify the authenticity of components obtained during plugin loading and self-update operations. This issue is addressed in Automate 2026.5.

thehackerwire@mastodon.social at 2026-05-21T17:00:20.000Z ##

🟠 CVE-2026-9089 - High (8.8)

The ConnectWise Automate™ Agent does not fully verify the authenticity of components obtained during plugin loading and self-update operations. This issue is addressed in Automate 2026.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-48235
(8.2 HIGH)

EPSS: 0.00%

updated 2026-05-21T19:10:12.323000

1 posts

Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/remotes.inc.php where latitude, longitude, callsign, mph, altitude, and timestamp values parsed from external GPS tracking service XML/JSON responses (InstaMapper and Google Latitude integration) are concatenated into UPDATE and INSERT statements without sanitization. An attacker able to compromise or impersonate the re

thehackerwire@mastodon.social at 2026-05-21T19:00:04.000Z ##

🟠 CVE-2026-48235 - High (8.2)

Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/remotes.inc.php where latitude, longitude, callsign, mph, altitude, and timestamp values parsed from external GPS tracking service XML/JSON responses (InstaMapper and G...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-48242
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-21T19:10:12.323000

1 posts

Open ISES Tickets before 3.44.2 contains hardcoded MySQL database connection credentials (host, username, password, database name) in import_mdb.php. The credentials are embedded in source code committed to the public repository, allowing any reader of the source to obtain valid configuration values that may match deployed installations.

offseq@infosec.exchange at 2026-05-21T18:00:10.000Z ##

🚨 CRITICAL: CVE-2026-48242 in Open ISES Tickets <3.44.2 — Hardcoded MySQL creds in public code could enable unauthorized DB access. No patch yet. Rotate creds & review deployments immediately. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #InfoSec #CVE202648242

##

CVE-2026-45251
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-21T19:01:22.710000

2 posts

A file descriptor can be closed while a thread is blocked in a poll(2) or select(2) call waiting for that descriptor. Because the blocked thread does not hold a reference to the underlying object, this closure may result in the object being freed while the thread remains blocked. In this situation, the kernel must remove the blocked thread from the per-object wait queue prior to freeing the obje

thehackerwire@mastodon.social at 2026-05-22T04:01:16.000Z ##

🟠 CVE-2026-45251 - High (7.8)

A file descriptor can be closed while a thread is blocked in a poll(2) or select(2) call waiting for that descriptor. Because the blocked thread does not hold a reference to the underlying object, this closure may result in the object being freed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T04:01:16.000Z ##

🟠 CVE-2026-45251 - High (7.8)

A file descriptor can be closed while a thread is blocked in a poll(2) or select(2) call waiting for that descriptor. Because the blocked thread does not hold a reference to the underlying object, this closure may result in the object being freed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45253
(8.4 HIGH)

EPSS: 0.02%

updated 2026-05-21T19:01:01.833000

2 posts

ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target process has no special privileges. The missing validation allows an unprivileged local user to escalate privileges, potentially gaining full control of the

thehackerwire@mastodon.social at 2026-05-22T04:01:26.000Z ##

🟠 CVE-2026-45253 - High (8.4)

ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target proc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T04:01:26.000Z ##

🟠 CVE-2026-45253 - High (8.4)

ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target proc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8631
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-05-21T18:58:41.297000

1 posts

A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via an integer overflow in the hpcups processing path when handling crafted print data.

offseq@infosec.exchange at 2026-05-21T00:00:34.000Z ##

🚨 CVE-2026-8631: Critical heap buffer overflow in HP Linux Imaging & Printing Software (CVSS 9.3). Remote, unauthenticated code execution possible. No patch yet — restrict print service access & monitor jobs. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #HP

##

CVE-2026-48241
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-21T18:33:15

2 posts

Open ISES Tickets before 3.44.2 contains hardcoded MySQL database credentials in loader.php (a public-facing database utility) that are committed to the source repository. Any actor with access to the public source tree (or an unauthenticated attacker with read access to the file on a deployed installation) can read the username, password, and database name and use them to connect to the database

offseq@infosec.exchange at 2026-05-21T19:30:18.000Z ##

🚨 CRITICAL: Open ISES Tickets <3.44.2 has hardcoded MySQL creds in loader.php (CVE-2026-48241), exposing DBs to attack if reachable. Restrict file & DB access, rotate creds now. No official fix yet. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #MySQL #AppSec

##

thehackerwire@mastodon.social at 2026-05-21T18:59:49.000Z ##

🟠 CVE-2026-48241 - High (8.1)

Open ISES Tickets before 3.44.2 contains hardcoded MySQL database credentials in loader.php (a public-facing database utility) that are committed to the source repository. Any actor with access to the public source tree (or an unauthenticated atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43494(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-05-21T18:33:09

2 posts

In the Linux kernel, the following vulnerability has been resolved: net/rds: reset op_nents when zerocopy page pin fails When iov_iter_get_pages2() fails in rds_message_zcopy_from_user(), the pinned pages are released with put_page(), and rm->data.op_mmp_znotifier is cleared. But we fail to properly clear rm->data.op_nents. Later when rds_message_purge() is called from rds_sendmsg() the cleanu

linux@activitypub.awakari.com at 2026-05-20T14:27:32.000Z ## Daniel Baumann: Debian: Linux Vulnerability Mitigation (PinTheft) Following the series of various Linux exploits of the last three weeks, the bug of today is PinTheft [ CVE-2026-43494 ] which is lo...


Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-20T14:27:32.000Z ## Daniel Baumann: Debian: Linux Vulnerability Mitigation (PinTheft) Following the series of various Linux exploits of the last three weeks, the bug of today is PinTheft [ CVE-2026-43494 ] which is lo...


Origin | Interest | Match ##

CVE-2026-47783
(8.1 HIGH)

EPSS: 0.05%

updated 2026-05-21T17:06:40.670000

1 posts

In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.

thehackerwire@mastodon.social at 2026-05-20T20:00:17.000Z ##

🟠 CVE-2026-47783 - High (8.1)

In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47784
(8.1 HIGH)

EPSS: 0.05%

updated 2026-05-21T17:06:33.240000

1 posts

In memcached before 1.6.42, password data for SASL password database authentication has a timing side channel because memcmp is used by sasl_server_userdb_checkpass.

thehackerwire@mastodon.social at 2026-05-20T20:00:28.000Z ##

🟠 CVE-2026-47784 - High (8.1)

In memcached before 1.6.42, password data for SASL password database authentication has a timing side channel because memcmp is used by sasl_server_userdb_checkpass.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9111
(8.8 HIGH)

EPSS: 0.02%

updated 2026-05-21T16:56:46.883000

1 posts

Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-21T03:00:21.000Z ##

🟠 CVE-2026-9111 - High (8.8)

Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9114
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:56:26.853000

1 posts

Use after free in QUIC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-21T03:00:11.000Z ##

🟠 CVE-2026-9114 - High (8.8)

Use after free in QUIC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9118
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:45:19.020000

1 posts

Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-20T22:01:33.000Z ##

🟠 CVE-2026-9118 - High (8.8)

Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9119
(8.8 HIGH)

EPSS: 0.02%

updated 2026-05-21T16:44:34.153000

1 posts

Heap buffer overflow in WebRTC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-21T02:00:39.000Z ##

🟠 CVE-2026-9119 - High (8.8)

Heap buffer overflow in WebRTC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9123
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-21T16:31:56.420000

1 posts

Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS prior to 148.0.7778.179 allowed a local attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-20T22:00:01.000Z ##

🟠 CVE-2026-9123 - High (7.5)

Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS prior to 148.0.7778.179 allowed a local attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9126
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:23:01.260000

1 posts

Use after free in DOM in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-20T22:00:11.000Z ##

🟠 CVE-2026-9126 - High (8.8)

Use after free in DOM in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47372
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-05-21T16:04:53.813000

2 posts

Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts. These versions use the built-in rand function, which is predictable and unsuitable for cryptography.

thehackerwire@mastodon.social at 2026-05-22T09:00:15.000Z ##

🔴 CVE-2026-47372 - Critical (9.1)

Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts.

These versions use the built-in rand function, which is predictable and unsuitable for cryptography.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T09:00:15.000Z ##

🔴 CVE-2026-47372 - Critical (9.1)

Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts.

These versions use the built-in rand function, which is predictable and unsuitable for cryptography.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23734
(0 None)

EPSS: 0.04%

updated 2026-05-21T16:04:53.813000

1 posts

XWiki Platform is a generic wiki platform. Versions prior to 18.1.0-rc-1, 17.10.3, 17.4.9, and 16.10.17 allow access to read configuration files by using URLs such as http://localhost:8080/bin/ssx/Main/WebHome?resource=/../../WEB-INF/xwiki.cfg&minify=false, leading to Path Traversal. The vulnerability is can be exploited via resources parameter the ssx and jsx endpoints by using leading slashes. T

offseq@infosec.exchange at 2026-05-21T10:30:28.000Z ##

⚠️ CRITICAL: CVE-2026-23734 in XWiki Platform (xwiki-commons) allows unauthenticated path traversal — attackers can read config files via crafted 'resource' parameters. Patch to 18.1.0-rc-1, 17.10.3, 17.4.9, or 16.10.17+ now! radar.offseq.com/threat/cve-20 #OffSeq #xwiki #vuln

##

CVE-2026-33137
(0 None)

EPSS: 0.04%

updated 2026-05-21T16:04:53.813000

1 posts

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform is a generic wiki platform. In versions prior to 18.1.0-rc-1, 17.10.3, 17.4.9, and 16.10.17, the POST /wikis/{wikiName} API executes a XAR import without performing any authentication or authorization checks, allowing an unauthenticated attacker to create or update documents in t

offseq@infosec.exchange at 2026-05-21T09:00:29.000Z ##

🚨 CRITICAL: CVE-2026-33137 impacts XWiki Platform (<16.10.17, <17.4.9, <17.10.3, <18.1.0-rc-1). Unauthenticated users can create/modify documents via missing auth on POST /wikis/{wikiName}. Patch now! radar.offseq.com/threat/cve-20 #OffSeq #XWiki #CVE #Infosec

##

CVE-2026-40092
(7.5 HIGH)

EPSS: 0.06%

updated 2026-05-21T16:04:53.813000

1 posts

nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation. In versions 1.3.0 and below, a malicious network peer can crash any Nimiq full node by publishing a crafted Kademlia DHT record. The maliciously crafted record would contain a TaggedSigned<ValidatorRecord, KeyPair> with a signature field whose byte length is not exactly 64 in order to cause a crash. When the victim

thehackerwire@mastodon.social at 2026-05-20T22:59:49.000Z ##

🟠 CVE-2026-40092 - High (7.5)

nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation. In versions 1.3.0 and below, a malicious network peer can crash any Nimiq full node by publishing a crafted Kademlia DHT record. The maliciously crafted record wou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0393
(0 None)

EPSS: 0.05%

updated 2026-05-21T16:04:33.830000

1 posts

The affected product may expose credentials remotely between low privileged visualization users during concurrent login operations due to insufficient isolation of authentication data. The vulnerability affects only login operations within an active visualization session.

certvde@infosec.exchange at 2026-05-21T08:04:33.000Z ##

#OT #Advisory VDE-2026-052
CODESYS Visualization - Insufficiently Protected Credentials

A vulnerability in the CODESYS Visualization login dialog has been identified. During logins within the CODESYS Visualization, authentication data may not be sufficiently isolated when multiple users perform login operations concurrently.
#CVE CVE-2026-0393

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-45255
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-21T15:35:16

2 posts

When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, they build up a list of network names and use bsddialog(1) to prompt the user to select a network. This is implemented using a shell script, and the code which handled network names was not careful to prevent expansion by the shell. As a result, a suitably crafted network name can be used to execute commands via a subsh

thehackerwire@mastodon.social at 2026-05-22T04:01:35.000Z ##

🟠 CVE-2026-45255 - High (7.5)

When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, they build up a list of network names and use bsddialog(1) to prompt the user to select a network. This is implemented using a shell script, and the code which handled n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T04:01:35.000Z ##

🟠 CVE-2026-45255 - High (7.5)

When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, they build up a list of network names and use bsddialog(1) to prompt the user to select a network. This is implemented using a shell script, and the code which handled n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71217
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:34:18

2 posts

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent self-protection mechanism could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The following information is provided as informational only for C

thehackerwire@mastodon.social at 2026-05-22T00:00:20.000Z ##

🟠 CVE-2025-71217 - High (7.8)

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent self-protection mechanism could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T00:00:20.000Z ##

🟠 CVE-2025-71217 - High (7.8)

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent self-protection mechanism could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71214
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:34:18

2 posts

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent iCore service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The following information is provided as informational only for CVE reference

thehackerwire@mastodon.social at 2026-05-21T23:00:24.000Z ##

🟠 CVE-2025-71214 - High (7.8)

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent iCore service could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T23:00:24.000Z ##

🟠 CVE-2025-71214 - High (7.8)

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent iCore service could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34927
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:34:18

8 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T23:00:15.000Z ##

🟠 CVE-2026-34930 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.

Please note: an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:57.000Z ##

🟠 CVE-2026-34929 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.

Please ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:47.000Z ##

🟠 CVE-2026-34928 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.

Please not...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:37.000Z ##

🟠 CVE-2026-34927 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T23:00:15.000Z ##

🟠 CVE-2026-34930 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.

Please note: an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:57.000Z ##

🟠 CVE-2026-34929 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.

Please ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:47.000Z ##

🟠 CVE-2026-34928 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.

Please not...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:37.000Z ##

🟠 CVE-2026-34927 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45207
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:34:18

3 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T20:00:48.000Z ##

🟠 CVE-2026-45206 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T20:00:48.000Z ##

🟠 CVE-2026-45206 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T17:00:30.000Z ##

🟠 CVE-2026-45207 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45206
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:34:18

3 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T20:00:48.000Z ##

🟠 CVE-2026-45206 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T20:00:48.000Z ##

🟠 CVE-2026-45206 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T17:00:30.000Z ##

🟠 CVE-2026-45207 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71211
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-21T15:34:17

2 posts

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different executable. Please note: although this vulnerability carries a technical critical CVSS rating, this was reported via responsible disclosure via a resea

thehackerwire@mastodon.social at 2026-05-22T01:00:29.000Z ##

🔴 CVE-2025-71211 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T01:00:29.000Z ##

🔴 CVE-2025-71211 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13479
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:34:17

2 posts

Authorization bypass through User-Controlled key vulnerability in PosCube Hardware Software and Consulting Ltd. QR Menu allows Exploitation of Trusted Identifiers. This issue affects QR Menu: through 21052026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-05-22T01:00:07.000Z ##

🟠 CVE-2025-13479 - High (7.5)

Authorization bypass through User-Controlled key vulnerability in PosCube Hardware Software and Consulting Ltd. QR Menu allows Exploitation of Trusted Identifiers.

This issue affects QR Menu: through 21052026. NOTE: The vendor was contacted earl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T01:00:07.000Z ##

🟠 CVE-2025-13479 - High (7.5)

Authorization bypass through User-Controlled key vulnerability in PosCube Hardware Software and Consulting Ltd. QR Menu allows Exploitation of Trusted Identifiers.

This issue affects QR Menu: through 21052026. NOTE: The vendor was contacted earl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42001
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:27:51.530000

1 posts

Insufficient Validation of Autoprimary SOA Queries

CVE-2026-2740
(8.4 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:26:35.653000

2 posts

Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.

thehackerwire@mastodon.social at 2026-05-22T00:00:30.000Z ##

🟠 CVE-2026-2740 - High (8.4)

Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T00:00:30.000Z ##

🟠 CVE-2026-2740 - High (8.4)

Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24188
(8.2 HIGH)

EPSS: 0.04%

updated 2026-05-21T15:26:35.653000

1 posts

NVIDIA TensorRT contains a vulnerability where an attacker could cause an out-of-bounds write. A successful exploit of this vulnerability might lead to data tampering.

thehackerwire@mastodon.social at 2026-05-21T04:00:12.000Z ##

🟠 CVE-2026-24188 - High (8.2)

NVIDIA TensorRT contains a vulnerability where an attacker could cause an out-of-bounds write. A successful exploit of this vulnerability might lead to data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9157
(8.4 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:24:25.330000

2 posts

Improper input validation, Unrestricted upload of file with dangerous type vulnerability in Gmission Web Fax allows Remote Code Inclusion. This issue affects Web Fax: from 3.0 before 3.1.

thehackerwire@mastodon.social at 2026-05-22T05:00:49.000Z ##

🟠 CVE-2026-9157 - High (8.4)

Improper input validation, Unrestricted upload of file with dangerous type vulnerability in Gmission Web Fax allows Remote Code Inclusion.

This issue affects Web Fax: from 3.0 before 3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T05:00:49.000Z ##

🟠 CVE-2026-9157 - High (8.4)

Improper input validation, Unrestricted upload of file with dangerous type vulnerability in Gmission Web Fax allows Remote Code Inclusion.

This issue affects Web Fax: from 3.0 before 3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9082
(6.5 MEDIUM)

EPSS: 0.01%

updated 2026-05-21T15:24:25.330000

4 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Drupal Drupal core allows SQL Injection. This issue affects Drupal core: from 8.9.0 before 10.4.10, from 10.5.0 before 10.5.10, from 10.6.0 before 10.6.9, from 11.0.0 before 11.1.10, from 11.2.0 before 11.2.12, from 11.3.0 before 11.3.10.

5 repos

https://github.com/ywh-jfellus/CVE-2026-9082

https://github.com/7h30th3r0n3/CVE-2026-9082-Drupal-PoC

https://github.com/lysophavin18/cve-2026-9082

https://github.com/HORKimhab/CVE-2026-9082

https://github.com/0xBlackash/CVE-2026-9082

tomshw@mastodon.social at 2026-05-21T14:10:10.000Z ##

🛡️ Drupal corregge una falla SQL: aggiornare subito è la miglior difesa, perché gli exploit potrebbero arrivare a breve. #Drupal #CyberSecurity

🔗 tomshw.it/hardware/drupal-cve-

##

offseq@infosec.exchange at 2026-05-21T11:30:26.000Z ##

🚨 Drupal sites using PostgreSQL face a highly critical SQL injection vuln (CVE-2026-9082), risking RCE & data exposure. Patch versions 11.3, 11.2, 10.6, 10.5.x ASAP. Update Symfony & Twig too. No active exploitation yet. radar.offseq.com/threat/drupal #OffSeq #Drupal #SQLInjection #Infosec

##

benzogaga33@mamot.fr at 2026-05-21T09:40:02.000Z ##

Drupal – CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web it-connect.fr/drupal-cve-2026- #ActuCybersécurité #Cybersécurité #Vulnérabilité #Web

##

decio@infosec.exchange at 2026-05-21T06:38:35.000Z ##

Si votre CMS est un #Drupal, ou si vous connaissez quelqu’un qui administre un site Drupal : c’est le moment de vérifier la version.

La faille CVE-2026-9082 touche Drupal Core avec base PostgreSQL : injection SQL critique, exploitable sans compte, pouvant mener à fuite de données, élévation de privilèges voire RCE selon le contexte.

À corriger en priorité :
Drupal 10.5 → 10.5.10
Drupal 10.6 → 10.6.9
Drupal 11.2 → 11.2.12
Drupal 11.3 → 11.3.10

MySQL/MariaDB ne semblent pas concernés par cette SQLi, mais les mises à jour incluent aussi Symfony/Twig : patch recommandé pour tout le monde.
👇
drupal.org/sa-core-2026-004

"Drupal – CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web"
👇
it-connect.fr/drupal-cve-2026-

🔍 (à noter la diff entre estimation LLM VLAI et attribution CVSS officielle en Medium)
👇
vulnerability.circl.lu/vuln/CV

💬
⬇️
infosec.pub/

#CyberVeille #CVE_2026_9082

##

CVE-2026-39405
(0 None)

EPSS: 0.05%

updated 2026-05-21T15:24:25.330000

1 posts

Frappe Learning Management System (LMS) is a learning system that helps users structure their content. In versions 2.50.0 and below, a user with course editing role could upload a SCORM ZIP package to write files outside the intended directory. This issue has been resolved in version 2.50.1.

offseq@infosec.exchange at 2026-05-21T04:30:25.000Z ##

⚠️ CRITICAL: Frappe LMS <2.50.1 is vulnerable (CVE-2026-39405, CVSS 9.4). Path traversal lets course editors write files outside restricted dirs via SCORM ZIP upload. Upgrade to 2.50.1 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #infosec #vuln #FrappeLMS

##

CVE-2026-39310
(8.6 HIGH)

EPSS: 0.06%

updated 2026-05-21T15:24:25.330000

1 posts

Trilium Notes is a cross-platform, hierarchical note taking application focused on building large personal knowledge bases. In versions 0.102.1 and prior, the Clipper API in Trilium Desktop (v0.101.3) allows full authentication bypass when running in an Electron environment. When Trilium detects an Electron environment, it explicitly disables authentication middleware for the Clipper API, exposing

thehackerwire@mastodon.social at 2026-05-21T04:00:01.000Z ##

🟠 CVE-2026-39310 - High (8.6)

Trilium Notes is a cross-platform, hierarchical note taking application focused on building large personal knowledge bases. In versions 0.102.1 and prior, the Clipper API in Trilium Desktop (v0.101.3) allows full authentication bypass when running...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40165
(8.7 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:24:25.330000

1 posts

authentik is an open-source identity provider. Versions 2025.12.4 and prior, and versions 2026.2.0-rc1 through 2026.2.2 were vulnerable to Authentication Bypass through SAML NameID XML Comment Injection. Due to how authentik extracted the NameID value from a SAML assertion, it was possible for an attacker to trick authentik into only seeing a part of the NameID value, potentially allowing an attac

thehackerwire@mastodon.social at 2026-05-21T02:00:11.000Z ##

🟠 CVE-2026-40165 - High (8.7)

authentik is an open-source identity provider. Versions 2025.12.4 and prior, and versions 2026.2.0-rc1 through 2026.2.2 were vulnerable to Authentication Bypass through SAML NameID XML Comment Injection. Due to how authentik extracted the NameID v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9133
(7.7 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:24:25.330000

1 posts

Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws

thehackerwire@mastodon.social at 2026-05-20T22:00:22.000Z ##

🟠 CVE-2026-9133 - High (7.7)

Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform ar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44052
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-21T15:20:19.040000

2 posts

Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output in cleartext, which allows an attacker with access to the log files to obtain LDAP credentials.

thehackerwire@mastodon.social at 2026-05-22T09:00:05.000Z ##

🟠 CVE-2026-44052 - High (7.5)

Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output in cleartext, which allows an attacker with access to the log files to obtain LDAP credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T09:00:05.000Z ##

🟠 CVE-2026-44052 - High (7.5)

Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output in cleartext, which allows an attacker with access to the log files to obtain LDAP credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44051
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-21T15:20:19.040000

2 posts

An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink creation.

thehackerwire@mastodon.social at 2026-05-22T08:59:55.000Z ##

🟠 CVE-2026-44051 - High (8.1)

An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink creation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T08:59:55.000Z ##

🟠 CVE-2026-44051 - High (8.1)

An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink creation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44050
(9.9 CRITICAL)

EPSS: 0.14%

updated 2026-05-21T15:20:19.040000

2 posts

A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk 2.0.0 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code with escalated privileges or cause a denial of service.

thehackerwire@mastodon.social at 2026-05-22T08:00:12.000Z ##

🔴 CVE-2026-44050 - Critical (9.9)

A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk 2.0.0 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code with escalated privileges or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T08:00:12.000Z ##

🔴 CVE-2026-44050 - Critical (9.9)

A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk 2.0.0 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code with escalated privileges or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44049
(7.5 HIGH)

EPSS: 0.19%

updated 2026-05-21T15:20:19.040000

2 posts

An out-of-bounds write due to improper null termination in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character data.

thehackerwire@mastodon.social at 2026-05-22T08:00:03.000Z ##

🟠 CVE-2026-44049 - High (7.5)

An out-of-bounds write due to improper null termination in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T08:00:03.000Z ##

🟠 CVE-2026-44049 - High (7.5)

An out-of-bounds write due to improper null termination in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44048
(8.8 HIGH)

EPSS: 0.14%

updated 2026-05-21T15:20:19.040000

2 posts

A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service.

thehackerwire@mastodon.social at 2026-05-22T07:59:53.000Z ##

🟠 CVE-2026-44048 - High (8.8)

A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T07:59:53.000Z ##

🟠 CVE-2026-44048 - High (8.8)

A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44055
(7.5 HIGH)

EPSS: 0.23%

updated 2026-05-21T15:20:19.040000

2 posts

A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 allows a remote authenticated attacker to inject OS commands and execute arbitrary code.

thehackerwire@mastodon.social at 2026-05-22T06:01:25.000Z ##

🟠 CVE-2026-44055 - High (7.5)

A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 allows a remote authenticated attacker to inject OS commands and execute arbitrary code.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T06:01:25.000Z ##

🟠 CVE-2026-44055 - High (7.5)

A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 allows a remote authenticated attacker to inject OS commands and execute arbitrary code.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5118
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-21T15:19:30.540000

4 posts

The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without validating it against the form's configured default_user_role setting. This makes it possible for unauthenticated attackers to create administrator accounts by

4 repos

https://github.com/Yucaerin/CVE-2026-5118

https://github.com/Jenderal92/CVE-2026-5118

https://github.com/puj790201-lab/CVE-2026-5118

https://github.com/zycoder0day/CVE-2026-5118

thehackerwire@mastodon.social at 2026-05-22T02:00:24.000Z ##

🔴 CVE-2026-5118 - Critical (9.8)

The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without valida...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T02:00:24.000Z ##

🔴 CVE-2026-5118 - Critical (9.8)

The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without valida...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-21T16:30:10.000Z ##

🔥 CRITICAL vuln in Divi Form Builder (≤5.1.2) — improper privilege management lets attackers create admin accounts via role parameter abuse. Restrict registration & watch for patches! CVE-2026-5118 radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20265118 #Infosec

##

offseq@infosec.exchange at 2026-05-21T14:30:11.000Z ##

🚨 CRITICAL: CVE-2026-5118 in Divi Form Builder (≤5.1.2) lets unauth'd users gain admin privileges via unvalidated 'role' parameter. Disable registration & monitor for patches! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #PrivilegeEscalation #Vuln

##

CVE-2026-6279
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-05-21T15:19:30.540000

2 posts

The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthenticated Remote Code Execution via PHP Function Injection in versions up to and including 3.15.2. This is due to the `wp_conditional_tags` case in `Fusion_Builder_Conditional_Render_Helper::get_value()` passing attacker-controlled values from a base64-decoded JSON blob directly to `call_user_func()` without any allowli

offseq@infosec.exchange at 2026-05-21T06:00:24.000Z ##

🚨 CRITICAL: Avada (Fusion) Builder ≤3.15.2 has unauth RCE bug (CVE-2026-6279). Attackers can run PHP via exposed AJAX endpoint. Disable plugin or restrict access ASAP. Patch status: unconfirmed. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20266279 #infosec

##

thehackerwire@mastodon.social at 2026-05-21T05:59:52.000Z ##

🔴 CVE-2026-6279 - Critical (9.8)

The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthenticated Remote Code Execution via PHP Function Injection in versions up to and including 3.15.2. This is due to the `wp_conditional_tags` case in `Fusion_Builder_Cond...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45444
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-05-21T15:19:30.540000

1 posts

Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift Cards For WooCommerce Pro allows Using Malicious Files. This issue affects Gift Cards For WooCommerce Pro: from n/a through 4.2.6.

thehackerwire@mastodon.social at 2026-05-21T03:00:31.000Z ##

🔴 CVE-2026-45444 - Critical (10)

Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift Cards For WooCommerce Pro allows Using Malicious Files.

This issue affects Gift Cards For WooCommerce Pro: from n/a through 4.2.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9139
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-05-21T15:17:59.850000

2 posts

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded credential vulnerability in the embedded web configuration interface where authentication is implemented entirely in client-side JavaScript in login.zhtml, exposing static plaintext credentials in the page source. Unauthenticated attackers with network access can recover administrative credentials directly from the client-s

offseq@infosec.exchange at 2026-05-21T03:00:26.000Z ##

🔐 CVE-2026-9139: Taiko AG1000-01A SMS Alert Gateway (Revs 7.3, 8, UM-AG1000_R7.2) has a CRITICAL flaw (CVSS 9.8) — hard-coded admin creds in client JS. No patch yet. Restrict access, isolate device, monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CVE20269139

##

thehackerwire@mastodon.social at 2026-05-20T21:00:08.000Z ##

🔴 CVE-2026-9139 - Critical (9.8)

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded credential vulnerability in the embedded web configuration interface where authentication is implemented entirely in client-side JavaScript in login.zhtml, exposing static ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9141
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-05-21T15:17:59.850000

2 posts

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability in the embedded web configuration interface that allows unauthenticated attackers to access internal application pages without any session management or server-side authentication checks. Attackers with network access can directly request internal resources such as index.zhtml, point.zhtml, and log

offseq@infosec.exchange at 2026-05-21T01:30:27.000Z ##

🚨 CVE-2026-9141 (CRITICAL, CVSS 9.8): Taiko AG1000-01A SMS Alert Gateway web config lets unauthenticated attackers get full admin rights. No patch available — restrict access & monitor now. radar.offseq.com/threat/cve-20 #OffSeq #CVE #IoTSecurity #Vuln

##

thehackerwire@mastodon.social at 2026-05-20T21:00:18.000Z ##

🔴 CVE-2026-9141 - Critical (9.8)

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability in the embedded web configuration interface that allows unauthenticated attackers to access internal application pages without any session managem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9144
(7.6 HIGH)

EPSS: 0.04%

updated 2026-05-21T15:17:59.850000

1 posts

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-site scripting vulnerability in the embedded web configuration interface that allows authenticated attackers to execute persistent JavaScript by fragmenting malicious payloads across multiple administrative form fields. Attackers can bypass front-end length restrictions using JavaScript comments and template literals to c

thehackerwire@mastodon.social at 2026-05-20T21:00:27.000Z ##

🟠 CVE-2026-9144 - High (7.6)

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-site scripting vulnerability in the embedded web configuration interface that allows authenticated attackers to execute persistent JavaScript by fragmenting malicious pay...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71216
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:16:22.037000

2 posts

A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agent cache mechanism could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The following information is provided as informational only for CVE re

thehackerwire@mastodon.social at 2026-05-22T00:00:09.000Z ##

🟠 CVE-2025-71216 - High (7.8)

A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agent cache mechanism could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T00:00:09.000Z ##

🟠 CVE-2025-71216 - High (7.8)

A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agent cache mechanism could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71213
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:05:28.023000

2 posts

An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-22T02:00:14.000Z ##

🟠 CVE-2025-71213 - High (7.8)

An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T02:00:14.000Z ##

🟠 CVE-2025-71213 - High (7.8)

An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71212
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:05:28.023000

2 posts

A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-22T02:00:04.000Z ##

🟠 CVE-2025-71212 - High (7.8)

A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T02:00:04.000Z ##

🟠 CVE-2025-71212 - High (7.8)

A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71210
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-21T15:05:28.023000

4 posts

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. Please note: although this vulnerability carries a technical critical CVSS rating, this was reported via responsible disclosure via a researcher through the Zero Day Initiative. The SaaS versions of the product have already been mi

thehackerwire@mastodon.social at 2026-05-22T01:00:29.000Z ##

🔴 CVE-2025-71211 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T01:00:18.000Z ##

🔴 CVE-2025-71210 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations.

Please note: although this vulnerability carries a technical critical CVSS rat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T01:00:29.000Z ##

🔴 CVE-2025-71211 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T01:00:18.000Z ##

🔴 CVE-2025-71210 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations.

Please note: although this vulnerability carries a technical critical CVSS rat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34930
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:05:28.023000

2 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T23:00:15.000Z ##

🟠 CVE-2026-34930 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.

Please note: an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T23:00:15.000Z ##

🟠 CVE-2026-34930 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.

Please note: an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34929
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:05:28.023000

2 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T22:01:57.000Z ##

🟠 CVE-2026-34929 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.

Please ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:57.000Z ##

🟠 CVE-2026-34929 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.

Please ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34928
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:05:28.023000

2 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T22:01:47.000Z ##

🟠 CVE-2026-34928 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.

Please not...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:47.000Z ##

🟠 CVE-2026-34928 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.

Please not...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45208
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T15:05:28.023000

2 posts

A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T20:00:39.000Z ##

🟠 CVE-2026-45208 - High (7.8)

A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T20:00:39.000Z ##

🟠 CVE-2026-45208 - High (7.8)

A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46333
(7.1 HIGH)

EPSS: 0.01%

updated 2026-05-21T14:16:48.910000

9 posts

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointe

4 repos

https://github.com/KaraZajac/CHARON

https://github.com/Aurillium/public-passwd

https://github.com/0xBlackash/CVE-2026-46333

https://github.com/studiogangster/CVE-2026-46333

guardingpearsoftware@mastodon.social at 2026-05-22T07:58:49.000Z ##

blog.qualys.com/vulnerabilitie

##

guardingpearsoftware@mastodon.social at 2026-05-22T07:58:49.000Z ##

A newly disclosed Linux kernel vulnerability, tracked as CVE-2026-46333, went unnoticed for nearly nine years.

Researchers from Qualys Threat Research Unit say the vulnerability could allow attackers to steal sensitive information, including SSH private keys, and run arbitrary commands with root-level privileges on affected systems.

##

linux@activitypub.awakari.com at 2026-05-20T15:40:19.000Z ## CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path The Qualys Threat Research Unit (TRU) has discovered and published the full advisory for CV...

#Vulnerabilities #and #Threat #Research #security #vulnerabilities

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-20T15:40:19.000Z ## CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path The Qualys Threat Research Unit (TRU) has discovered and published the full advisory for CV...

#Vulnerabilities #and #Threat #Research #security #vulnerabilities

Origin | Interest | Match ##

raptor@infosec.exchange at 2026-05-21T17:44:07.000Z ##

#Qualys #Security #Advisory

Logic bug in the #Linux kernel's __ptrace_may_access() function
(CVE-2026-46333)

cdn2.qualys.com/advisory/2026/

##

linux@activitypub.awakari.com at 2026-05-21T09:57:16.000Z ## Nine-year-old Linux Kernel Vulnerability Let Attackers Exfiltrate SSH Private Keys A newly disclosed Linux kernel vulnerability, tracked as CVE-2026-46333, exposes a serious local privilege escalat...

#Cyber #Security #News #Linux #Vulnerability #News #cyber #security #cyber #security #news

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-20T15:40:19.000Z ## CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path The Qualys Threat Research Unit (TRU) has discovered and published the full advisory for CV...

#Vulnerabilities #and #Threat #Research #security #vulnerabilities

Origin | Interest | Match ##

lobsters@mastodon.social at 2026-05-20T19:25:09.000Z ##

Logic bug in the Linux kernel's __ptrace_may_access() function (CVE-2026-46333) lobste.rs/s/nwdn3w #linux #security
cdn2.qualys.com/advisory/2026/

##

jschauma@mstdn.social at 2026-05-20T18:38:59.000Z ##

Qualys has published their full write-up of CVE-2026-46333: openwall.com/lists/oss-securit

This includes a PoC to full root via `accounts-daemon` demonstrated in Debian 13, Fedora Workstation 43/44, so goes well beyond the initial "you need a program that opens a given file and you get to read it" assumption.

##

CVE-2008-4250
(9.8 CRITICAL)

EPSS: 93.62%

updated 2026-05-21T12:57:17.353000

2 posts

The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."

4 repos

https://github.com/thunderstrike9090/Conflicker_analysis_scripts

https://github.com/NoTrustedx/Exploit_MS08-067

https://github.com/BinRacer/ms08-067.py

https://github.com/BinRacer/ms08-067

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

cisakevtracker@mastodon.social at 2026-05-20T17:00:59.000Z ##

CVE ID: CVE-2008-4250
Vendor: Microsoft
Product: Windows
Date Added: 2026-05-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2009-1537
(8.8 HIGH)

EPSS: 74.07%

updated 2026-05-21T12:57:12.850000

2 posts

Unspecified vulnerability in the QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted QuickTime media file, as exploited in the wild in May 2009, aka "DirectX NULL Byte Overwrite Vulnerability."

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

cisakevtracker@mastodon.social at 2026-05-20T17:01:14.000Z ##

CVE ID: CVE-2009-1537
Vendor: Microsoft
Product: DirectX
Date Added: 2026-05-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2010-0806
(8.8 HIGH)

EPSS: 88.22%

updated 2026-05-21T12:57:10.303000

2 posts

Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability."

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

cisakevtracker@mastodon.social at 2026-05-20T17:01:46.000Z ##

CVE ID: CVE-2010-0806
Vendor: Microsoft
Product: Internet Explorer
Date Added: 2026-05-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2010-0249
(8.8 HIGH)

EPSS: 88.64%

updated 2026-05-21T12:57:01.463000

3 posts

Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper ha

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

cisakevtracker@mastodon.social at 2026-05-20T18:00:46.000Z ##

CVE ID: CVE-2010-0249
Vendor: Microsoft
Product: Internet Explorer
Date Added: 2026-05-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-05-20T17:00:44.000Z ##

CVE ID: CVE-2010-0249
Vendor: Microsoft
Product: Internet Explorer
Date Added: 2026-06-03
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2009-3459
(8.8 HIGH)

EPSS: 90.52%

updated 2026-05-21T12:56:49.133000

2 posts

Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

cisakevtracker@mastodon.social at 2026-05-20T17:01:30.000Z ##

CVE ID: CVE-2009-3459
Vendor: Adobe
Product: Acrobat and Reader
Date Added: 2026-05-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-5433
(9.1 CRITICAL)

EPSS: 0.26%

updated 2026-05-21T09:32:17

2 posts

Honeywell Control Network Module (CNM) contains command injection vulnerability in the web interface. An attacker could exploit this vulnerability via command delimiters, potentially resulting in Remote Code Execution (RCE).

thehackerwire@mastodon.social at 2026-05-22T05:00:38.000Z ##

🔴 CVE-2026-5433 - Critical (9.1)

Honeywell Control
Network Module (CNM) contains command injection vulnerability
in the web interface. An attacker could exploit this vulnerability via command
delimiters, potentially resulting in Remote Code Execution (RCE).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T05:00:38.000Z ##

🔴 CVE-2026-5433 - Critical (9.1)

Honeywell Control
Network Module (CNM) contains command injection vulnerability
in the web interface. An attacker could exploit this vulnerability via command
delimiters, potentially resulting in Remote Code Execution (RCE).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44062
(7.5 HIGH)

EPSS: 0.19%

updated 2026-05-21T09:32:16

2 posts

A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character set data.

thehackerwire@mastodon.social at 2026-05-22T07:00:03.000Z ##

🟠 CVE-2026-44062 - High (7.5)

A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character set data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T07:00:03.000Z ##

🟠 CVE-2026-44062 - High (7.5)

A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character set data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44068
(7.6 HIGH)

EPSS: 0.11%

updated 2026-05-21T09:32:16

2 posts

Incomplete sanitization of extended attribute (EA) path components in Netatalk 2.1.0 through 4.4.2 allows a remote authenticated attacker to write to files outside the intended metadata namespace via crafted EA names.

thehackerwire@mastodon.social at 2026-05-22T06:01:14.000Z ##

🟠 CVE-2026-44068 - High (7.6)

Incomplete sanitization of extended attribute (EA) path components in Netatalk 2.1.0 through 4.4.2 allows a remote authenticated attacker to write to files outside the intended metadata namespace via crafted EA names.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T06:01:14.000Z ##

🟠 CVE-2026-44068 - High (7.6)

Incomplete sanitization of extended attribute (EA) path components in Netatalk 2.1.0 through 4.4.2 allows a remote authenticated attacker to write to files outside the intended metadata namespace via crafted EA names.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44060
(7.5 HIGH)

EPSS: 0.08%

updated 2026-05-21T09:32:10

2 posts

An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a remote unauthenticated attacker to cause a denial of service via a crafted DSI write request.

thehackerwire@mastodon.social at 2026-05-22T06:59:53.000Z ##

🟠 CVE-2026-44060 - High (7.5)

An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a remote unauthenticated attacker to cause a denial of service via a crafted DSI write request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T06:59:53.000Z ##

🟠 CVE-2026-44060 - High (7.5)

An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a remote unauthenticated attacker to cause a denial of service via a crafted DSI write request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44047
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-21T09:32:09

2 posts

An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 through 4.4.2 allows a remote authenticated attacker to obtain unauthorized access to data, modify data, or cause a denial of service.

thehackerwire@mastodon.social at 2026-05-22T07:00:14.000Z ##

🟠 CVE-2026-44047 - High (8.8)

An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 through 4.4.2 allows a remote authenticated attacker to obtain unauthorized access to data, modify data, or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T07:00:14.000Z ##

🟠 CVE-2026-44047 - High (8.8)

An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 through 4.4.2 allows a remote authenticated attacker to obtain unauthorized access to data, modify data, or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42959
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-21T00:31:30

1 posts

NLnet Labs Unbound up to and including version 1.25.0 has a denial of service vulnerability in the DNSSEC validator that can lead to a crash given malicious upstream replies. When Unbound constructs chase-reply messages for validation, the code uses the wrong counter to calculate write offsets for ADDITIONAL section rrsets. DNAME duplication could increase the ANSWER section count and authority fi

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-44390
(5.3 MEDIUM)

EPSS: 0.04%

updated 2026-05-21T00:31:30

1 posts

NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability when handling replies with very large RRsets that Unbound needs to perform name compression for. Malicious upstream responses with very large RRsets with records that don't share a suffix above the root can cause Unbound to spend a considerable time applying name compression to downstream replies. This can lead to degraded p

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-33278
(9.8 CRITICAL)

EPSS: 0.24%

updated 2026-05-21T00:31:30

2 posts

NLnet Labs Unbound 1.19.1 up to and including version 1.25.0 has a vulnerability in the DNSSEC validator that enables denial of service and possible remote code execution as a result of deep copying a data structure and erroneously overwriting a destination pointer. An adversary can exploit the vulnerability by controlling a malicious signed zone and querying a vulnerable Unbound. When DS sub-quer

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

offseq@infosec.exchange at 2026-05-20T10:30:25.000Z ##

🔥 CVE-2026-33278: Critical use-after-free in NLnet Labs Unbound (1.19.1 – 1.25.0). DNSSEC validator flaw can lead to DoS or RCE if attacker controls DNS zone. Patch: upgrade to 1.25.1. radar.offseq.com/threat/cve-20 #OffSeq #DNSSEC #Vuln #Infosec

##

CVE-2026-41292
(7.5 HIGH)

EPSS: 0.06%

updated 2026-05-21T00:30:27

1 posts

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage while they are parsing and creating internal data structures for the options. Coordinated attacks can result in degradation and/or denial of service. Un

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-44608
(5.9 MEDIUM)

EPSS: 0.04%

updated 2026-05-20T22:52:48.303000

1 posts

NLnet Labs Unbound 1.14.0 up to and including version 1.25.0 has a locking inconsistency vulnerability that when certain conditions are met (multi-threaded, RPZ XFR reload, RPZ zone with 'rpz-nsip'/'rpz-nsdname' triggers) it could result in heap use-after-free and eventual crash. An adversary can exploit the vulnerability if conditions are first met on a vulnerable Unbound, i.e., multi-threaded, a

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-42960
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-05-20T22:51:43.680000

1 posts

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning via promiscuous records for the authority section. Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such records. If an adversary is able to attach such records in a reply (i.e., spoofed packet, fragmentation attack) he would be able to poison Unbound's cach

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-42944
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-20T22:50:49.877000

1 posts

NLnet Labs Unbound 1.14.0 up to and including version 1.25.0 has a vulnerability that results in heap overflow when encoding multiple NSID and/or DNS Cookie EDNS and/or EDNS Padding options in the reply packet. The relevant options ('nsid', 'answer-cookie', 'pad-responses' (default)) need to be enabled for the vulnerability to be exploited. An adversary who can query Unbound can exploit the vulner

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-42923
(5.3 MEDIUM)

EPSS: 0.04%

updated 2026-05-20T22:50:35.780000

1 posts

NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability in the DNSSEC validator where the code path to consult the negative cache for DS records does not take into account the limit on NSEC3 hash calculations introduced in 1.19.1. This leads to degradation of service during the attack. An adversary that controls a DNSSEC signed zone can exploit this by signing NSEC3 records with

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-42534
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-05-20T22:50:00.157000

1 posts

NLnet Labs Unbound up to and including version 1.25.0 has a vulnerability in the jostle logic that could defeat its purpose and degrade resolution performance. Retransmits of the same query could renew the age of slow running queries and not allow the jostle logic to see them as aged and potential targets for replacement with new queries. An adversary who can query a vulnerable Unbound and who can

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-32792
(5.3 MEDIUM)

EPSS: 0.04%

updated 2026-05-20T22:44:09.940000

1 posts

NLnet Labs Unbound 1.6.2 up to and including version 1.25.0 has a denial of service vulnerability when compiled with DNSCrypt support ('--enable-dnscrypt'). A bad DNSCrypt query could underflow Unbound's DNSCrypt packet reading procedure that may lead to heap overflow. A malicious actor can exploit the vulnerability with a single bad DNSCrypt query that its decrypted plaintext consists entirely of

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-9120
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-20T21:31:40

1 posts

Use after free in WebRTC in Google Chrome prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-21T02:00:49.000Z ##

🟠 CVE-2026-9120 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9117
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-20T21:31:40

1 posts

Type Confusion in GFX in Google Chrome on Linux, ChromeOS prior to 148.0.7778.179 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-20T22:01:22.000Z ##

🟠 CVE-2026-9117 - High (7.5)

Type Confusion in GFX in Google Chrome on Linux, ChromeOS prior to 148.0.7778.179 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9121
(8.8 HIGH)

EPSS: 0.02%

updated 2026-05-20T21:31:40

1 posts

Out of bounds read in GPU in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-20T22:01:12.000Z ##

🟠 CVE-2026-9121 - High (8.8)

Out of bounds read in GPU in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9112
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-20T21:31:39

1 posts

Use after free in GPU in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-21T02:01:00.000Z ##

🟠 CVE-2026-9112 - High (8.8)

Use after free in GPU in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41091
(7.8 HIGH)

EPSS: 12.10%

updated 2026-05-20T19:06:36.850000

6 posts

Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/0xBlackash/CVE-2026-41091

oversecurity@mastodon.social at 2026-05-22T09:20:40.000Z ##

Microsoft Patches Actively Exploited Defender Vulnerabilities Affecting Enterprise Systems

Microsoft has confirmed active exploitation of two security vulnerabilities in its security ecosystem, identified as CVE-2026-41091 and...

🔗️ [Thecyberexpress] link.is.it/oRM68F

##

sayzard@mastodon.sayzard.org at 2026-05-21T23:40:40.000Z ##

Microsoft warns of new Defender zero-days exploited in attacks

마이크로소프트가 Microsoft Defender의 두 가지 제로데이 취약점(CVE-2026-41091, CVE-2026-45498)에 대해 보안 패치를 배포했다. 첫 번째는 권한 상승 취약점이며, 두 번째는 서비스 거부(DoS) 공격을 유발할 수 있다. 미국 CISA는 이 취약점들이 실제 공격에 악용되고 있다며 연방 정부 기관에 6월 3일까지 긴급 패치를 적용할 것을 명령했다. 사용자는 자동 업데이트 설정을 확인해 최신 보안 패치가 적용되었는지 점검해야 한다.

bleepingcomputer.com/news/secu

#security #microsoft #defender #zeroday #cve

##

oversecurity@mastodon.social at 2026-05-22T09:20:40.000Z ##

Microsoft Patches Actively Exploited Defender Vulnerabilities Affecting Enterprise Systems

Microsoft has confirmed active exploitation of two security vulnerabilities in its security ecosystem, identified as CVE-2026-41091 and...

🔗️ [Thecyberexpress] link.is.it/oRM68F

##

beyondmachines1@infosec.exchange at 2026-05-21T17:01:08.000Z ##

Microsoft Patches Actively Exploited Defender Vulnerabilities

Microsoft and CISA confirmed active exploitation of vulnerabilities in Microsoft Defender, including a privilege escalation flaw (CVE-2026-41091) and a denial-of-service bug (CVE-2026-45498).

**Check that your Microsoft Defender engine version is 1.1.26040.8 or higher to ensure you are protected against these active exploits. While updates are usually automatic, manual verification is necessary for critical systems to confirm the patches were applied.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

cisakevtracker@mastodon.social at 2026-05-20T17:02:02.000Z ##

CVE ID: CVE-2026-41091
Vendor: Microsoft
Product: Defender
Date Added: 2026-05-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-45584
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-20T18:56:32.350000

3 posts

Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.

1 repos

https://github.com/96613686/CVE-2026-45584

xeiaso.net@bsky.brid.gy at 2026-05-20T22:16:01.908Z ##

"No way to prevent this" say users of only language where this regularly happens https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45584/

"No way to prevent this" say u...

##

cadey@pony.social at 2026-05-20T22:16:02.000Z ##

"No way to prevent this" say users of only language where this regularly happens

xeiaso.net/shitposts/no-way-to

##

nyanbinary@infosec.exchange at 2026-05-20T20:16:24.000Z ##

msrc.microsoft.com/update-guid

One job. You had one job.

Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.

##

CVE-2026-45498
(4.0 None)

EPSS: 2.27%

updated 2026-05-20T18:31:35

5 posts

Microsoft Defender Denial of Service Vulnerability

sayzard@mastodon.sayzard.org at 2026-05-21T23:40:40.000Z ##

Microsoft warns of new Defender zero-days exploited in attacks

마이크로소프트가 Microsoft Defender의 두 가지 제로데이 취약점(CVE-2026-41091, CVE-2026-45498)에 대해 보안 패치를 배포했다. 첫 번째는 권한 상승 취약점이며, 두 번째는 서비스 거부(DoS) 공격을 유발할 수 있다. 미국 CISA는 이 취약점들이 실제 공격에 악용되고 있다며 연방 정부 기관에 6월 3일까지 긴급 패치를 적용할 것을 명령했다. 사용자는 자동 업데이트 설정을 확인해 최신 보안 패치가 적용되었는지 점검해야 한다.

bleepingcomputer.com/news/secu

#security #microsoft #defender #zeroday #cve

##

beyondmachines1@infosec.exchange at 2026-05-21T17:01:08.000Z ##

Microsoft Patches Actively Exploited Defender Vulnerabilities

Microsoft and CISA confirmed active exploitation of vulnerabilities in Microsoft Defender, including a privilege escalation flaw (CVE-2026-41091) and a denial-of-service bug (CVE-2026-45498).

**Check that your Microsoft Defender engine version is 1.1.26040.8 or higher to ensure you are protected against these active exploits. While updates are usually automatic, manual verification is necessary for critical systems to confirm the patches were applied.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

todb@infosec.exchange at 2026-05-20T18:53:07.000Z ##

I thought there was a bug in EPSS since I couldn't see the score for CVE-2026-45498, but... it's just too new. Released today. Rare not-Patch-Tuesday CVE release for Microsoft. Wonder what's up.

(It's a Microsoft Defender DoS, which, sure, seems bad for an A/V thing, but... it's just DoS according to the CVE and KB.)

(Also the KB says there's no exploitation, but CISA KEV says otherwise... curiouser and curiouser.)

##

cisakevtracker@mastodon.social at 2026-05-20T17:02:17.000Z ##

CVE ID: CVE-2026-45498
Vendor: Microsoft
Product: Defender
Date Added: 2026-05-20
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-24207
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-05-20T17:30:43.320000

1 posts

NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause an authentication bypass. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

beyondmachines1@infosec.exchange at 2026-05-21T09:01:07.000Z ##

NVIDIA Patches Critical Authentication Bypass in Triton Inference Server

NVIDIA patched eight vulnerabilities in its Triton Inference Server, including a critical authentication bypass (CVE-2026-24207) that allow unauthenticated remote attackers to execute code, steal data, or disrupt AI model serving operations.

**Make sure your NVIDIA Triton Inference Servers are isolated from the internet and accessible only from trusted networks. Then update all Triton Inference Servers to release r26.03 or later ASAP, especially if they are exposed on the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-20223
(10.0 CRITICAL)

EPSS: 0.05%

updated 2026-05-20T17:30:40.450000

8 posts

A vulnerability in the&nbsp;access validation of internal REST APIs of Cisco Secure Workload could allow an unauthenticated, remote attacker to access site resources with the privileges of the&nbsp;Site Admin role. This vulnerability is due to insufficient validation and authentication when accessing REST API endpoints. An attacker could exploit this vulnerability if they are able to send a cra

1 repos

https://github.com/HORKimhab/CVE-2026-20223

oversecurity@mastodon.social at 2026-05-22T07:51:39.000Z ##

Cisco Secure Workload Flaw CVE-2026-20223 Gets Maximum CVSS 10 Rating

Cisco has released security updates to fix a critical vulnerability, tracked as CVE-2026-20223, affecting its Cisco Secure Workload platform. The

🔗️ [Thecyberexpress] link.is.it/oVchv5

##

Analyst207@mastodon.social at 2026-05-22T06:16:18.000Z ##

Cisco Fixes API Flaw Enabling Unauth Data Access

Cisco has patched a critical API flaw that allowed hackers to access sensitive data without authentication, potentially leading to configuration changes with admin-level privileges. This vulnerability, tracked as CVE-2026-20223, highlights the importance of robust API security measures to prevent devastating breaches.

osintsights.com/cisco-fixes-ap

#ApiSecurity #Cisco #Cve202620223 #SecureWorkload #RestApis

##

oversecurity@mastodon.social at 2026-05-22T07:51:39.000Z ##

Cisco Secure Workload Flaw CVE-2026-20223 Gets Maximum CVSS 10 Rating

Cisco has released security updates to fix a critical vulnerability, tracked as CVE-2026-20223, affecting its Cisco Secure Workload platform. The

🔗️ [Thecyberexpress] link.is.it/oVchv5

##

diker@mstdn.ca at 2026-05-21T15:24:59.000Z ##

Max severity #Cisco Secure Workload flaw gives Site #Admin privileges..Cisco has released security updates to address a maximum-severity Secure Workload #vulnerability that allows attackers to gain Site Admin privileges.Tracked as CVE-2026-20223, the security flaw was found in Secure Workload's internal REST APIs, and it enables unauthenticated attackers to access resources with the privileges of the Site Admin role.#cybersec #security #security #cyber #sec

##

beyondmachines1@infosec.exchange at 2026-05-21T15:01:06.000Z ##

Cisco Patches Critical CVSS 10.0 Authentication Bypass in Secure Workload

Cisco patched a critical CVSS 10.0 vulnerability in Secure Workload that allows unauthenticated attackers to gain Site Admin privileges via crafted API calls. The flaw enables unauthorized data access and configuration changes across tenant boundaries in both SaaS and on-premises environments.

**Make sure your Cisco Secure Workload clusters are isolated from the internet and accessible only from trusted networks. If you run on-premises Cisco Secure Workload, immediately update to version 3.10.8.3 or 4.0.3.17 to patch CVE-2026-20223; if you're on versions 3.9 or older, plan a migration to a supported patched release since no direct updates are available.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

flyingpenguin@infosec.exchange at 2026-05-20T18:46:13.000Z ##

deep narrator voice "it was a segmentation product that cannot segment"

cve.org/CVERecord?id=CVE-2026-

##

thehackerwire@mastodon.social at 2026-05-20T18:00:47.000Z ##

🔴 CVE-2026-20223 - Critical (10)

A vulnerability in the&nbsp;access validation of internal REST APIs of Cisco Secure Workload could allow an unauthenticated, remote attacker to access site resources with the privileges of the&nbsp;Site Admin role.

This vulnerability is due to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-05-20T17:35:12.000Z ##

New Cisco advisories.

- CRITICAL: CVE-2026-20223: Cisco Secure Workload Unauthorized API Access Vulnerability sec.cloudapps.cisco.com/securi

- There are three more of medium severity: sec.cloudapps.cisco.com/securi @TalosSecurity #infosec #vulnerability #Cisco

@cR0w

##

CVE-2026-8598
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-05-20T17:30:40.450000

1 posts

An undocumented configuration export port is accessible on some models of ZKTeco CCTV cameras. This port does not require authentication and exposes critical information about the camera such as open services and camera account credentials.

thehackerwire@mastodon.social at 2026-05-20T18:00:57.000Z ##

🔴 CVE-2026-8598 - Critical (9.1)

An undocumented configuration export port is accessible on some models
of ZKTeco CCTV cameras. This port does not require authentication and
exposes critical information about the camera such as open services and
camera account credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40622(CVSS UNKNOWN)

EPSS: 0.02%

updated 2026-05-20T15:35:29

1 posts

NLnet Labs Unbound 1.16.2 up to and including version 1.25.0 has a vulnerability of the 'ghost domain names' family of attacks that could extend the ghost domain window by up to one cached TTL configured value. Similar to other 'ghost domain names' attacks, an adversary needs to control a (ghost) zone and be able to query a vulnerable Unbound. A single client NS query can cause Unbound to overwrit

nlnetlabs@social.nlnetlabs.nl at 2026-05-20T10:35:53.000Z ##

🚨 SECURITY RELEASE 🚨
Today we released Unbound 1.25.1, which consolidates security fixes for issues reported over a period of time.

There are fixes for CVE-2026-33278, CVE-2026-42944, CVE-2026-42959, CVE-2026-32792, CVE-2026-40622, CVE-2026-41292, CVE-2026-42534, CVE-2026-42923, CVE-2026-42960, CVE-2026-44390 and CVE-2026-44608.

Please read the release notes carefully and plan to upgrade.

#DNS #DNSSEC #Mythos #LLM #OpenSource

community.nlnetlabs.nl/t/unbou

##

CVE-2026-45585
(6.8 MEDIUM)

EPSS: 0.09%

updated 2026-05-20T15:35:28

5 posts

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as &quot;YellowKey&quot;. The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices. We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.

2 repos

https://github.com/bjbakker1984/Yellowkey-mitigation

https://github.com/everest90909/YellowKey-WinRE-Remediation

beyondmachines1@infosec.exchange at 2026-05-21T13:01:07.000Z ##

Microsoft Issues Emergency Mitigation for YellowKey BitLocker Bypass

Microsoft released emergency mitigations for a BitLocker bypass vulnerability (CVE-2026-45585) that allows attackers with physical access to access encrypted data via the Windows Recovery Environment.

**To protect against the YellowKey physical bypass attack switch your BitLocker configuration from TPM-only to TPM+PIN configuration. Relying on hardware-only secrets is no longer sufficient when the boot process itself can be manipulated. IT teams should also manually modify their WinRE images to remove the autofstx.exe entry from the registry until Microsoft releases an official, permanent patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-05-20T19:30:09.000Z ##

🚨 CVE-2026-45585 (YellowKey)

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as "YellowKey". The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices.
We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#yellowkey #microsoft #bitlocker #cve202645585

##

threatcodex@infosec.exchange at 2026-05-20T16:08:41.000Z ##

Microsoft Releases Mitigation for YellowKey BitLocker Bypass CVE-2026-45585 Exploit
#CVE_2026_45585
thehackernews.com/2026/05/micr

##

_r_netsec@infosec.exchange at 2026-05-20T14:28:05.000Z ##

CVE-2026-45585: Windows BitLocker — YellowKey Recovery Bypass Analysis zerodaybrief.blog/episodes/ep0

##

cR0w@infosec.exchange at 2026-05-20T13:29:02.000Z ##

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as "YellowKey". The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices.

I know people here probably don't want to rehash the disclosure discussion for the 683,547,329th time, but fuck Microsoft and this passive aggressive bullshit trying to frame their own interests as "best practices" in a vuln mitigation publication. Your shit is getting torn apart. Act like you've been there before because we all know you have.

msrc.microsoft.com/update-guid

##

CVE-2026-9064
(7.5 HIGH)

EPSS: 0.08%

updated 2026-05-20T14:02:12.280000

1 posts

A flaw was found in 389-ds-base. The get_ldapmessage_controls_ext() function in the LDAP server does not enforce an upper bound on the number of controls per LDAP message. A remote, unauthenticated attacker can send a specially crafted LDAP request containing hundreds of thousands of minimal controls within the default maximum BER message size (2 MB), causing excessive CPU consumption and heap all

thehackerwire@mastodon.social at 2026-05-20T19:01:15.000Z ##

🟠 CVE-2026-9064 - High (7.5)

A flaw was found in 389-ds-base. The get_ldapmessage_controls_ext() function in the LDAP server does not enforce an upper bound on the number of controls per LDAP message. A remote, unauthenticated attacker can send a specially crafted LDAP reques...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44933
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-20T14:01:24.027000

1 posts

`PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this root is frequently `/` (the system root) in standard configurations or when using `--root`. If the chroot target is `/`, it is a no-op, allowing the traversed path to execute host binaries (like `/bin/bash`) with root privileges.

thehackerwire@mastodon.social at 2026-05-20T19:01:05.000Z ##

🟠 CVE-2026-44933 - High (7.8)

`PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this root is frequently `/` (the system root) in standard configurations or when using `--root`. If the chroot target is `/`, it is a no-op, allowing the traversed path to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9065
(0 None)

EPSS: 0.03%

updated 2026-05-20T14:01:24.027000

1 posts

SureCart version prior to 4.2.1 are vulnerable to authenticated SQL injection via multiple parameters ('model_name', 'model_id', 'integration_id', 'provider') on the REST API endpoint '/surecart/v1/integrations/{id}'. The root cause is a flawed escaping bypass in the query builder ('wp-query-builder'). Values passed to the 'where()' method are only sanitized via '$wpdb->prepare()' when they do **

AAKL@infosec.exchange at 2026-05-20T18:03:54.000Z ##

Tenable Research Advisories have added two items:

- CVE-2026-9065: Surecart - SQL Injection tenable.com/security/research/

- CVE-2026-9059: NextGEN Gallery - SQL Injection tenable.com/security/research/ @tenable #infosec #vulnerability #SQL

##

CVE-2026-9059
(0 None)

EPSS: 0.03%

updated 2026-05-20T14:01:24.027000

1 posts

NextGEN Gallery version prior to 4.2.1 are vulnerable to authenticated SQL injection via the 'orderby' parameter on the REST API endpoints '/imagely/v1/galleries' and '/imagely/v1/albums'. The root cause is an insufficient sanitization function ('_clean_column()') in the data mapper layer that uses a character blacklist instead of a whitelist approach. This allows an authenticated attacker with

AAKL@infosec.exchange at 2026-05-20T18:03:54.000Z ##

Tenable Research Advisories have added two items:

- CVE-2026-9065: Surecart - SQL Injection tenable.com/security/research/

- CVE-2026-9059: NextGEN Gallery - SQL Injection tenable.com/security/research/ @tenable #infosec #vulnerability #SQL

##

CVE-2026-5200
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-20T13:54:54.890000

1 posts

The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 10.8.2. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify priv

thehackerwire@mastodon.social at 2026-05-20T20:00:03.000Z ##

🟠 CVE-2026-5200 - High (8.8)

The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 10.8.2. This is due to the plugin not properly verifying...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8953
(9.6 CRITICAL)

EPSS: 0.04%

updated 2026-05-19T18:45:32.087000

1 posts

Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability was fixed in Firefox 151, Firefox ESR 115.36, Firefox ESR 140.11, Thunderbird 151, and Thunderbird 140.11.

Mozilla@activitypub.awakari.com at 2026-05-20T11:46:48.000Z ## Firefox 151 packs big privacy upgrades into a small update Firefox 151 adds major privacy improvements and fixes high-priority security vulnerabilities, making this an update you shouldn’t ignore...

#Bugs #News #Privacy #CVE-2026-8953 #End #Private #Session

Origin | Interest | Match ##

CVE-2026-6068
(6.5 MEDIUM)

EPSS: 0.12%

updated 2026-05-19T15:31:21

1 posts

NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling pointer to freed memory is stored in the global depend_file and later dereferenced, as the response-file buffer is freed before the pointer is used, allowing for data corruption or unexpected behavior.

bontchev@infosec.exchange at 2026-05-21T09:49:29.000Z ##

Another one from the Lulz Department: how about an RCE in your assembler?

"CVE-2026-6068 – From Heap UAF to Persistent RCE in NASM":

sekai.team/blog/nasm-cve-discl

##

CVE-2026-45829
(0 None)

EPSS: 0.14%

updated 2026-05-19T14:16:46.977000

1 posts

A pre-authentication, code injection vulnerability in version 1.0.0 or later of the ChromaDB Python project allows an unauthenticated attacker to run arbitrary code on the server by sending a malicious model repository and trust_remote_code set to true in the /api/v2/tenants/{tenant}/databases/{db}/collections endpoint.

2 repos

https://github.com/0xBlackash/CVE-2026-45829

https://github.com/fevar54/FULL-ANALYSIS---CVE-2026-45829-ChromaDB-

LLMs@activitypub.awakari.com at 2026-05-20T11:52:56.000Z ## CVE-2026-45829: Max-Severity Flaw Lets Attackers Hijack ChromaDB CVE-2026-45829 is a maximum-severity pre-auth flaw in ChromaDB allowing server hijacking; about 73% of internet-exposed instances ru...

#Resources #Application #Security #CVE #Vulnerability #Alerts #Cybersecurity #News

Origin | Interest | Match ##

CVE-2020-17103
(7.0 HIGH)

EPSS: 0.33%

updated 2026-05-18T13:16:28.530000

1 posts

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

4 repos

https://github.com/0xDimas/MiniPlasma

https://github.com/Nightmare-Eclipse/MiniPlasma

https://github.com/AlexLinov/MiniPlasma-Runner

https://github.com/arch1m3d/MiniPlasma-Detection

Wildmimic@anarchist.nexus at 2026-05-22T07:15:55.219Z ##

Even better, they posted this last week:

After re-investigating the technique used in GreenPlasma (specifically SetPolicyVal), it turns out cldflt!HsmOsBlockPlaceholderAccess is still vulnerable to the exact same issue that was reported to Microsoft 6 years ago. I’m not taking full credit for this, James Forshaw from google project zero found the vulnerability and reported it to Microsoft and was supposedly fixed as CVE-2020-17103.

However, a research who’s a friend of mine pointed out that the routine might still have a vulnerability, which is something I considered but brushed off because I thought it was impossible for Microsoft to just not patch this or rollback the patch.

After investigating, it turns out the exact same issue that was reported to Microsoft by Google project zero is actually still present, unpatched. I’m unsure if Microsoft just never patched the issue or the patch was silently rolled back at some point for unknown reasons. The original PoC by Google worked without any changes.

https://github.com/Nightmare-Eclipse/MiniPlasma https://deadeclipse666.blogspot.com/

##

CVE-2026-42897
(8.1 HIGH)

EPSS: 10.03%

updated 2026-05-15T19:35:52.963000

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

1 repos

https://github.com/atiilla/CVE-2026-42897

hackmag@infosec.exchange at 2026-05-21T03:00:03.000Z ##

⚪️ Microsoft warns of attacks exploiting zero‑day vulnerability in Exchange Server

🗨️ Microsoft specialists have warned about attacks targeting a new zero-day vulnerability in Exchange Server, identified as CVE-2026-42897. The issue affects Exchange Server 2016, 2019, and Subscription Edition (SE). Since a full patch is not yet available, the company suggests using…

🔗 hackmag.com/news/exchange-0day

#news

##

CVE-2026-42945
(8.1 HIGH)

EPSS: 0.27%

updated 2026-05-14T21:30:40

3 posts

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond it

28 repos

https://github.com/DepthFirstDisclosures/Nginx-Rift

https://github.com/fkj-src/fix_nginx_cve_2026_42945

https://github.com/RedCrazyGhost/CVE-2026-42945

https://github.com/MateusVerass/nGixshell

https://github.com/yusufdalbudak/CVE-2026-42945

https://github.com/Renison-Gohel/CVE-2026-42945-NGINX-Rift

https://github.com/iammerrida-source/nginx-rift-detect

https://github.com/gagaltotal/CVE-2026-42945-NGINX-Rift-Toolkit

https://github.com/byezero/nginx-cve-2026-42945-check

https://github.com/nanwinata/nginxrift-CVE-2026-42945

https://github.com/BarAppTeam/nginx-cve-fix

https://github.com/0xBlackash/CVE-2026-42945

https://github.com/realityone/cve-2026-42945-scan

https://github.com/chenqin231/CVE-2026-42945

https://github.com/oseasfr/Scanner_CVE_2026-42945

https://github.com/soksofos/wazuh-nginx-cve-2026-42945-sca-lab

https://github.com/forxiucn/nginx-cve-2026-42945-poc

https://github.com/imSre9/CVE-2026-42945

https://github.com/jelasin/CVE-2026-42945

https://github.com/rheodev/CVE-2026-42945

https://github.com/tal7aouy/nginx-cve-2026-42945

https://github.com/cipherspy/CVE-2026-42945-POC

https://github.com/hnytgl/cve-2026-42945

https://github.com/friparia/NGINX_RIFT_SCAN_CVE_2026_42945

https://github.com/sibersan/web-server-audit_CVE-2026-42945

https://github.com/ChamsBouzaiene/ai-vuln-rediscovery-nginx-cve-2026-42945

https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC

https://github.com/dinosn/cve-2026-42945-nginx32-lab

cedric@fosstodon.org at 2026-05-21T13:18:21.000Z ##

@gzobra @adulau @firstdotorg

Thank you for these kind words!

If you are interested we started to deploy in production the algorithms presented during FIRST CTI in Munich. An example here:

vulnerability.circl.lu/vuln/cv

Click on the "Forecast" tab.

Have a nice day!

##

pentesttools@infosec.exchange at 2026-05-20T13:00:33.000Z ##

🚨 Worried about your #NGINX web servers? 👉 We built a *free* scanner for CVE-2026-42945 (NGINX Rift). 👇

Check your targets now (no account required): pentest-tools.com/network-vuln

Once the scan completes (and if your target is vulnerable), you'll get a finding that includes:
✅ the detected NGINX version
✅the vulnerable range it falls into
✅the CVSS score & severity rating
✅remediation guidance

Download it as a PDF and share it with whoever handles remediation.

Oh, and one thing to check before you call it patched: upgrading your primary NGINX install *doesn’t* cover copies embedded in container images or Kubernetes ingress controllers.

Those need separate inventory and patching.

PS: We also have a dedicated Kubernetes vulnerability scanner. You can find it on our website.

#offensivesecurity #pentesting #vulnerabilitymanagement

##

hackmag@infosec.exchange at 2026-05-20T12:30:02.000Z ##

⚪️ 18-year-old vulnerability in NGINX leads to remote code execution

🗨️ Researchers from DepthFirst AI have discovered a critical vulnerability in NGINX, CVE-2026-42945, which scored 9.2 on the CVSS scale. The issue affects all NGINX versions from 0.6.27 to 1.30.0 and has been present in the code for about 18 years.…

🔗 hackmag.com/news/cve-2026-4294

#news

##

CVE-2026-44578
(8.6 HIGH)

EPSS: 4.48%

updated 2026-05-14T18:34:38.530000

1 posts

Next.js is a React framework for building full-stack web applications. From 13.4.13 to before 15.5.16 and 16.2.5, self-hosted applications using the built-in Node.js server can be vulnerable to server-side request forgery through crafted WebSocket upgrade requests. An attacker can cause the server to proxy requests to arbitrary internal or external destinations, which may expose internal services

Nuclei template

7 repos

https://github.com/love07oj/nextjs-cve-2026-44578

https://github.com/0xBlackash/CVE-2026-44578

https://github.com/ynsmroztas/nextssrf

https://github.com/panchocosil/verify-ghsa-c4j6-fc7j-m34r

https://github.com/dwisiswant0/next-16.2.4-pocs

https://github.com/tocong282/CVE-2026-44578-PoC

https://github.com/dinosn/CVE-2026-44578

cR0w@infosec.exchange at 2026-05-20T19:38:48.000Z ##

horizon3.ai/attack-research/vu

CVE-2026-44578 is a High-severity server-side request forgery vulnerability affecting self-hosted Next.js applications that use the built-in Node.js server. The vulnerability exists in WebSocket upgrade request handling, where crafted requests can cause the server to proxy connections to arbitrary internal or external destinations. Vercel-hosted deployments are not affected.

#fuckJavaScript

##

CVE-2026-40369
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-14T17:52:50.143000

4 posts

Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.

2 repos

https://github.com/ercihan/CVE-2026-40369

https://github.com/orinimron123/CVE-2026-40369-EXPLOIT

sayzard@mastodon.sayzard.org at 2026-05-22T01:41:04.000Z ##

CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox

CVE-2026-40369은 Windows 커널의 nt!ExpGetProcessInformation 함수 내에서 발생하는 12바이트 임의 쓰기 취약점으로, NtQuerySystemInformation 호출 시 검증 없이 커널 메모리에 쓰기가 가능하다. 이 취약점은 크롬, 엣지, 파이어폭스 렌더러 샌드박스 등 비권한 프로세스에서도 접근 가능하며, 이를 이용해 권한 상승(LPE)이 가능하다. 연구자는 기존 토큰 탈취 방식 대신 NtCreateToken을 활용해 SYSTEM 권한 토큰을 직접 생성하는 새로운 공격 체인을 제시했다. 이 취약점은 Windows 11 25H2 빌드...

voidsec.com/cve-2026-40369-bro

##

hackerworkspace@infosec.exchange at 2026-05-21T18:33:55.000Z ##

CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox - VoidSec

voidsec.com/cve-2026-40369-bro

Read on HackerWorkspace: hackerworkspace.com/article/cv

#cybersecurity #vulnerability #exploit

##

_r_netsec@infosec.exchange at 2026-05-21T16:13:05.000Z ##

CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox voidsec.com/cve-2026-40369-bro

##

oversecurity@mastodon.social at 2026-05-20T10:50:53.000Z ##

CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox

Technical analysis of CVE-2026-40369, a 12-byte Windows kernel write reachable from browser sandboxes via NtQuerySystemInformation, leading to SYSTEM.

🔗️ [Voidsec] link.is.it/5Fe1gf

##

CVE-2026-0265
(0 None)

EPSS: 0.06%

updated 2026-05-13T18:17:47.830000

1 posts

An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure acc

1 repos

https://github.com/tstephens1080/palo-alto-cve-2026-0265-checker

CVE-2026-28910
(3.3 LOW)

EPSS: 0.01%

updated 2026-05-13T14:02:20.380000

1 posts

This issue was addressed with improved permissions checking. This issue is fixed in macOS Tahoe 26.4. A malicious app may be able to access arbitrary files.

sayzard@mastodon.sayzard.org at 2026-05-22T09:39:11.000Z ##

CVE-2026-28910: Breaking macOS App Sandbox Data Containers and Hijacking Apps

macOS의 기본 압축 도구인 Archive Utility가 macOS 26.4 이전 버전에서 거의 무제한 파일 시스템 접근 권한을 가지고 있어, 드래그 앤 드롭 샌드박스 취약점과 결합해 앱 샌드박스 데이터 컨테이너, TCC(투명성·동의·제어) 보호를 우회하고 타사 앱을 하이재킹할 수 있는 심각한 보안 취약점(CVE-2026-28910)이 발견되었다. 공격자는 단 두 가지 사용자 행동(악성 코드 실행 및 특정 파일 드래그 앤 드롭)만으로 권한 상승 없이 민감한 앱 데이터에 접근하고, 신뢰된 앱을 악성 버전으로 교체할 수 있다. 이 문제는 2025년 10월 보고되...

mysk.blog/2026/05/19/cve-2026-

##

CVE-2026-0300
(9.8 CRITICAL)

EPSS: 14.43%

updated 2026-05-12T18:47:21.360000

1 posts

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal

9 repos

https://github.com/TailwindRG/cve-2026-0300-audit

https://github.com/0xBlackash/CVE-2026-0300

https://github.com/qassam-315/PAN-OS-User-ID-Buffer-Overflow-PoC

https://github.com/bannned-bit/CVE-2026-0300-PANOS

https://github.com/ByteWraith1/CVE-2026-0300

https://github.com/shizuku198411/CVE-2026-0300

https://github.com/lu4m575/CVE-2026-0300

https://github.com/mr-r3b00t/CVE-2026-0300

https://github.com/p3Nt3st3r-sTAr/CVE-2026-0300-POC

beyondmachines1@infosec.exchange at 2026-05-20T09:01:07.000Z ##

Siemens RUGGEDCOM APE1808 Critical RCE Vulnerability

Siemens reported a critical vulnerability (CVE-2026-0300) in RUGGEDCOM APE1808 devices that allows unauthenticated attackers to execute arbitrary code with root privileges by exploiting a buffer overflow in the integrated Palo Alto Networks PAN-OS software.

**If you use RUGGEDCOM APE1808 devices, disable the Captive Portal or restrict it to trusted internal networks. Do not wait for a firmware patch, it may be too late. When the patch is published, update immediately**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-1502(CVSS UNKNOWN)

EPSS: 0.07%

updated 2026-05-10T21:30:22

4 posts

CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.

grahamperrin@bsd.cafe at 2026-05-22T00:06:34.000Z ##

RE: mastodon.social/@wollman/11661

@distrowatch @kaidenshi @brnrd

<vuxml.freebsd.org/freebsd/30bd> for CVE-2026-1502, one of the five vulnerable ports is deprecated but not yet expired.

295200 – lang/python314: Update to 3.14.5 — <bugs.freebsd.org/bugzilla/show>

285957 – lang/python312 as default python — <bugs.freebsd.org/bugzilla/show>

Cc @dvl

##

wollman@mastodon.social at 2026-05-21T23:11:50.000Z ##

Really feels like @dvl and I are the only people who actually read our #FreeBSD package security alerts, given the apparent complete lack of urgency on the part of anyone else to fix the two-months-outstanding lang/python* CVEs like CVE-2026-1502.

##

grahamperrin@bsd.cafe at 2026-05-22T00:06:34.000Z ##

RE: mastodon.social/@wollman/11661

@distrowatch @kaidenshi @brnrd

<vuxml.freebsd.org/freebsd/30bd> for CVE-2026-1502, one of the five vulnerable ports is deprecated but not yet expired.

295200 – lang/python314: Update to 3.14.5 — <bugs.freebsd.org/bugzilla/show>

285957 – lang/python312 as default python — <bugs.freebsd.org/bugzilla/show>

Cc @dvl

##

wollman@mastodon.social at 2026-05-21T23:11:50.000Z ##

Really feels like @dvl and I are the only people who actually read our #FreeBSD package security alerts, given the apparent complete lack of urgency on the part of anyone else to fix the two-months-outstanding lang/python* CVEs like CVE-2026-1502.

##

CVE-2026-34474
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-07T15:15:06.770000

1 posts

Sensitive data exposure leading to admin/WLAN credential leak in ZTE ZXHN H298A 1.1 and H108N 2.6. A crafted request to the router web interface can expose sensitive device and account information. In affected builds, the response may include the administrator password and WLAN PSK, enabling authentication bypass and network compromise. Some firmware versions may expose only partial identifiers (e

1 repos

https://github.com/minanagehsalalma/cve-2026-34474-zte-h298a-h108n-sensitive-data-exposure

CVE-2026-5140
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-04T14:16:35.190000

3 posts

Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus Update allows Authentication Bypass. This issue affects Pardus Update: from 0.6.3 before 0.6.4.

cyberveille@mastobot.ping.moi at 2026-05-21T21:30:21.000Z ##

📢 CVE-2026-5140 : Chaîne d'escalade de privilèges critique dans Pardus Linux permettant un accès root
📝 ## 🔍 Contexte

Publié le 21 mai 2026 par The Cyber Express, cet article documente une chaî...
📖 cyberveille : cyberveille.ch/posts/2026-05-2
🌐 source : thecyberexpress.com/cve-2026-5
#APT_hijacking #CRLF_injection #Cyberveille

##

linux@activitypub.awakari.com at 2026-05-21T06:47:12.000Z ## Pardus Linux Vulnerability Chain Enables Complete System Takeover A critical local privilege escalation vulnerability chain tracked as CVE-2026–5140 has exposed serious security weaknesses in Par...

#Firewall #Daily #Cyber #News #Vulnerabilities #Vulnerability #News #CRLF #injection #flaw #CVE-2026–5140

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-21T06:47:12.000Z ## Pardus Linux Vulnerability Chain Enables Complete System Takeover A critical local privilege escalation vulnerability chain tracked as CVE-2026–5140 has exposed serious security weaknesses in Par...

#Firewall #Daily #Cyber #News #Vulnerabilities #Vulnerability #News #CRLF #injection #flaw #CVE-2026–5140

Origin | Interest | Match ##

CVE-2013-0422
(9.8 CRITICAL)

EPSS: 93.61%

updated 2026-04-21T19:02:35.430000

1 posts

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a securit

kev_Stalker@infosec.exchange at 2026-05-21T19:33:19.000Z ##

CVE-2013-0422 - Changed to Known Ransomware Status

Oracle JRE Remote Code Execution VulnerabilityVendor: OracleProduct: Java Runtime Environment (JRE)A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: May 21, 2026 at 18:00:35 UTCDate Added to KEV: 2022-05-25View CVE nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2024-12802
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-04-15T00:35:42.020000

5 posts

SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name.

jbhall56 at 2026-05-22T11:23:52.765Z ##

SonicWall warned in a security advisory for CVE-2024-12802 that installing the firmware update alone on Gen6 devices does not fully mitigate the vulnerability, and a manual reconfiguration of the LDAP server is required. bleepingcomputer.com/news/secu

##

blog@insicurezzadigitale.com at 2026-05-22T09:52:16.000Z ##

“Patchato” non significa protetto: attaccanti bypassano l’MFA sui VPN SonicWall Gen6 e raggiungono i file server in 30 minuti

CVE-2024-12802 sulle appliance SonicWall Gen6 SSL-VPN viene sfruttata attivamente nonostante la patch disponibile. Il motivo: il fix firmware non basta — richiede sei passaggi manuali aggiuntivi che la maggior parte degli amministratori non esegue. Il risultato: attori del ransomware ecosystem bypassano l'MFA, entrano nelle reti e raggiungono i file server in meno di trenta minuti.

insicurezzadigitale.com/patcha

##

cyberveille@mastobot.ping.moi at 2026-05-21T21:30:21.000Z ##

📢 CVE-2024-12802 : exploitation active de SonicWall SSL VPN malgré le patch firmware
📝 ## 🔍 Contexte

Publié le 19 mai 2026 par ReliaQuest Threat Research (auteurs : Alexander Capraro et Tristan Luikey),...
📖 cyberveille : cyberveille.ch/posts/2026-05-2
🌐 source : reliaquest.com/blog/threat-spo
#Akira #BYOVD #Cyberveille

##

jbhall56@infosec.exchange at 2026-05-22T11:23:52.000Z ##

SonicWall warned in a security advisory for CVE-2024-12802 that installing the firmware update alone on Gen6 devices does not fully mitigate the vulnerability, and a manual reconfiguration of the LDAP server is required. bleepingcomputer.com/news/secu

##

blog@insicurezzadigitale.com at 2026-05-22T09:52:16.000Z ##

“Patchato” non significa protetto: attaccanti bypassano l’MFA sui VPN SonicWall Gen6 e raggiungono i file server in 30 minuti

CVE-2024-12802 sulle appliance SonicWall Gen6 SSL-VPN viene sfruttata attivamente nonostante la patch disponibile. Il motivo: il fix firmware non basta — richiede sei passaggi manuali aggiuntivi che la maggior parte degli amministratori non esegue. Il risultato: attori del ransomware ecosystem bypassano l'MFA, entrano nelle reti e raggiungono i file server in meno di trenta minuti.

insicurezzadigitale.com/patcha

##

CVE-2025-6919
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-04-15T00:35:42.020000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Cats Information Technology Software Development Technologies Aykome License Tracking System allows SQL Injection.This issue affects Aykome License Tracking System: before Version dated 06.10.2025.

1 repos

https://github.com/secdongle/POC_CVE-2025-69194

hugovalters@mastodon.social at 2026-05-22T09:13:58.000Z ##

CVE-2025-6919 - Critical SQLi in Cats Information Technology Aykome License Tracking System. CVSS 9.8. Unpatched. Update immediately to version dated 06.10.2025. #CVE #infosec #cybersecurity

valtersit.com/cve/CVE-2025-691

##

CVE-2026-34472
(7.1 HIGH)

EPSS: 0.15%

updated 2026-04-08T16:05:42.877000

1 posts

Unauthenticated credential disclosure in the wizard interface in ZTE ZXHN H188A V6.0.10P2_TE and V6.0.10P3N3_TE allows unauthenticated attackers on the local network to retrieve sensitive credentials from the router's web management interface, including the default administrator password, WLAN PSK, and PPPoE credentials. In some observed cases, configuration changes may also be performed without a

1 repos

https://github.com/minanagehsalalma/cve-2026-34472-auth-bypass-zte-h188a-router

_r_netsec@infosec.exchange at 2026-05-20T13:58:05.000Z ##

CVE-2026-34472: Pre-auth credential exposure and auth bypass in ZTE H188A V6 routers minanagehsalalma.github.io/cve

##

CVE-2026-3102
(6.3 MEDIUM)

EPSS: 0.26%

updated 2026-02-26T21:32:34

6 posts

A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.

2 repos

https://github.com/HORKimhab/CVE-2026-3102

https://github.com/ErikDervishi03/CVE-2026-31024

obivan at 2026-05-21T20:54:31.608Z ##

How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102) securelist.com/exiftool-compro

##

obivan@infosec.exchange at 2026-05-21T20:54:31.000Z ##

How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102) securelist.com/exiftool-compro

##

threatcodex@infosec.exchange at 2026-05-21T15:30:46.000Z ##

How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)
#CVE_2026_3102
securelist.com/exiftool-compro

##

AAKL@infosec.exchange at 2026-05-20T17:46:35.000Z ##

New.

Kaspersky: How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102) securelist.com/exiftool-compro @Kaspersky #infosec #Mac #threatresearch

##

bontchev@infosec.exchange at 2026-05-20T12:13:27.000Z ##

Lulz. An RCE from an image? Image metadata, to be precise? In ExifTool, which is supposed to display the image metadata. Only on Macs, though.

"How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)":

securelist.com/exiftool-compro

##

oversecurity@mastodon.social at 2026-05-20T09:20:45.000Z ##

How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)

We explain how a flaw in ExifTool allows attackers to compromise macOS systems via a malicious image (CVE-2026-3102).

🔗️ [Securelist] link.is.it/Hr78fH

##

CVE-2026-26980
(9.4 CRITICAL)

EPSS: 54.31%

updated 2026-02-20T19:22:53.637000

4 posts

Ghost is a Node.js content management system. Versions 3.24.0 through 6.19.0 allow unauthenticated attackers to perform arbitrary reads from the database. This issue has been fixed in version 6.19.1.

3 repos

https://github.com/vognik/CVE-2026-26980

https://github.com/dinosn/ghost-cve-2026-26980

https://github.com/Kulik-Labs-Development/Ghost-CMS-Code-Injection-Audit-CVE-2026-26980

VirusBulletin at 2026-05-22T09:08:47.826Z ##

XLab researchers show how threat actors exploited CVE-2026-26980 to compromise Ghost CMS, causing numerous websites to become accomplices in ClickFix attacks. blog.xlab.qianxin.com/ghost-cm

##

VirusBulletin@infosec.exchange at 2026-05-22T09:08:47.000Z ##

XLab researchers show how threat actors exploited CVE-2026-26980 to compromise Ghost CMS, causing numerous websites to become accomplices in ClickFix attacks. blog.xlab.qianxin.com/ghost-cm

##

thenexusofprivacy@infosec.exchange at 2026-05-21T18:54:23.000Z ##

Thanks again! Yeah the read access from the SQL injection allowed exfiltration of admin API keys at which point game over. I don't see any malicious themes or changes to the theme file ... instead it seems like it was the vulnerability descried in blog.xlab.qianxin.com/ghost-cm (which I don't think had been published yet when I was doing the cleanup, or at least I didn't find it in my searching). Basically the hack edited every posts to put in a script in the "codeinjection_footer" field that brings the payload in from a malware site.

There aren't any obvious signs of LPE exploitation but who knows ... another good argument for spinning up a new instance.

@mildsunrise @JadedBlueEyes @thenexusofprivacy@gotosocial.thenexus.today

##

campuscodi@mastodon.social at 2026-05-21T18:06:48.000Z ##

A hacking campaign is planting FakeCaptcha pages and malware on websites built with the Ghost CMS.

The attacks began this month and are exploiting a vulnerability disclosed in February

blog.xlab.qianxin.com/ghost-cm

##

CVE-2024-9643
(9.8 CRITICAL)

EPSS: 19.09%

updated 2025-09-19T19:33:43.980000

1 posts

The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.

beyondmachines1@infosec.exchange at 2026-05-21T10:01:07.000Z ##

Mass Exploitation of Four-Faith Industrial Routers for Botnet Expansion

Threat actors are conducting mass exploitation of a critical hard-coded credential flaw (CVE-2024-9643) in Four-Faith industrial routers to build botnets and gain footholds in corporate networks.

**Make sure all your Four-Faith industrial routers are isolated from the internet and only accessible from trusted networks. Then immediately update to the latest firmware to patch CVE-2024-9643, and disable the web management interface on any public-facing ports.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2024-45337
(9.1 CRITICAL)

EPSS: 30.30%

updated 2025-01-31T15:30:44

1 posts

Applications and libraries which misuse the ServerConfig.PublicKeyCallback callback may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before p

4 repos

https://github.com/NHAS/VULNERABLE-CVE-2024-45337

https://github.com/peace-maker/CVE-2024-45337

https://github.com/NHAS/CVE-2024-45337-POC

https://github.com/Backline-playground/gogs

EUVD_Bot@mastodon.social at 2026-05-22T04:14:07.000Z ##

🚨 EUVD-2026-31398

📊 Score: n/a
📦 Product: golang.org/x/crypto/ssh
🏢 Vendor: golang.org/x/crypto
📅 Updated: 2026-05-22

📝 Previously, CVE-2024-45337 fixed an authorization bypass for misused ssh server configurations; if any other type of callback is passed other than public key, then the source-address validation would be skipped.

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2010-5139(CVSS UNKNOWN)

EPSS: 0.32%

updated 2023-02-01T05:07:57

1 posts

Integer overflow in wxBitcoin and bitcoind before 0.3.11 allows remote attackers to bypass intended economic restrictions and create many bitcoins via a crafted Bitcoin transaction.

sayzard@mastodon.sayzard.org at 2026-05-22T04:43:17.000Z ##

Bitcoin Value Overflow Incident (CVE-2010-5139)

2010년 8월 비트코인 네트워크에서 정수 오버플로우 버그로 인해 1840억 BTC가 생성되는 사건이 발생했다. 이 버그는 트랜잭션 검증 코드의 64비트 정수 오버플로우로 인해 발생했으며, 5시간 만에 사토시 나카모토가 수정한 하드포크를 통해 해결되었다. 이 사건은 비트코인의 2100만 개 공급 한도가 코드와 노드 운영자의 합의에 의해 유지된다는 점을 보여주는 중요한 사례로, 오픈소스와 커뮤니티의 신속한 대응이 시스템의 신뢰성을 지켰음을 입증한다. 또한, 이후 2014년에는 또 다른 공급 무한 버그(BIP 42)가 발견되어 소프트포크로 조용히 수정되었다. 이 사례는 '검증하라,...

learnbitcoin.com/rabbit-hole/i

##

CVE-2021-25740
(3.1 LOW)

EPSS: 0.51%

updated 2023-02-01T05:06:20

1 posts

A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.

raesene@infosec.exchange at 2026-05-21T10:35:07.000Z ##

Here's the last one in our series of blogs on the unpatchable vulnerabilities of #Kubernetes, with CVE-2021-25740

securitylabs.datadoghq.com/art

##

CVE-2026-25606
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2026-05-22T10:30:28.428Z ##

STER (Centralny Instytut Ochrony Pracy) faces a HIGH severity SQL Injection (CVE-2026-25606, CVSS 8.7). Authenticated attackers can access sensitive data via search filters. Patch by upgrading to v9.5. 🛡️ radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-22T10:30:28.000Z ##

STER (Centralny Instytut Ochrony Pracy) faces a HIGH severity SQL Injection (CVE-2026-25606, CVSS 8.7). Authenticated attackers can access sensitive data via search filters. Patch by upgrading to v9.5. 🛡️ radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Vuln #Infosec

##

CVE-2026-9011
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-22T09:59:51.000Z ##

🟠 CVE-2026-9011 - High (7.5)

The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.1.65. This is due to the plugin not properly verifying that a user is authorized to perfor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T09:59:51.000Z ##

🟠 CVE-2026-9011 - High (7.5)

The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.1.65. This is due to the plugin not properly verifying that a user is authorized to perfor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47243
(0 None)

EPSS: 0.00%

2 posts

N/A

nyanbinary@infosec.exchange at 2026-05-21T14:52:13.000Z ##

... they also managed to call dibs on CVE-2026-0001 :party_porg2:

##

CVE-2026-47746
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

CVE-2026-46712
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

CVE-2026-46714
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

CVE-2026-48115
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

CVE-2026-46713
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

hackmag@infosec.exchange at 2026-05-20T12:30:02.000Z ##

⚪️ 18-year-old vulnerability in NGINX leads to remote code execution

🗨️ Researchers from DepthFirst AI have discovered a critical vulnerability in NGINX, CVE-2026-42945, which scored 9.2 on the CVSS scale. The issue affects all NGINX versions from 0.6.27 to 1.30.0 and has been present in the code for about 18 years.…

🔗 hackmag.com/news/cve-2026-4294

#news

##

Visit counter For Websites