## Updated at UTC 2026-05-03T04:37:34.805415

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-31431 7.8 2.25% 86 100 2026-05-03T03:30:30 In the Linux kernel, the following vulnerability has been resolved: crypto: alg
CVE-2026-7675 8.8 0.00% 2 0 2026-05-03T03:16:15.613000 A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to
CVE-2026-7674 8.8 0.00% 4 0 2026-05-03T02:17:12.993000 A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. T
CVE-2026-2554 8.1 0.00% 4 2 2026-05-02T14:16:17.707000 The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Lis
CVE-2026-4062 7.5 0.07% 2 0 2026-05-02T12:31:28 The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection vi
CVE-2026-4061 7.5 0.07% 2 0 2026-05-02T12:31:28 The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection vi
CVE-2026-7489 8.8 0.08% 2 0 2026-05-02T12:31:28 CTMS developed by Sunnet has a SQL Injection vulnerability, allowing authenticat
CVE-2026-7491 8.1 0.04% 4 0 2026-05-02T12:31:22 School App developed by Zyosoft has an Insecure Direct Object Reference vulnerab
CVE-2026-6320 7.5 0.10% 4 0 2026-05-02T12:16:16.750000 The Salon Booking System – Free Version plugin for WordPress is vulnerable to Ar
CVE-2026-4060 7.5 0.07% 2 0 2026-05-02T12:16:15.430000 The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection vi
CVE-2026-5324 7.2 0.09% 2 0 2026-05-02T09:31:21 The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated S
CVE-2026-7649 7.5 0.08% 4 0 2026-05-02T09:31:21 The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profi
CVE-2026-2052 8.8 0.06% 2 0 2026-05-02T09:31:21 The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Clas
CVE-2026-7607 8.8 0.04% 2 0 2026-05-02T09:31:21 A security vulnerability has been detected in TRENDnet TEW-821DAP 1.12B01. Impac
CVE-2026-7647 8.1 0.01% 2 0 2026-05-02T06:30:30 The Profile Builder Pro plugin for WordPress is vulnerable to PHP Object Injecti
CVE-2026-4882 9.8 0.06% 4 0 2026-05-02T06:30:30 The User Registration Advanced Fields plugin for WordPress is vulnerable to arbi
CVE-2026-7641 8.8 0.02% 2 0 2026-05-02T06:30:30 The Import and export users and customers plugin for WordPress is vulnerable to
CVE-2026-6963 8.8 0.02% 2 0 2026-05-02T06:30:30 The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access du
CVE-2026-7458 9.8 0.07% 4 0 2026-05-02T05:16:01.420000 The User Verification by PickPlugins plugin for WordPress is vulnerable to authe
CVE-2026-43824 7.7 0.01% 5 0 2026-05-02T02:16:00.747000 In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows rea
CVE-2026-42786 0 0.06% 2 0 2026-05-02T02:16:00.467000 Allocation of Resources Without Limits or Throttling vulnerability in mtrudel ba
CVE-2026-39804 0 0.04% 2 0 2026-05-02T02:16:00.013000 Allocation of Resources Without Limits or Throttling vulnerability in mtrudel ba
CVE-2026-37530 7.5 0.01% 2 0 2026-05-01T21:32:27 AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in t
CVE-2026-37538 7.5 0.04% 2 0 2026-05-01T21:32:27 Buffer overflow vulnerability in socketcand 0.4.2 in file socketcand.c in functi
CVE-2026-37534 9.8 0.01% 2 0 2026-05-01T21:32:27 Integer underflow vulnerability in Open-SAE-J1939 thru commit b6caf884df46435e53
CVE-2026-42485 7.5 0.04% 2 0 2026-05-01T21:32:27 AGL agl-service-can-low-level contains a stack buffer overflow in the uds-c libr
CVE-2025-63548 7.5 0.11% 2 0 2026-05-01T21:32:27 An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to ca
CVE-2026-37457 7.5 0.04% 2 0 2026-05-01T21:32:27 An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode()
CVE-2026-42473 9.8 0.04% 3 0 2026-05-01T21:32:22 Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The se
CVE-2026-22165 8.1 0.01% 2 0 2026-05-01T21:32:22 A web page that contains unusual WebGPU content loaded into the GPU GLES render
CVE-2026-30363 8.4 0.01% 2 0 2026-05-01T21:31:26 flipperzero-firmware commit ad2a80 was discovered to contain a stack overflow in
CVE-2026-42482 9.8 0.07% 2 0 2026-05-01T21:31:20 A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper()
CVE-2026-37531 9.8 0.11% 2 0 2026-05-01T21:31:20 AGL app-framework-main thru 17.1.12 contains a Zip Slip path traversal vulnerabi
CVE-2026-37537 8.1 0.01% 2 0 2026-05-01T21:31:20 collin80/Open-SAE-J1939 thru commit 744024d4306bc387857dfce439558336806acb06 (20
CVE-2026-5405 7.8 0.01% 1 0 2026-05-01T21:31:20 RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 all
CVE-2026-37552 8.4 0.10% 2 0 2026-05-01T20:16:23.680000 Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sy
CVE-2026-37536 8.8 0.01% 2 0 2026-05-01T20:16:23.323000 miaofng/uds-c commit e506334e270d77b20c0bc259ac6c7d8c9b702b7a (2016-10-05) conta
CVE-2026-37526 7.8 0.02% 2 0 2026-05-01T20:16:22.500000 AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process
CVE-2026-37525 7.8 0.01% 2 0 2026-05-01T20:16:22.353000 AGL app-framework-binder (afb-daemon) through v19.90.0 contains a privilege esca
CVE-2026-22167 7.8 0.01% 2 0 2026-05-01T20:16:21.470000 Software installed and run as a non-privileged user may conduct improper GPU sys
CVE-2026-5403 7.8 0.01% 1 0 2026-05-01T19:18:04.737000 SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of
CVE-2026-42484 9.8 0.07% 2 0 2026-05-01T19:16:33 A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashca
CVE-2026-42478 7.5 0.03% 2 0 2026-05-01T19:16:32.093000 An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 pars
CVE-2026-42472 9.8 0.04% 3 0 2026-05-01T19:16:31.153000 Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The se
CVE-2026-42471 8.1 0.04% 2 0 2026-05-01T19:16:30.990000 Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sy
CVE-2025-63547 7.5 0.09% 2 0 2026-05-01T19:16:29.050000 An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to ca
CVE-2025-52347 7.8 0.02% 2 0 2026-05-01T19:16:28.113000 An issue in the component DirectIo64.sys of PassMark BurnInTest v11.0 Build 1011
CVE-2026-42483 9.8 0.08% 3 0 2026-05-01T18:32:32 A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allow
CVE-2026-42403 7.5 0.03% 1 0 2026-05-01T18:32:32 Apache Neethi does not properly detect circular references in policy definitions
CVE-2026-42402 7.5 0.03% 1 0 2026-05-01T18:32:31 Apache Neethi is vulnerable to a Denial of Service attack through algorithmic co
CVE-2026-37539 9.8 0.25% 2 0 2026-05-01T18:31:36 Buffer overflow vulnerability in cannelloni v2.0.0 in CAN frame parsing in parse
CVE-2026-37541 10.0 0.19% 2 0 2026-05-01T18:31:36 Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.00
CVE-2026-42469 8.6 0.14% 2 0 2026-05-01T18:31:36 Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.00
CVE-2026-42468 7.5 0.12% 2 0 2026-05-01T18:31:36 Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.00
CVE-2026-22166 9.6 0.01% 2 0 2026-05-01T18:31:31 A web page that contains unusual WebGPU content loaded into the GPU GLES render
CVE-2026-42467 7.5 0.04% 2 0 2026-05-01T18:16:15.497000 An issue was discovered in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf9
CVE-2026-37540 8.4 0.01% 2 0 2026-05-01T18:16:15.047000 OpenAMP v2025.10.0 ELF loader contains an integer overflow vulnerability in firm
CVE-2026-43003 8.0 0.01% 1 0 2026-05-01T15:33:10.820000 An issue was discovered in OpenStack ironic-python-agent 1.0.0 through 11.5.0. I
CVE-2026-6389 8.8 0.01% 1 0 2026-05-01T15:27:15.287000 IBM Turbonomic prometurbo agent 8.16.0 through 8.17.6 IBM Turbonomic Application
CVE-2026-7538 9.8 0.89% 2 0 2026-05-01T15:26:24.553000 A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. This iss
CVE-2026-7513 8.8 0.04% 1 0 2026-05-01T15:26:24.553000 A vulnerability has been found in UTT HiPER 1200GW up to 2.5.3-170306. The impac
CVE-2026-3772 8.8 0.02% 2 0 2026-05-01T12:30:36 The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery i
CVE-2026-42779 9.8 0.14% 4 1 2026-05-01T12:30:35 The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here
CVE-2026-7567 9.8 0.07% 1 1 2026-05-01T12:30:30 The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass
CVE-2026-42778 9.8 0.14% 3 0 2026-05-01T12:30:25 The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here
CVE-2026-43001 7.9 0.01% 1 0 2026-05-01T09:30:31 An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credential
CVE-2026-7584 7.8 0.02% 2 0 2026-05-01T09:30:31 The LabOne Q serialization framework uses a class-loading mechanism (import_cls)
CVE-2026-42994 None 0.05% 1 0 2026-05-01T06:30:24 Bitwarden CLI 2026.4.0 from 2026-04-22T21:57Z to 2026-04-22T23:30Z, when obtaine
CVE-2026-7548 8.8 1.16% 2 0 2026-05-01T03:31:30 A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This aff
CVE-2026-7546 9.8 0.08% 2 0 2026-05-01T03:31:30 A security vulnerability has been detected in Totolink NR1800X 9.1.0u.6279_B2021
CVE-2026-7512 8.8 0.04% 1 0 2026-05-01T00:31:36 A flaw has been found in UTT HiPER 1200GW up to 2.5.3-1703. The affected element
CVE-2026-6543 8.8 0.04% 1 0 2026-05-01T00:31:31 IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute
CVE-2026-7551 8.8 0.22% 1 0 2026-05-01T00:31:31 HKUDS OpenHarness contains a remote code execution vulnerability in the /bridge
CVE-2026-4503 7.5 0.04% 1 0 2026-04-30T21:30:44 IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow could allow an unauthenticated
CVE-2026-41940 9.8 28.36% 20 41 template 2026-04-30T19:51:26.270000 cPanel and WHM versions after 11.40 contain an authentication bypass vulnerabili
CVE-2026-34159 9.8 0.49% 2 1 2026-04-30T19:18:32.230000 llama.cpp is an inference of several LLM models in C/C++. Prior to version b8492
CVE-2026-4670 9.8 0.07% 1 0 2026-04-30T18:30:38 Authentication bypass by primary weakness vulnerability in Progress Software MOV
CVE-2026-7333 9.6 0.07% 1 0 2026-04-30T18:30:10.083000 Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote
CVE-2026-7337 8.8 0.03% 1 0 2026-04-30T18:28:40.237000 Type Confusion in V8 in Google Chrome prior to 147.0.7727.138 allowed a remote a
CVE-2026-7338 7.5 0.00% 1 0 2026-04-30T18:28:23.367000 Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attac
CVE-2026-7346 8.1 0.03% 1 0 2026-04-30T18:28:04.463000 Inappropriate implementation in Tint in Google Chrome prior to 147.0.7727.138 al
CVE-2026-7339 8.8 0.06% 1 0 2026-04-30T18:26:41.267000 Heap buffer overflow in WebRTC in Google Chrome prior to 147.0.7727.138 allowed
CVE-2026-7352 8.3 0.02% 1 0 2026-04-30T16:40:08.557000 Use after free in Media in Google Chrome on Android prior to 147.0.7727.138 allo
CVE-2026-7354 8.8 0.02% 1 0 2026-04-30T16:38:18.927000 Out of bounds read and write in Angle in Google Chrome prior to 147.0.7727.138 a
CVE-2026-7356 8.8 0.08% 1 0 2026-04-30T16:38:03.603000 Use after free in Navigation in Google Chrome prior to 147.0.7727.138 allowed a
CVE-2026-7357 7.5 0.02% 1 0 2026-04-30T16:37:58.563000 Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote
CVE-2026-7343 7.5 0.07% 1 0 2026-04-30T16:36:22.073000 Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allo
CVE-2026-7345 8.3 0.09% 2 0 2026-04-30T16:36:06.133000 Insufficient validation of untrusted input in Feedback in Google Chrome prior to
CVE-2026-42512 7.3 0.09% 2 0 2026-04-30T15:31:41 As dhclient is building an environment to pass to dhclient-script, it may need t
CVE-2026-42511 7.3 0.04% 2 0 2026-04-30T15:31:40 The BOOTP file field is written to the lease file without escaping embedded doub
CVE-2026-42524 8.0 0.04% 1 0 2026-04-30T15:11:12.703000 Jenkins HTML Publisher Plugin 427 and earlier does not escape job name and URL i
CVE-2026-7446 7.3 0.85% 2 0 2026-04-30T14:52:54.847000 A vulnerability was detected in VetCoders mcp-server-semgrep 1.0.0. This affects
CVE-2026-7416 7.3 0.19% 2 0 2026-04-30T14:52:54.847000 A vulnerability was found in PolarVista xcode-mcp-server 1.0.0. This issue affec
CVE-2026-7359 8.8 0.02% 1 0 2026-04-29T21:31:26 Use after free in ANGLE in Google Chrome prior to 147.0.7727.138 allowed a remot
CVE-2026-7358 8.8 0.03% 1 0 2026-04-29T21:31:26 Use after free in Animation in Google Chrome prior to 147.0.7727.138 allowed a r
CVE-2026-35029 8.8 13.30% 1 0 template 2026-04-29T20:16:30.070000 LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) fo
CVE-2026-41635 9.8 0.10% 1 0 2026-04-29T19:08:21.840000 Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them
CVE-2026-7363 8.8 0.03% 1 0 2026-04-29T15:31:46 Use after free in Canvas in Google Chrome on Linux, ChromeOS prior to 147.0.7727
CVE-2026-7353 8.3 0.02% 1 0 2026-04-29T15:31:45 Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.138 allowed a
CVE-2026-7349 7.5 0.00% 1 0 2026-04-29T15:31:45 Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attac
CVE-2026-7361 8.8 0.02% 2 0 2026-04-29T15:31:45 Use after free in iOS in Google Chrome prior to 147.0.7727.138 allowed a remote
CVE-2026-40560 7.5 0.03% 1 0 2026-04-29T15:31:45 Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improp
CVE-2026-7344 8.8 0.02% 1 0 2026-04-29T15:31:44 Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727.
CVE-2026-7342 8.8 0.07% 1 0 2026-04-29T15:31:44 Use after free in WebView in Google Chrome on Android prior to 147.0.7727.138 al
CVE-2026-7341 8.8 0.02% 1 0 2026-04-29T15:31:44 Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remo
CVE-2026-7336 8.8 0.02% 1 0 2026-04-29T15:31:44 Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remo
CVE-2026-7335 8.8 0.08% 1 0 2026-04-29T15:31:44 Use after free in media in Google Chrome prior to 147.0.7727.138 allowed a remot
CVE-2026-7350 8.3 0.02% 1 0 2026-04-29T15:31:44 Use after free in WebMIDI in Google Chrome prior to 147.0.7727.138 allowed a rem
CVE-2026-7347 8.1 0.05% 2 0 2026-04-29T15:31:44 Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a
CVE-2026-7348 8.8 0.03% 1 0 2026-04-29T15:31:44 Use after free in Codecs in Google Chrome prior to 147.0.7727.138 allowed a remo
CVE-2026-7355 8.8 0.08% 1 0 2026-04-29T15:31:44 Use after free in Media in Google Chrome prior to 147.0.7727.138 allowed a remot
CVE-2026-42523 9.0 0.04% 1 0 2026-04-29T15:30:48 Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job UR
CVE-2026-41220 7.8 0.01% 1 0 2026-04-29T15:30:40 Local privilege escalation due to improper input validation. The following produ
CVE-2026-5140 8.8 0.05% 1 0 2026-04-29T15:30:39 Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TU
CVE-2026-42520 7.5 0.34% 1 0 2026-04-29T15:30:39 Jenkins Credentials Binding Plugin 719.v80e905ef14eb_ and earlier does not sanit
CVE-2026-42646 7.6 0.03% 1 0 2026-04-29T12:33:14 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-3854 8.8 0.30% 7 4 2026-04-28T21:35:58 An improper neutralization of special elements vulnerability was identified in G
CVE-2026-38834 7.3 13.21% 1 0 2026-04-27T16:44:38.997000 Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerabili
CVE-2026-39987 9.8 56.09% 1 7 template 2026-04-27T16:30:09 ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal
CVE-2026-41409 9.8 0.14% 1 0 2026-04-27T12:30:39 The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incom
CVE-2025-29635 8.8 69.69% 1 0 2026-04-24T18:30:36 A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an
CVE-2026-40912 None 0.06% 2 0 2026-04-24T16:37:54 ## Summary There is a high severity authentication bypass vulnerability in Trae
CVE-2026-39858 None 0.05% 2 0 2026-04-24T16:33:44 ## Summary There is a high severity authentication bypass vulnerability in Trae
CVE-2026-35051 None 0.01% 2 0 2026-04-24T16:31:25 ## Summary There is a high-severity authentication bypass vulnerability in Trae
CVE-2026-39808 9.8 13.10% 1 4 template 2026-04-22T15:32:37 A improper neutralization of special elements used in an os command ('os command
CVE-2026-4747 8.8 0.09% 2 2 2026-04-20T13:47:31.163000 Each RPCSEC_GSS data packet is validated by a routine which checks a signature i
CVE-2026-2262 7.5 29.11% 1 0 template 2026-04-18T00:31:10 The Easy Appointments plugin for WordPress is vulnerable to Sensitive Informatio
CVE-2026-4659 7.5 0.04% 1 0 2026-04-17T09:31:18 The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbit
CVE-2026-34197 8.8 66.67% 1 9 template 2026-04-16T21:49:17 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-3396 7.5 16.99% 1 0 template 2026-04-08T12:31:36 WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL I
CVE-2026-35616 9.8 41.37% 1 7 template 2026-04-06T18:12:57.863000 A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through
CVE-2026-29014 9.8 17.07% 1 0 template 2026-04-03T18:32:15 MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injec
CVE-2026-2699 9.8 23.78% 1 2 template 2026-04-02T15:31:40 Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica
CVE-2025-55182 10.0 82.01% 2 100 template 2025-12-09T16:53:25 ### Impact There is an unauthenticated remote code execution vulnerability in R
CVE-2023-4966 9.4 94.35% 2 14 template 2025-10-24T13:42:55.550000 Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when con
CVE-2024-52046 9.8 80.14% 1 0 2025-02-12T10:15:13.573000 The ObjectSerializationDecoder in Apache MINA uses Java’s native deserialization
CVE-2026-41651 0 0.20% 1 8 N/A
CVE-2026-3141 0 0.00% 4 1 N/A

CVE-2026-31431
(7.8 HIGH)

EPSS: 2.25%

updated 2026-05-03T03:30:30

86 posts

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just

100 repos

https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail

https://github.com/SeanRickerd/cve-2026-31431

https://github.com/attaattaatta/CVE-2026-31431

https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431

https://github.com/diemoeve/copyfail-rs

https://github.com/eximiait/CVE-2026-31431

https://github.com/mfloresdacunha/CVE-2026-31431

https://github.com/theori-io/copy-fail-CVE-2026-31431

https://github.com/qi4L/CVE-2026-31431-Container-Escape

https://github.com/yiyihuohuo/CVE-2026-31431

https://github.com/cozystack/copy-fail-blocker

https://github.com/haydenjames/CVE-2026-31431-check

https://github.com/abdullaabdullazade/CVE-2026-31431

https://github.com/Alfredooe/CVE-2026-31431

https://github.com/gubaiovo/CVE-2026-31431

https://github.com/kadir/copy-fail-CVE-2026-31431-IOC

https://github.com/ben-slates/CVE-2026-31431-Exploit

https://github.com/suominen/CVE-2026-31431

https://github.com/moaaz-mostafa123/CVE-2026-31431

https://github.com/abhishekhargan/CVE-2026-31431

https://github.com/Dabbleam/CVE-2026-31431-mitigation

https://github.com/FrosterDL/CVE-2026-31431

https://github.com/wesmar/CVE-2026-31431

https://github.com/slauger/CVE-2026-31431

https://github.com/rvizx/CVE-2026-31431

https://github.com/badsectorlabs/copyfail-go

https://github.com/malwarekid/CVE-2026-31431

https://github.com/glask1d/CVE-2026-31431-PoC

https://github.com/poyea/CVE-2026-31431.c

https://github.com/rippsec/cve-2026-31431

https://github.com/JuanBindez/CVE-2026-31431

https://github.com/sammwyy/copyfail-rs

https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite

https://github.com/adysec/cve-2026-31431

https://github.com/rootsecdev/cve_2026_31431

https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE

https://github.com/OmerAti/almalinux-fix-cve-2026-31431

https://github.com/twowb/CVE-2026-31431-

https://github.com/dorianhhuc/CVE-2026-31431

https://github.com/atgreen/block-copyfail

https://github.com/ryan2929/CVE-2026-31431

https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs

https://github.com/leelong2020/cve-2026-31431

https://github.com/pedromizz/copy-fail

https://github.com/0xac1dc0de/CVE-2026-31431

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC

https://github.com/XsanFlip/CVE-2026-31431-Patch

https://github.com/freelabz/CVE-2026-31431

https://github.com/ruattd/cve-2026-31431

https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection

https://github.com/mishl-dev/CVE_2026_31431

https://github.com/Boos4721/copyfail-rs

https://github.com/TheMursalin/CVE-2026-31431

https://github.com/ExploitEoom/CVE-2026-31431

https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431

https://github.com/sngrotesque/CVE-2026-31431

https://github.com/professional-slacker/alg_check

https://github.com/G01d3nW01f/CVE-2026-31431

https://github.com/lonelyor/CVE-2026-31431-exp

https://github.com/offsecguy/CVE-2026-31431

https://github.com/Linux-zs/cve-2026-31431-mitigation

https://github.com/desultory/CVE-2026-31431

https://github.com/rfxn/copyfail

https://github.com/deckhouse/d8-copy-fail-mitigation

https://github.com/0xShe/CVE-2026-31431

https://github.com/Naimadx123/cve_2026_31431

https://github.com/nisec-eric/cve-2026-31431

https://github.com/H1d3r/copy-fail_LPE_Interactive

https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431

https://github.com/AliHzSec/CVE-2026-31431

https://github.com/tgies/copy-fail-c

https://github.com/Xerxes-2/CVE-2026-31431-rs

https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431

https://github.com/yxdm02/CVE-2026-31431

https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431

https://github.com/b5null/CVE-2026-31431-C

https://github.com/Gr-1m/CVE-2026-31431

https://github.com/bigwario/copy-fail-CVE-2026-31431-C

https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431

https://github.com/someCorp/copyFail-CVE-2026-31431-workaround-bash

https://github.com/websecnl/CVE-2026-31431

https://github.com/sec17br/CVE-2026-31431-Copy-Fail

https://github.com/ashok523/cve-2026-31431

https://github.com/RoflSecurity/copy_fail

https://github.com/wgnet/wg.copyfail.patch

https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit

https://github.com/ErdemOzgen/copy-fail-cve-2026-31431

https://github.com/aestechno/cve-2026-31431-ansible

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC

https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit

https://github.com/xd20111/CVE-2026-31431

https://github.com/HulnotHutu/CVE-2026-31431

https://github.com/0xBlackash/CVE-2026-31431

https://github.com/ZephrFish/CopyFail-CVE-2026-31431

https://github.com/povzayd/CVE-2026-31431

https://github.com/luotian2/CVE-2026-31431

https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation

https://github.com/MartinPham/copy-fail-CVE-2026-31431-php

https://github.com/wuwu001/CVE-2026-31431-exploit

https://github.com/pascal-gujer/CVE-2026-31431

cktodon@mas.to at 2026-05-02T19:00:04.000Z ##

Copy Fail: la #vulnerabilidad de #Linux que lleva 9 años escondida y permite obtener root con un script de 732 bytes

wwwhatsnew.com/2026/05/02/copy

##

mastokukei@social.josko.org at 2026-05-02T18:01:56.000Z ##

kernel vulnerability (CVE-2026-31431)**: "Copy Fail" exploit granting root access.
- **PostgreSQL updates**: Releases of PgQue v0.1, pgexporter 0.8, pgmoneta 0.21, and PostgreSQL 19 feature freeze.
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), migrations to alternatives like Codeberg and Radicle. [2/2]

##

mastokukei@social.josko.org at 2026-05-02T18:01:46.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #technologyAtKukei masto.kukei.eu/browse/technolo category:
Here are the top 6 most discussed topics from the aggregated Mastodon posts:

1. **AI and Large Language Models (LLMs)**
- AI tools like Claude, ChatGPT, and GitHub Copilot
- AI-generated content, ethics, and controversies
- AI coding agents and their impact on software development

2. **Linux Kernel Vulnerability (CVE-2026-31431 - "Copy [1/3]

##

vitobotta@mastodon.social at 2026-05-02T17:40:21.000Z ##

Nine years in the Linux kernel and nobody noticed. "Copy Fail" (CVE-2026-31431) lets any local user grab root in seconds. CISA just added it to KEV. Working exploits for Ubuntu, Amazon Linux, RHEL, SUSE. Patch. - cisa.gov/news-events/alerts/20

##

Shibanarchiste@piaille.fr at 2026-05-02T15:34:29.000Z ##

« Mettez à jour le paquet du noyau de votre distribution avec une version incluant le #commit a664bf3d603d de la branche principale », expliquent les chercheurs, « la plupart des principales distributions proposent désormais ce correctif », comme #Debian (security-tracker.debian.org/tr) (Forky et Sid), #Ubuntu (ubuntu.com/security/CVE-2026-3), par exemple mais la mise en place est encore en cours chez #RedHat (access.redhat.com/security/cve) et #Suse.

Fin de l'article.

10/

#Patch #Linux #Ubuntu #CopyFail #Root #Cybersecurity #Docker #Kubernetes

##

Shibanarchiste@piaille.fr at 2026-05-02T15:29:46.000Z ##

En utilisant un script Python (github.com/theori-io/copy-fail) très court (732 octets) qui ne fait appel qu’à des bibliothèques standard et ciblant le page cache du noyau, il est possible d’accéder au binaire qui permet d’être superutilisateur : /usr/bin/su. La modification se fait en mémoire, pas directement sur le périphérique de stockage.

7/

##

Shibanarchiste@piaille.fr at 2026-05-02T15:24:29.000Z ##

C’est l’entreprise de sécurité Xint.io qui a révélé (xint.io/blog/copy-fail-linux-d), ce mercredi 29 avril, cette vulnérabilité (CVE-2026-31431, d’une sévérité élevée de 7,8/10) permettant une élévation des privilèges en local.

Le score n’est « que » de 7,8 car le vecteur d’attaque est local (AV:L) : il faut déjà avoir un accès local sur la machine, ici un compte utilisateur. La même avec une attaque depuis le réseau (AV:N) se serait approchée de 10.

2/

##

cyclone at 2026-05-02T15:20:23.305Z ##

Copy Fail (CVE-2026-31431) is a Linux kernel LPE that gives root access on every major linux distro.

All that is needed is local shell access and a few lines of python.

forum.hashpwn.net/post/12727

##

990000@mstdn.social at 2026-05-02T15:03:14.000Z ##

I can't tell how dangerous Linux CVE-2026-31431 is, given it's just "local privilege escalation," but updating all my web servers anyway I guess 🤷🏻‍♂️

#Linux #Ubuntu

##

jschauma@mstdn.social at 2026-05-02T13:45:06.000Z ##

Rocky - kb.ciq.com/article/rocky-linux
(couldn't find an official link)

Slackware - nothing on slackware.com/security/list.ph

Ubuntu - ubuntu.com/security/CVE-2026-3
all around very unclear

#copyfail - ¯\_(ツ)_/¯

##

jschauma@mstdn.social at 2026-05-02T13:44:37.000Z ##

Fedora - bugzilla.redhat.com/show_bug.c
"For any Fedora users finding a link here: this was fixed in kernel 6.19.12, and all current Fedora branches are already at or past that version."

Gentoo - bugs.gentoo.org/973385

Kali - should have it by tracking Debian security

Suse / OpenSuse etc. - suse.com/security/cve/CVE-2026

RedHat - access.redhat.com/security/cve
relevant for various downstreams

#copyfail

##

jschauma@mstdn.social at 2026-05-02T13:44:02.000Z ##

Alma - almalinux.org/blog/2026-05-01-
fixed

Alpine - security.alpinelinux.org/vuln/
fixed (per fosstodon.org/@alpinelinux/116)

Arch - security.archlinux.org/CVE-202
security.archlinux.org/AVG-2908
fixed in linux 6.19.12-1

Centos - pending RedHat: bugzilla.redhat.com/show_bug.c
?

Debian - security-tracker.debian.org/tr
13 (Trixie), 12 (bookworm), 11 (bullseye) all still vulnerable, but fixed in security releases

#copyfail

##

jschauma@mstdn.social at 2026-05-02T13:43:24.000Z ##

Le sigh. Every time we go around and have to do this again and manually figure out wtf each of the ten thousand linux distributions provides their security updates and current status.

Spending my Saturday morning searching for CVE-2026-31431 and "copyfail" patch status is just 👍.

Anyway, here's what I have so far:

##

jpmens@mastodon.social at 2026-05-02T13:00:37.000Z ##

@bortzmeyer this does not answer your question but was written by a Redhatter to address the situation with RHEL / Fedora

jan.wildeboer.net/2026/05/PSA-

##

technadu at 2026-05-02T09:04:00.511Z ##

CVE-2026-31431 added to KEV.
Linux kernel vuln, active exploitation confirmed.
Patch ASAP.

Source: cisa.gov/news-events/alerts/20

💬 Thoughts?
Follow @technadu

##

mastokukei@social.josko.org at 2026-05-02T09:01:53.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), migrations to alternatives like Codeberg and Radicle.
- **PostgreSQL updates**: Releases of PgQue v0.1, pgexporter 0.8, pgmoneta 0.21, and discussions on PostgreSQL 19 feature freeze.
- **Linux kernel vulnerability (CVE-2026-31431)**: "Copy [1/2]

##

mastokukei@social.josko.org at 2026-05-02T09:01:43.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #technologyAtKukei masto.kukei.eu/browse/technolo category:
- **AI coding tools and controversies**: Claude Code deleting databases, GitHub Copilot’s usage-based billing, AI-generated code ownership debates, and Zig’s anti-AI contribution policy.
- **Linux kernel vulnerability (CVE-2026-31431)**: "Copy Fail" exploit granting root access; affects major distros since 2017.
- **Arduino/ESP32 libraries**: New [1/2]

##

jwildeboer@social.wildeboer.net at 2026-05-02T08:35:28.000Z ##

ADDENDUM: Now also a blog post at jan.wildeboer.net/2026/05/PSA-

##

camille@mastodon.libre-entreprise.com at 2026-05-02T07:53:22.000Z ##

Ça y est le noyau #Linux pour #Debian 12 est sorti avec le correctif pour #CopyFail :

security-tracker.debian.org/tr

##

jwildeboer@social.wildeboer.net at 2026-05-02T07:36:35.000Z ##

Some more details from our CVE page on CVE-2026-31431 at access.redhat.com/security/cve For more infos also on availability of updates see nvd.nist.gov/vuln/detail/CVE-2 cve.org/CVERecord?id=CVE-2026- And check the errata/update/advisory pages of your distribution.

2/4

##

jt_rebelo@ciberlandia.pt at 2026-05-02T07:12:53.000Z ##

Para quem usa Linux Mint numa versão suportada, um patch do "kmod" que mitiga o "Copy.Fail" está disponível nas actualizações de sistema:
forums.linuxmint.com/viewtopic

De todo o modo, confirmem que versão do kmod têm instalada, com o comando "apt list --installed kmod" (sem as aspas) no terminal e se o resultado for "31+20240202-2ubuntu7.2" já têm a actualização de mitigação.

Se ainda assim tiverem dúvidas, podem verificar as alterações que a versão instalada do kmod fez ao vosso sistema, correndo, no terminal, o comando "apt changelog kmod", se virem "Disable loading of algif_aead module to mitigate CVE-2026-31431 (LP: #2150743) - debian/modprobe.d/disable-algif_aead.conf" então a mitigação está instalada.

Considerando o estado actual dos servidores do Ubuntu, é possível que haja alguns avisos/erros quando correrem o Gestor de actualizações do Linux Mint. Se isso acontecer, tentem actualizar um pouco mais tarde (já vi vários computadores avisarem que ocorreu um erro e, ainda assim, logo de seguida, mostrarem as actualizações disponíveis, incluindo do kmod versão 31+20240202-2ubuntu7.2).

O Linux é vosso amigo.
#LinuxMint #CopyFail #linuxsecurity

##

allaboutsecurity@mastodon.social at 2026-05-02T06:33:32.000Z ##

Linux-Kernel-Lücke CVE-2026-31431: Lokale Rechteerweiterung auf Root über algif_aead

Eine Schwachstelle im Krypto-Subsystem des Linux-Kernels erlaubt es nicht privilegierten lokalen Nutzern, Root-Rechte zu erlangen – ohne die Datei auf der Festplatte zu verändern.

all-about-security.de/linux-ke

#linux #cve

##

sublimer@mstdn.sublimer.me at 2026-05-02T02:29:26.000Z ##

Linuxの脆弱性対策について(CVE-2026-31431、Copy Fail) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 : 👀
---
ipa.go.jp/security/security-al

##

cmars at 2026-05-02T02:24:30.896Z ##

@jorge bazzite is on a different machine but similarly vulnerable. It's on stable, kernel 6.19.11-ogc1.1.fc44.x86_64 and shows vulnerable to cve-2026-31431

##

gtronix at 2026-05-01T22:01:00.154Z ##

"Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers"

"The Linux vulnerabilities have been patched—but many machines remain at risk. The exploit, dubbed CopyFail and tracked as CVE-2026-31431, allows hackers to take over PCs and data center servers."

wired.com/story/dangerous-new-

##

apz@some.apz.fi at 2026-05-01T21:08:23.000Z ##

Heads up #linux folks, #Debian has released a #security fix for the CVE-2026-31431 (copy fail) issue.

It's out for Bookworm (kernel 6.1.170) and Trixie (6.12.85).

Patch away!

##

cisakevtracker@mastodon.social at 2026-05-01T20:00:47.000Z ##

CVE ID: CVE-2026-31431
Vendor: Linux
Product: Kernel
Date Added: 2026-05-01
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

vitobotta@mastodon.social at 2026-05-02T17:40:21.000Z ##

Nine years in the Linux kernel and nobody noticed. "Copy Fail" (CVE-2026-31431) lets any local user grab root in seconds. CISA just added it to KEV. Working exploits for Ubuntu, Amazon Linux, RHEL, SUSE. Patch. - cisa.gov/news-events/alerts/20

##

Shibanarchiste@piaille.fr at 2026-05-02T15:34:29.000Z ##

« Mettez à jour le paquet du noyau de votre distribution avec une version incluant le #commit a664bf3d603d de la branche principale », expliquent les chercheurs, « la plupart des principales distributions proposent désormais ce correctif », comme #Debian (security-tracker.debian.org/tr) (Forky et Sid), #Ubuntu (ubuntu.com/security/CVE-2026-3), par exemple mais la mise en place est encore en cours chez #RedHat (access.redhat.com/security/cve) et #Suse.

Fin de l'article.

10/

#Patch #Linux #Ubuntu #CopyFail #Root #Cybersecurity #Docker #Kubernetes

##

Shibanarchiste@piaille.fr at 2026-05-02T15:29:46.000Z ##

En utilisant un script Python (github.com/theori-io/copy-fail) très court (732 octets) qui ne fait appel qu’à des bibliothèques standard et ciblant le page cache du noyau, il est possible d’accéder au binaire qui permet d’être superutilisateur : /usr/bin/su. La modification se fait en mémoire, pas directement sur le périphérique de stockage.

7/

##

Shibanarchiste@piaille.fr at 2026-05-02T15:24:29.000Z ##

C’est l’entreprise de sécurité Xint.io qui a révélé (xint.io/blog/copy-fail-linux-d), ce mercredi 29 avril, cette vulnérabilité (CVE-2026-31431, d’une sévérité élevée de 7,8/10) permettant une élévation des privilèges en local.

Le score n’est « que » de 7,8 car le vecteur d’attaque est local (AV:L) : il faut déjà avoir un accès local sur la machine, ici un compte utilisateur. La même avec une attaque depuis le réseau (AV:N) se serait approchée de 10.

2/

##

cyclone@infosec.exchange at 2026-05-02T15:20:23.000Z ##

Copy Fail (CVE-2026-31431) is a Linux kernel LPE that gives root access on every major linux distro.

All that is needed is local shell access and a few lines of python.

forum.hashpwn.net/post/12727

#cybersecurity #copyfail #linux #exploit #cve202631431 #hashpwn

##

990000@mstdn.social at 2026-05-02T15:03:14.000Z ##

I can't tell how dangerous Linux CVE-2026-31431 is, given it's just "local privilege escalation," but updating all my web servers anyway I guess 🤷🏻‍♂️

#Linux #Ubuntu

##

linux@activitypub.awakari.com at 2026-05-02T14:03:07.000Z ## Re: CVE-2026-31431: CopyFail: linux local privilege scalation


Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-02T13:45:06.000Z ## Rocky - https://kb.ciq.com/article/rocky-linux/rl-cve-2026-31431-mitigation (couldn't find an official link) Slackware - nothing on http://www.slackware.com/security/list.php?l=slackware-securi...


Origin | Interest | Match ##

jschauma@mstdn.social at 2026-05-02T13:45:06.000Z ##

Rocky - kb.ciq.com/article/rocky-linux
(couldn't find an official link)

Slackware - nothing on slackware.com/security/list.ph

Ubuntu - ubuntu.com/security/CVE-2026-3
all around very unclear

#copyfail - ¯\_(ツ)_/¯

##

jschauma@mstdn.social at 2026-05-02T13:44:37.000Z ##

Fedora - bugzilla.redhat.com/show_bug.c
"For any Fedora users finding a link here: this was fixed in kernel 6.19.12, and all current Fedora branches are already at or past that version."

Gentoo - bugs.gentoo.org/973385

Kali - should have it by tracking Debian security

Suse / OpenSuse etc. - suse.com/security/cve/CVE-2026

RedHat - access.redhat.com/security/cve
relevant for various downstreams

#copyfail

##

jschauma@mstdn.social at 2026-05-02T13:44:02.000Z ##

Alma - almalinux.org/blog/2026-05-01-
fixed

Alpine - security.alpinelinux.org/vuln/
fixed (per fosstodon.org/@alpinelinux/116)

Arch - security.archlinux.org/CVE-202
security.archlinux.org/AVG-2908
fixed in linux 6.19.12-1

Centos - pending RedHat: bugzilla.redhat.com/show_bug.c
?

Debian - security-tracker.debian.org/tr
13 (Trixie), 12 (bookworm), 11 (bullseye) all still vulnerable, but fixed in security releases

#copyfail

##

jschauma@mstdn.social at 2026-05-02T13:43:24.000Z ##

Le sigh. Every time we go around and have to do this again and manually figure out wtf each of the ten thousand linux distributions provides their security updates and current status.

Spending my Saturday morning searching for CVE-2026-31431 and "copyfail" patch status is just 👍.

Anyway, here's what I have so far:

##

jpmens@mastodon.social at 2026-05-02T13:00:37.000Z ##

@bortzmeyer this does not answer your question but was written by a Redhatter to address the situation with RHEL / Fedora

jan.wildeboer.net/2026/05/PSA-

##

technadu@infosec.exchange at 2026-05-02T09:04:00.000Z ##

CVE-2026-31431 added to KEV.
Linux kernel vuln, active exploitation confirmed.
Patch ASAP.

Source: cisa.gov/news-events/alerts/20

💬 Thoughts?
Follow @technadu

#Infosec #Linux #CyberSecurity

##

jwildeboer@social.wildeboer.net at 2026-05-02T08:35:28.000Z ##

ADDENDUM: Now also a blog post at jan.wildeboer.net/2026/05/PSA-

##

camille@mastodon.libre-entreprise.com at 2026-05-02T07:53:22.000Z ##

Ça y est le noyau #Linux pour #Debian 12 est sorti avec le correctif pour #CopyFail :

security-tracker.debian.org/tr

##

jwildeboer@social.wildeboer.net at 2026-05-02T07:36:35.000Z ##

Some more details from our CVE page on CVE-2026-31431 at access.redhat.com/security/cve For more infos also on availability of updates see nvd.nist.gov/vuln/detail/CVE-2 cve.org/CVERecord?id=CVE-2026- And check the errata/update/advisory pages of your distribution.

2/4

##

jt_rebelo@ciberlandia.pt at 2026-05-02T07:12:53.000Z ##

Para quem usa Linux Mint numa versão suportada, um patch do "kmod" que mitiga o "Copy.Fail" está disponível nas actualizações de sistema:
forums.linuxmint.com/viewtopic

De todo o modo, confirmem que versão do kmod têm instalada, com o comando "apt list --installed kmod" (sem as aspas) no terminal e se o resultado for "31+20240202-2ubuntu7.2" já têm a actualização de mitigação.

Se ainda assim tiverem dúvidas, podem verificar as alterações que a versão instalada do kmod fez ao vosso sistema, correndo, no terminal, o comando "apt changelog kmod", se virem "Disable loading of algif_aead module to mitigate CVE-2026-31431 (LP: #2150743) - debian/modprobe.d/disable-algif_aead.conf" então a mitigação está instalada.

Considerando o estado actual dos servidores do Ubuntu, é possível que haja alguns avisos/erros quando correrem o Gestor de actualizações do Linux Mint. Se isso acontecer, tentem actualizar um pouco mais tarde (já vi vários computadores avisarem que ocorreu um erro e, ainda assim, logo de seguida, mostrarem as actualizações disponíveis, incluindo do kmod versão 31+20240202-2ubuntu7.2).

O Linux é vosso amigo.
#LinuxMint #CopyFail #linuxsecurity

##

sublimer@mstdn.sublimer.me at 2026-05-02T02:29:26.000Z ##

Linuxの脆弱性対策について(CVE-2026-31431、Copy Fail) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 : 👀
---
ipa.go.jp/security/security-al

##

cmars@infosec.exchange at 2026-05-02T02:24:30.000Z ##

@jorge bazzite is on a different machine but similarly vulnerable. It's on stable, kernel 6.19.11-ogc1.1.fc44.x86_64 and shows vulnerable to cve-2026-31431

##

gtronix@infosec.exchange at 2026-05-01T22:01:00.000Z ##

"Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers"

"The Linux vulnerabilities have been patched—but many machines remain at risk. The exploit, dubbed CopyFail and tracked as CVE-2026-31431, allows hackers to take over PCs and data center servers."

wired.com/story/dangerous-new-

#Linux

##

apz@some.apz.fi at 2026-05-01T21:08:23.000Z ##

Heads up #linux folks, #Debian has released a #security fix for the CVE-2026-31431 (copy fail) issue.

It's out for Bookworm (kernel 6.1.170) and Trixie (6.12.85).

Patch away!

##

cisakevtracker@mastodon.social at 2026-05-01T20:00:47.000Z ##

CVE ID: CVE-2026-31431
Vendor: Linux
Product: Kernel
Date Added: 2026-05-01
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

secdb@infosec.exchange at 2026-05-01T20:00:15.000Z ##

🚨 [CISA-2026:0501] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-31431 (secdb.nttzen.cloud/cve/detail/)
- Name: Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability
- Action: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Linux
- Product: Kernel
- Notes: lore.kernel.org/linux-cve-anno; xint.io/blog/copy-fail-linux-d ; git.kernel.org/pub/scm/linux/k ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260501 #cisa20260501 #cve_2026_31431 #cve202631431

##

marshray@infosec.exchange at 2026-05-01T19:24:20.000Z ##

There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431("copy .fail") is particularly special.

- It's an LPE (local privilege escalation). Yes, we should take it seriously and never give up the dream. No, you should not rely on non-virtualized containers to provide a true multi-tenant security boundary.

- Every potential attacker in the world has been able to observe the vulnerability in source code form since mid-2017 (9 years ago).
git.kernel.org/pub/scm/linux/k

- The vendor was notified of the vulnerability 2026-03-23 (39 days ago), apparently with enough detail to put together a patch in ~3 days.

- Every potential attacker in the world was informed of the specific vulnerability 30 days ago (2026-03-31 at the latest) when the patch was committed with the header "Reported-by: Taeyang Lee <0wn@ theori. io>" Theori .io advertises both offensive and defensive security information services on their site.
git.kernel.org/pub/scm/linux/k

The researchers:

- Notified the kernel security team
- Observed the patch committed
- Waited another 34 days
- Published a detailed writeup

Professionally done, IMO.

The researchers followed the process outlined on the affected vendor's website. Specifically:
"the kernel security team strongly recommends that as a reporter of a potential security issue you DO NOT contact the “linux-distros” mailing list UNTIL...[list that includes some absurdly vague conditions]"
docs.kernel.org/process/securi

To do much more than follow the vendor's preferred disclosure process often amounts to demanding that *your* bug be given special attention and treatment. Which is a thing researchers sometimes do. Naturally it's hard to be objective about one's own finding.

Assessing and prioritizing bug reports is generally the job of the *vendor's* security team, *not* the researchers. There are exceptions. But to force special handling for your bug is simply to blindly take resources away from all the reports that will lead to the 487 other CVEs that month. And some of those might not be LPEs. They could be wormable remote network holes or virtual machine breakout bugs.

In this case, the kernel security team appears to have decided that the appropriate response was to let downstream read about it when the patch was committed to source control like everybody else. A CVE was publicly announced 11 days later, for a total of 30 days after being notified.

There are far worse systems.

Regardless, that process is theirs to manage. It's between the Linux kernel team and whoever they have made promises to.

I don't know about you, but I get my Linux for free. Nobody promised me anything.

* Data from stack .watch/product/linux/linux-kernel/, 14 month average

##

gtronix@infosec.exchange at 2026-05-01T19:01:09.000Z ##

""Copy Fail" is a rare Linux bug that can turn an unprivileged user into a root admin in seconds"

"Tracked as CVE-2026-31431, Copy Fail could represent a significant security risk in the making."

techspot.com/news/112260-criti

#Linux #Python

##

Chris@mast.social at 2026-05-01T18:52:41.000Z ##

🛡️ In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

cve.org/CVERecord?id=CVE-2026-

#linux #cybersecurity #cisa

##

NuclearOatmeal@beige.party at 2026-05-01T18:04:04.000Z ##

#infosec

Good morning, everybody.

Short version. Trying to find a mitigation for CVE-2026-31431 on AWS ECS using image registry.access.redhat.com/ubi9/ubi

Infra is also wandering around trying to find a solution. Either we use grubby, which `dnf install` has no clue as to where it might be. Also tried grub2-common and grubby-bls which various pages had me look for.

So, if anyone has already worked this out, please ping me.

##

linux@activitypub.awakari.com at 2026-05-01T17:33:27.000Z ## Copy Fail vulnerability allows privilege escalation across most Linux Archyde A severe security flaw known as Copy Fail (CVE-2026-31431) allows standard users to escalate themselves to administrato...

#Technology

Origin | Interest | Match ##

profdiggity@privacysafe.social at 2026-05-01T16:46:36.000Z ##

As it turns out, the #Linux kernel copy.fail vulnerability is more like a speculative execution bug than first reported. It breaks out of containers (!) ... expect some VM + VPS + keylogging fxckery next, as with Meltdown/Spectre blog.toolslib.net/2026/04/30/c

##

eclecticpassions@fosstodon.org at 2026-05-01T16:13:28.000Z ##

cert.europa.eu/publications/se

Dietpi hasn't released the patched kernel yet Debian 1:6.12.85. It's still stuck on the vulnerable 1:6.12.75 version. :(

security-tracker.debian.org/tr

@dietpi_

#dietpi #debian #copyfail #linux #security #CVE202631431

##

alpinelinux@fosstodon.org at 2026-05-01T15:52:30.000Z ##

Releases are still pending, but our repositories all received upgraded kernels to address copy.fail (CVE-2026-31431).

So make sure you upgrade to the latest available kernels.

edge: >= linux-lts-6.18.22
3.23: >= linux-lts-6.18.22
3.22: >= linux-lts-6.12.85
3.21: >= linux-lts-6.12.85
3.20: >= linux-lts-6.6.137
3.19: >= linux-lts-6.6.137
3.18: >= linux-lts-6.1.170
3.17: >= linux-lts-5.15.204

#AlpineLinux #security

##

chiraag@mastodon.online at 2026-05-01T14:54:17.000Z ##

@RootMoose I tried the vulnerability on my Debian unstable system and...it didn't work? Might be that the kernel version I have already got the patch (even if it wasn't labeled as such).

Anyway, I think they released an update:
ostechnix.com/debian-13-trixie

##

grono@mastodon.com.pl at 2026-05-01T13:31:52.000Z ##

What I learned from patching Docker Engine default seccomp profile for CVE-2026-31431 (Copy Fail)

1. If a seccomp rule already filters an argument (like AF_VSOCK), it's just a matter of adding a second negation for the AF_ALG, right?

Wrong!

These are two rules that are OR'd. Effectively breaking the previous single negation.

The right fix was to reshape it into a range check with the gt/lt opcode:

- "arg0 < 38"
- "arg0 == 39"
- "arg0 > 40"

That cleanly leaves both "AF_ALG" (38) and "AF_VSOCK" (40) unmatched, so they fall through to deny.

2. There's also a second syscall...

Filtering socket(2) alone is not enough.
On x86 (and some other platforms) there's also a legacy predecessors to socket syscall called socketcall(2).

On amd64 it can still be used if the process switches to the ia32 compat mode (with int 80h).

Unfortunately it must be blocked completely because the pointer argument cannot be inspected by seccomp.
This only impacts very old 32 bit binaries though.

3. The error you return matters

If you block socketcall by returning EPERM, the libseccomp will automatically happily generate an ALLOW rule for the socket(2).
Not sure about the full reasoning behind it yet, but ENOSYS works fine.

Now.. time to enjoy the long weekend

##

linux@activitypub.awakari.com at 2026-05-01T11:20:43.000Z ## Linux distributions worldwide targeted by the Copy Fail exploit An exploit for the “Copy Fail” security vulnerability (CVE-2026-31431) in the Linux kernel has been made public. The vulnerabilit...

#Security #Copy #Fail #CVE-2026-31431 #Dirty #Pipe #Linux #linux #kernel #vulnerability

Origin | Interest | Match ##

simonzerafa@infosec.exchange at 2026-05-01T11:22:14.000Z ##

@alexanderkjall

That's not what the disclosure timeline claims:

2026-03-23 Reported to Linux kernel security team
2026-03-24 Initial acknowledgment
2026-03-25 Patches proposed and reviewed
2026-04-01 Patch committed to mainline
2026-04-22 CVE-2026-31431 assigned
2026-04-29 Public disclosure (copy.fail/)

Is this timeline in error?

##

linux@activitypub.awakari.com at 2026-05-01T11:00:55.000Z ## Copy Fail: Critical Linux Kernel Privilege Escalation Vulnerability - CVE-2026-31431 Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon co...

#Malware #News

Origin | Interest | Match ##

jwildeboer@social.wildeboer.net at 2026-05-01T10:56:56.000Z ##

I did this on my exposed servers, even though I think the actual risk for me and my machines is low as an exploit needs local user access. I verified that none of the services and containers I run on my machines caused problems after this change. Everything kept on working as before, so all is safe.

I'm keeping an eye on access.redhat.com/security/cve for updates.

#SelfHost #SysAdminLife @homelab

##

simonzerafa@infosec.exchange at 2026-05-01T10:56:14.000Z ##

For anyone following the copy.fail issues on Linux there is now a PoC for Kubernetes as well as the previous LPE one

github.com/Percivalll/Copy-Fai

General information on the CVE via copy.fail/

#Linux #CopyFail #cve202631431

##

Ze_Andarilho@capivarinha.club at 2026-05-01T10:54:39.982Z ##

@s1n3rgy4@cyberplace.social https://sempreupdate.com.br/copy-fail-linux-cve-2026-31431-acesso-root/ o tal do copy fail

##

governa@fosstodon.org at 2026-05-01T10:28:48.000Z ##

Copy Fail: The 732-Byte Script That Roots Every Major #Linux Systems

ostechnix.com/copy-fail-cve-20

##

Larvitz@burningboard.net at 2026-05-01T10:10:45.000Z ##

Fresh gist: mitigating CVE-2026-31431 ("Copy Fail") on RHEL 8/9/10 with a tiny Ansible playbook.

It blacklists algif_aead via a kernel boot arg (initcall_blacklist=algif_aead_init), reboots only when needed, and asserts the mitigation actually stuck after reboot. Idempotent & safe to re-run.

codeberg.org/Larvitz/gists/src

#Ansible #RHEL #Linux #InfoSec #SysAdmin #DevOps #CVE #CVE_2026_31431 #copyfail

##

Larvitz@burningboard.net at 2026-05-01T10:09:11.000Z ##

@jwildeboer Great 🙂

Created a little Ansible playbook to apply the mitigation to multiple servers: codeberg.org/Larvitz/gists/src

##

sebastian@social.itu.dk at 2026-05-01T08:10:12.000Z ##

the line between #vulnerability #disclosure and #AI #advertisement becomes ever more blurry ....

copy.fail/#contact

#thereIsNoAI
#thereIsInParticularNoSustainableAI
#alsoNoReponsibleAI

#cve

CVE-2026-31431 #copyFail

##

grono@mastodon.com.pl at 2026-05-01T08:06:52.000Z ##

Docker Engine is safe against CVE-2026-31431 now.

Patch ASAP:
github.com/moby/moby/releases/

#docker #containers #linux #copyfail

##

JulianOliver@mastodon.social at 2026-05-01T07:01:54.000Z ##

@ctoney Just wondering the same. Seems Ubuntu LTS remains non-fixed?

Ubuntu's grandmother Debian seems on top of things.

Tested the oft cited PoC (github.com/theori-io/copy-fail) on patched 6.12.85+deb13-amd64 for Trixie:

```
root@cake:~# su - eat
eat@cake:~$ vim foo.py
eat@cake:~$ cat foo.py | python3 && su
Password: su: Authentication failure
Password:
```

##

adamw@fosstodon.org at 2026-05-01T06:46:04.000Z ##

today in #fedora qa:
* CVE-2026-31431 ("copy fail") mitigation in fedora infra - Fedora kernels are patched already but we have hosts running EL; applied mitigations on those most accessible to potentially-untrusted workloads, updated/rebooted a bunch of Fedora hosts
* re-reviewed g-i-s and toolbox update PRs - forge.fedoraproject.org/qualit , forge.fedoraproject.org/qualit
* rest of the day still trying to nail down rmdepcheck on #eln with @yselkowitz - forge.fedoraproject.org/qualit

##

JulianOliver@mastodon.social at 2026-05-01T06:23:38.000Z ##

Debian's patched 6.12.85+deb13-amd64 #1 SMP PREEMPT_DYNAMIC seems GTG with the PoC published here:

github.com/theori-io/copy-fail

```
root@cake:~# su - eat
eat@cake:~$ vim foo.py
eat@cake:~$ cat foo.py | python3 && su
Password: su: Authentication failure
Password:
```

Bit worried about where Ubuntu is at. Ominously, their own fix announcement page seems down:

ubuntu.com/blog/copy-fail-vuln

##

bontchev@infosec.exchange at 2026-05-01T06:19:18.000Z ##

CopyFail implementation in Rust:

github.com/iss4cf0ng/CVE-2026-

##

net_gremlin@mastodon.ip6.li at 2026-05-01T05:30:13.000Z ##

Zumindest #Debian hat das Problem CVE-2026-31431 beseitigt:
security-tracker.debian.org/tr

##

benzogaga33@mamot.fr at 2026-05-01T05:10:03.000Z ##

CVE-2026-31431 (Copy Fail): Linux Kernel LPE securityboulevard.com/2026/04/

##

stuartl@longlandclan.id.au at 2026-05-01T03:22:07.000Z ##

Checking the #CopyFail #CVE_2026_31431 status on #AlpineLinux, again nothing heard officially from @alpinelinux but I did see this:

github.com/theori-io/copy-fail

Maybe the issue has been quietly dealt with or was never an issue to begin with? It'd be nice to know for certain.

##

linux@activitypub.awakari.com at 2026-05-01T01:25:35.000Z ## CVE-2026-31431 (Copy Fail): Linux Kernel LPE Article URL: https://securityboulevard.com/2026/04/cve-2026-31431-copy-fail-linux-kernel-lpe/ Comments URL: https://news.ycombinator.com/item?id=4797035...


Origin | Interest | Match ##

shlee@aus.social at 2026-05-01T01:48:14.000Z ##

:nugget: CVE-2026-31431 copy.fail/

I cannot believe this 0day happened a few days after I updated everything... good news is.. I can update with zero downtime for the most part.

If you notice a small outage, it should take a minute at max but I'll try to keep it small.

##

feistel@sns.feistel.party at 2026-05-01T01:09:12.000Z ##

#CopyFail #cve_2026_31431 I wrote about denying containers access to AF_ALG sockets with SELinux
blog.feistel.party/2026/04/30/

##

ammarfaizi2@gnuweeb.org at 2026-05-01T00:37:27.000Z ##

It would be interesting to see whether the copy-fail vuln (CVE-2026-31431) could be used to root an Android phone. I am a bit reluctant to install Magisk on my primary Android device, would love to see if the vuln could be an alternative. Lmao.

##

alienghic@timeloop.cafe at 2026-04-30T23:46:57.000Z ##

@majorlinux

Debian has patched for copy fail / CVE-2026-31431 in trixe (latest release) with 6.12.85-1 today, and testing and unstable were fixed yesterday.

timeloop.cafe/@alienghic/11649

There's also a pretty easy to enable mitigation that blocks the exploit, by disabling the buggy module.

xint.io/blog/copy-fail-linux-d

##

ercanbrack@mastodon.online at 2026-04-30T23:39:18.000Z ##

No official announcement yet, but Copy Fail (CVE-2026-31431) has already been fixed in the Fedora kernels: 6.19.12. According to Red Hat / Fedora kernel tracking, "all current Fedora branches are already at or beyond kernel 6.19.12.

TL;DR - If your Fedora system is fully updated, you are already protected against Copy Fail.

#Fedora #Linux #LinuxAudio #CopyFail

##

brainsik@hachyderm.io at 2026-04-30T23:34:26.000Z ##

For those wondering when #Debian will have patches for #CopyFaill, I've been following this page:

security-tracker.debian.org/tr

Trixie just got patched. Still waiting for Bookworm.

##

CVE-2026-7675
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-03T03:16:15.613000

2 posts

A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did no

thehackerwire@mastodon.social at 2026-05-03T03:18:25.000Z ##

🟠 CVE-2026-7675 - High (8.8)

A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-03T03:18:25.000Z ##

🟠 CVE-2026-7675 - High (8.8)

A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7674
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-03T02:17:12.993000

4 posts

A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server can lead to buffer overflow. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.

offseq at 2026-05-03T03:00:26.543Z ##

🔎 HIGH-severity (CVSS 8.7) buffer overflow in Shenzhen Libituo LBT-T300-HW1 (v1.2.0 – 1.2.8), CVE-2026-7674. Web Management Interface at risk, remote exploit possible. No patch yet — restrict access & stay alert. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-03T02:21:03.000Z ##

🟠 CVE-2026-7674 - High (8.8)

A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-03T03:00:26.000Z ##

🔎 HIGH-severity (CVSS 8.7) buffer overflow in Shenzhen Libituo LBT-T300-HW1 (v1.2.0 – 1.2.8), CVE-2026-7674. Web Management Interface at risk, remote exploit possible. No patch yet — restrict access & stay alert. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #IoTSec #Infosec

##

thehackerwire@mastodon.social at 2026-05-03T02:21:03.000Z ##

🟠 CVE-2026-7674 - High (8.8)

A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2554
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-02T14:16:17.707000

4 posts

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_customer' due to missing validation on the 'customerid' user controlled key. This makes it possible for authenticated attackers, with Vendor-level access and abo

2 repos

https://github.com/mbanyamer/CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection

https://github.com/lagathos/CVE-2026-25548

offseq at 2026-05-03T00:00:40.729Z ##

🔒 CVE-2026-2554: HIGH-severity IDOR in WCFM – Frontend Manager for WooCommerce lets Vendor+ users delete any account, incl. admins. No patch yet. Restrict Vendor access & monitor user deletions. More: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-03T00:00:00.000Z ##

🟠 CVE-2026-2554 - High (8.1)

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_custom...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-03T00:00:40.000Z ##

🔒 CVE-2026-2554: HIGH-severity IDOR in WCFM – Frontend Manager for WooCommerce lets Vendor+ users delete any account, incl. admins. No patch yet. Restrict Vendor access & monitor user deletions. More: radar.offseq.com/threat/cve-20 #OffSeq #WordPress #WooCommerce #Infosec

##

thehackerwire@mastodon.social at 2026-05-03T00:00:00.000Z ##

🟠 CVE-2026-2554 - High (8.1)

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_custom...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4062
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-02T12:31:28

2 posts

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'object_ids' and 'exclude_object_ids' parameters in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied parameters and lack of sufficient preparation on the existing SQL query. The `esc_sql()` function is applied but is ineffective because the values are placed in

thehackerwire@mastodon.social at 2026-05-02T12:19:21.000Z ##

🟠 CVE-2026-4062 - High (7.5)

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'object_ids' and 'exclude_object_ids' parameters in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T12:19:21.000Z ##

🟠 CVE-2026-4062 - High (7.5)

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'object_ids' and 'exclude_object_ids' parameters in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied paramet...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4061
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-02T12:31:28

2 posts

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'map_post_type' parameter in all versions up to, and including, 1.13.18. This is due to the `SearchResults` hook explicitly calling `stripslashes_deep($_POST)` which removes WordPress magic quotes protection, followed by the unsanitized `map_post_type` value being concatenated into an `IN(...)` clause without `es

thehackerwire@mastodon.social at 2026-05-02T12:19:12.000Z ##

🟠 CVE-2026-4061 - High (7.5)

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'map_post_type' parameter in all versions up to, and including, 1.13.18. This is due to the `SearchResults` hook explicitly calling `stripslashes_deep($_POST)` w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T12:19:12.000Z ##

🟠 CVE-2026-4061 - High (7.5)

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'map_post_type' parameter in all versions up to, and including, 1.13.18. This is due to the `SearchResults` hook explicitly calling `stripslashes_deep($_POST)` w...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7489
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-02T12:31:28

2 posts

CTMS developed by Sunnet has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

thehackerwire@mastodon.social at 2026-05-02T11:00:17.000Z ##

🟠 CVE-2026-7489 - High (8.8)

CTMS developed by Sunnet has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T11:00:17.000Z ##

🟠 CVE-2026-7489 - High (8.8)

CTMS developed by Sunnet has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7491
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-02T12:31:22

4 posts

School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.

thehackerwire@mastodon.social at 2026-05-02T11:00:07.000Z ##

🟠 CVE-2026-7491 - High (8.1)

School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-02T10:30:27.817Z ##

⚠️ CVE-2026-7491 (HIGH, CVSS 8.6): Zyosoft School App v0 is vulnerable to auth bypass via user-controlled keys (CWE-639). Authenticated users can access & modify others' data. No patch yet — restrict access & stay alert for updates. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-02T11:00:07.000Z ##

🟠 CVE-2026-7491 - High (8.1)

School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-02T10:30:27.000Z ##

⚠️ CVE-2026-7491 (HIGH, CVSS 8.6): Zyosoft School App v0 is vulnerable to auth bypass via user-controlled keys (CWE-639). Authenticated users can access & modify others' data. No patch yet — restrict access & stay alert for updates. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #AppSec

##

CVE-2026-6320
(7.5 HIGH)

EPSS: 0.10%

updated 2026-05-02T12:16:16.750000

4 posts

The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using those stored values as trusted paths for email attachments. This makes it possible for unauthenticated attackers to read arbitrary local files and exfiltra

offseq at 2026-05-03T01:30:28.057Z ##

🚨 CVE-2026-6320 (HIGH): Path traversal in Salon Booking System – Free (WordPress, ≤10.30.25) enables unauthenticated file reads via booking emails. No patch out yet — disable or restrict plugin use to reduce risk. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-03T00:48:26.000Z ##

🟠 CVE-2026-6320 - High (7.5)

The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-03T01:30:28.000Z ##

🚨 CVE-2026-6320 (HIGH): Path traversal in Salon Booking System – Free (WordPress, ≤10.30.25) enables unauthenticated file reads via booking emails. No patch out yet — disable or restrict plugin use to reduce risk. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

thehackerwire@mastodon.social at 2026-05-03T00:48:26.000Z ##

🟠 CVE-2026-6320 - High (7.5)

The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4060
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-02T12:16:15.430000

2 posts

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'sort' parameter in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. The `esc_sql()` function is applied but is ineffective in the `ORDER BY` context because the value is not enclosed in qu

thehackerwire@mastodon.social at 2026-05-03T00:48:35.000Z ##

🟠 CVE-2026-4060 - High (7.5)

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'sort' parameter in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied parameter and lack of sufficient prepar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-03T00:48:35.000Z ##

🟠 CVE-2026-4060 - High (7.5)

The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'sort' parameter in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied parameter and lack of sufficient prepar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5324
(7.2 HIGH)

EPSS: 0.09%

updated 2026-05-02T09:31:21

2 posts

The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in all versions up to, and including, 2.8.11 This is due to a combination of missing nonce verification for unauthenticated form submissions, insufficient handling of FileUpload fields when no file is uploaded, and the reversal of security encoding via html_entity_decode() followed by unescap

offseq at 2026-05-02T09:00:26.778Z ##

🔎 CVE-2026-5324: HIGH (CVSS 7.2) XSS in Brizy – Page Builder (≤2.8.11) lets unauth'd attackers inject scripts into form data. Admins risk session hijack viewing Leads. Restrict access, monitor for patches. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-02T09:00:26.000Z ##

🔎 CVE-2026-5324: HIGH (CVSS 7.2) XSS in Brizy – Page Builder (≤2.8.11) lets unauth'd attackers inject scripts into form data. Admins risk session hijack viewing Leads. Restrict access, monitor for patches. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #XSS #Vuln

##

CVE-2026-7649
(7.5 HIGH)

EPSS: 0.08%

updated 2026-05-02T09:31:21

4 posts

The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthentica

thehackerwire@mastodon.social at 2026-05-02T08:27:56.000Z ##

🟠 CVE-2026-7649 - High (7.5)

The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T08:27:30.000Z ##

🟠 CVE-2026-7649 - High (7.5)

The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T08:27:56.000Z ##

🟠 CVE-2026-7649 - High (7.5)

The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T08:27:30.000Z ##

🟠 CVE-2026-7649 - High (7.5)

The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2052
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-02T09:31:21

2 posts

The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.2 via the Display Logic feature. This is due to the plugin using eval() on user-supplied Display Logic expressions with an insufficient blocklist/allowlist that can be bypassed using array_map with string c

thehackerwire@mastodon.social at 2026-05-02T08:27:32.000Z ##

🟠 CVE-2026-2052 - High (8.8)

The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.2 via the Display Logic feature. This is due to the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T08:27:32.000Z ##

🟠 CVE-2026-2052 - High (8.8)

The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.2 via the Display Logic feature. This is due to the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7607
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-02T09:31:21

2 posts

A security vulnerability has been detected in TRENDnet TEW-821DAP 1.12B01. Impacted is the function auto_update_firmware of the component Firmware Udpate. The manipulation of the argument str leads to buffer overflow. The attack may be initiated remotely. The vendor explains: "That firmware version will only work on our hardware version v1.xR. We have already EOL that product 8 years ago and are n

thehackerwire@mastodon.social at 2026-05-02T08:27:23.000Z ##

🟠 CVE-2026-7607 - High (8.8)

A security vulnerability has been detected in TRENDnet TEW-821DAP 1.12B01. Impacted is the function auto_update_firmware of the component Firmware Udpate. The manipulation of the argument str leads to buffer overflow. The attack may be initiated r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T08:27:23.000Z ##

🟠 CVE-2026-7607 - High (8.8)

A security vulnerability has been detected in TRENDnet TEW-821DAP 1.12B01. Impacted is the function auto_update_firmware of the component Firmware Udpate. The manipulation of the argument str leads to buffer overflow. The attack may be initiated r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7647
(8.1 HIGH)

EPSS: 0.01%

updated 2026-05-02T06:30:30

2 posts

The Profile Builder Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to and including 3.14.5. This is due to the use of PHP's maybe_unserialize() function on the attacker-controlled 'args' POST parameter within the wppb_request_users_pins_action_callback() AJAX handler, which lacked any nonce verification, type checking, or input validation before deserialization.

thehackerwire@mastodon.social at 2026-05-02T06:16:57.000Z ##

🟠 CVE-2026-7647 - High (8.1)

The Profile Builder Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to and including 3.14.5. This is due to the use of PHP's maybe_unserialize() function on the attacker-controlled 'args' POST parameter within the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T06:16:57.000Z ##

🟠 CVE-2026-7647 - High (8.1)

The Profile Builder Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to and including 3.14.5. This is due to the use of PHP's maybe_unserialize() function on the attacker-controlled 'args' POST parameter within the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4882
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-05-02T06:30:30

4 posts

The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'URAF_AJAX::method_upload' function in all versions up to, and including, 1.6.20. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulnerabil

offseq at 2026-05-02T06:00:27.050Z ##

🚨 CRITICAL: CVE-2026-4882 in WPEverest User Registration Advanced Fields ≤1.6.20 lets unauthenticated attackers upload dangerous files via Profile Picture field — possible RCE. Disable this field until patched! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-02T05:59:51.000Z ##

🔴 CVE-2026-4882 - Critical (9.8)

The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'URAF_AJAX::method_upload' function in all versions up to, and including, 1.6.20. This makes it possible ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-02T06:00:27.000Z ##

🚨 CRITICAL: CVE-2026-4882 in WPEverest User Registration Advanced Fields ≤1.6.20 lets unauthenticated attackers upload dangerous files via Profile Picture field — possible RCE. Disable this field until patched! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Security #CVE20264882

##

thehackerwire@mastodon.social at 2026-05-02T05:59:51.000Z ##

🔴 CVE-2026-4882 - Critical (9.8)

The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'URAF_AJAX::method_upload' function in all versions up to, and including, 1.6.20. This makes it possible ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7641
(8.8 HIGH)

EPSS: 0.02%

updated 2026-05-02T06:30:30

2 posts

The Import and export users and customers plugin for WordPress is vulnerable to Privilege Escalation in all versions up to and including 2.0.8 via the `save_extra_user_profile_fields()` function. This is due to an incomplete blocklist that correctly restricts capability meta keys for the primary site (e.g., `wp_capabilities`, `wp_user_level`) but fails to block the equivalent meta keys for any oth

thehackerwire@mastodon.social at 2026-05-02T05:51:58.000Z ##

🟠 CVE-2026-7641 - High (8.8)

The Import and export users and customers plugin for WordPress is vulnerable to Privilege Escalation in all versions up to and including 2.0.8 via the `save_extra_user_profile_fields()` function. This is due to an incomplete blocklist that correct...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T05:51:58.000Z ##

🟠 CVE-2026-7641 - High (8.8)

The Import and export users and customers plugin for WordPress is vulnerable to Privilege Escalation in all versions up to and including 2.0.8 via the `save_extra_user_profile_fields()` function. This is due to an incomplete blocklist that correct...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6963
(8.8 HIGH)

EPSS: 0.02%

updated 2026-05-02T06:30:30

2 posts

The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wmg_save_provider_config AJAX action in all versions up to, and including, 1.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update SMTP settings and redirect mail which can be used for privilege escalation by triggering a password

thehackerwire@mastodon.social at 2026-05-02T05:51:39.000Z ##

🟠 CVE-2026-6963 - High (8.8)

The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wmg_save_provider_config AJAX action in all versions up to, and including, 1.8. This makes it possible for authenticated attacke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T05:51:39.000Z ##

🟠 CVE-2026-6963 - High (8.8)

The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wmg_save_provider_config AJAX action in all versions up to, and including, 1.8. This makes it possible for authenticated attacke...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7458
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-05-02T05:16:01.420000

4 posts

The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verification_form_wrap_process_otpLogin" function. This makes it possible for unauthenticated attackers to log in as any user with a verified email address, such as

offseq at 2026-05-02T07:30:26.830Z ##

🚨 CRITICAL: CVE-2026-7458 in User Verification by PickPlugins (≤2.0.46) enables auth bypass via weak OTP checks. Attackers can log in as any verified user, including admins. No patch yet — disable or restrict plugin! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-02T05:51:49.000Z ##

🔴 CVE-2026-7458 - Critical (9.8)

The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verificatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-02T07:30:26.000Z ##

🚨 CRITICAL: CVE-2026-7458 in User Verification by PickPlugins (≤2.0.46) enables auth bypass via weak OTP checks. Attackers can log in as any verified user, including admins. No patch yet — disable or restrict plugin! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

thehackerwire@mastodon.social at 2026-05-02T05:51:49.000Z ##

🔴 CVE-2026-7458 - Critical (9.8)

The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verificatio...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43824
(7.7 HIGH)

EPSS: 0.01%

updated 2026-05-02T02:16:00.747000

5 posts

In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows reading cleartext Kubernetes Secret data.

Matchbook3469@mastodon.social at 2026-05-02T23:10:41.000Z ##

🟠 New security advisory:

CVE-2026-43824 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #PatchNow #InfoSecCommunity

##

offseq at 2026-05-02T03:00:27.254Z ##

⚠️ HIGH-severity vuln (CVE-2026-43824) in Argo CD 3.2.0 – 3.2.10 & 3.3.0 – 3.3.8: ServerSideDiff leaks cleartext Kubernetes Secrets. Restrict feature use & monitor for patches. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-02T02:40:59.000Z ##

🟠 CVE-2026-43824 - High (7.7)

In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows reading cleartext Kubernetes Secret data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-02T03:00:27.000Z ##

⚠️ HIGH-severity vuln (CVE-2026-43824) in Argo CD 3.2.0 – 3.2.10 & 3.3.0 – 3.3.8: ServerSideDiff leaks cleartext Kubernetes Secrets. Restrict feature use & monitor for patches. Details: radar.offseq.com/threat/cve-20 #OffSeq #ArgoCD #Kubernetes #Vuln

##

thehackerwire@mastodon.social at 2026-05-02T02:40:59.000Z ##

🟠 CVE-2026-43824 - High (7.7)

In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows reading cleartext Kubernetes Secret data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42786
(0 None)

EPSS: 0.06%

updated 2026-05-02T02:16:00.467000

2 posts

Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthenticated remote denial of service via memory exhaustion. The fragment reassembly path in 'Elixir.Bandit.WebSocket.Connection':handle_frame/3 in lib/bandit/websocket/connection.ex appends every incoming Continuation{fin: false} frame's payload to a per-connection iolist with no cumulative size cap. T

offseq at 2026-05-02T04:30:24.089Z ##

🚨 CVE-2026-42786 (HIGH): mtrudel bandit 0.5.0 – <1.11.0 lets remote attackers cause DoS via unlimited WebSocket continuation frames (resource exhaustion). Affects Phoenix Channels & LiveView. Patch pending — monitor & limit connections. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-02T04:30:24.000Z ##

🚨 CVE-2026-42786 (HIGH): mtrudel bandit 0.5.0 – <1.11.0 lets remote attackers cause DoS via unlimited WebSocket continuation frames (resource exhaustion). Affects Phoenix Channels & LiveView. Patch pending — monitor & limit connections. radar.offseq.com/threat/cve-20 #OffSeq #CVE #Elixir

##

CVE-2026-39804
(0 None)

EPSS: 0.04%

updated 2026-05-02T02:16:00.013000

2 posts

Allocation of Resources Without Limits or Throttling vulnerability in mtrudel bandit allows unauthenticated remote denial of service via memory exhaustion when WebSocket permessage-deflate compression is enabled. 'Elixir.Bandit.WebSocket.PerMessageDeflate':inflate/2 in lib/bandit/websocket/permessage_deflate.ex calls :zlib.inflate/2 with no output-size cap, then materializes the entire decompress

offseq at 2026-05-02T01:30:28.250Z ##

🚨 CVE-2026-39804 (HIGH): mtrudel bandit <1.11.0 allows remote DoS via memory exhaustion if WebSocket permessage-deflate is enabled. Disable compression to mitigate. Affects only non-default configs. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-02T01:30:28.000Z ##

🚨 CVE-2026-39804 (HIGH): mtrudel bandit <1.11.0 allows remote DoS via memory exhaustion if WebSocket permessage-deflate is enabled. Disable compression to mitigate. Affects only non-default configs. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #DoS #Elixir

##

CVE-2026-37530
(7.5 HIGH)

EPSS: 0.01%

updated 2026-05-01T21:32:27

2 posts

AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUEST_PAYLOAD_LENGTH=7) via memcpy at an offset of 1+pid_length (2-3 bytes), resulting in 1-4 bytes of controlled stack overflow. The payload_length field (

thehackerwire@mastodon.social at 2026-05-02T03:12:14.000Z ##

🟠 CVE-2026-37530 - High (7.5)

AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUE...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T03:12:14.000Z ##

🟠 CVE-2026-37530 - High (7.5)

AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUE...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37538
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-01T21:32:27

2 posts

Buffer overflow vulnerability in socketcand 0.4.2 in file socketcand.c in function main allows attackers to cause a denial of service or other unspecified impacts via crafted bus_name.

thehackerwire@mastodon.social at 2026-05-02T02:00:04.000Z ##

🟠 CVE-2026-37538 - High (7.5)

Buffer overflow vulnerability in socketcand 0.4.2 in file socketcand.c in function main allows attackers to cause a denial of service or other unspecified impacts via crafted bus_name.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T02:00:04.000Z ##

🟠 CVE-2026-37538 - High (7.5)

Buffer overflow vulnerability in socketcand 0.4.2 in file socketcand.c in function main allows attackers to cause a denial of service or other unspecified impacts via crafted bus_name.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37534
(9.8 CRITICAL)

EPSS: 0.01%

updated 2026-05-01T21:32:27

2 posts

Integer underflow vulnerability in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Transport_Protocol_Data_Transfer,allows attackers to write to arbitrary memory via crafted sequence number from the CAN frame.

thehackerwire@mastodon.social at 2026-05-02T01:53:28.000Z ##

🔴 CVE-2026-37534 - Critical (9.8)

Integer underflow vulnerability in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Transport_Protocol_Data_Transfer,allows attackers to write to arbitrary memory via crafted sequence number from t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T01:53:28.000Z ##

🔴 CVE-2026-37534 - Critical (9.8)

Integer underflow vulnerability in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Transport_Protocol_Data_Transfer,allows attackers to write to arbitrary memory via crafted sequence number from t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42485
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-01T21:32:27

2 posts

AGL agl-service-can-low-level contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUEST_PAYLOAD_LENGTH=7) via memcpy at an offset of 1+pid_length (2-3 bytes), resulting in 1-4 bytes of controlled stack overflow. The payload_length field (uint8_t) has

thehackerwire@mastodon.social at 2026-05-02T01:00:17.000Z ##

🟠 CVE-2026-42485 - High (7.5)

AGL agl-service-can-low-level contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUEST_PAYLOAD_LE...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T01:00:17.000Z ##

🟠 CVE-2026-42485 - High (7.5)

AGL agl-service-can-low-level contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUEST_PAYLOAD_LE...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63548
(7.5 HIGH)

EPSS: 0.11%

updated 2026-05-01T21:32:27

2 posts

An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a packet specially crafted to bear a non-valid value in any Boolean field.

thehackerwire@mastodon.social at 2026-05-02T00:00:06.000Z ##

🟠 CVE-2025-63548 - High (7.5)

An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a packet specially crafted to bear a non-valid value in any Boolean field.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T00:00:06.000Z ##

🟠 CVE-2025-63548 - High (7.5)

An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a packet specially crafted to bear a non-valid value in any Boolean field.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37457
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-01T21:32:27

2 posts

An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode() function (bgpd/bgp_flowspec_util.c) of FRRouting (FRR) stable/10.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted FlowSpec component.

thehackerwire@mastodon.social at 2026-05-01T23:35:20.000Z ##

🟠 CVE-2026-37457 - High (7.5)

An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode() function (bgpd/bgp_flowspec_util.c) of FRRouting (FRR) stable/10.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted FlowSpec component.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-01T23:35:20.000Z ##

🟠 CVE-2026-37457 - High (7.5)

An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode() function (bgpd/bgp_flowspec_util.c) of FRRouting (FRR) stable/10.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted FlowSpec component.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42473
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-05-01T21:32:22

3 posts

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from the filesystem in the FileHandler object.

Matchbook3469@mastodon.social at 2026-05-02T14:12:10.000Z ##

⛔ New security advisory:

CVE-2026-42473 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #SecurityPatching #HackerNews

##

thehackerwire@mastodon.social at 2026-05-02T04:00:19.000Z ##

🔴 CVE-2026-42473 - Critical (9.8)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from the filesystem in the FileHandler object.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T04:00:19.000Z ##

🔴 CVE-2026-42473 - Critical (9.8)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from the filesystem in the FileHandler object.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22165
(8.1 HIGH)

EPSS: 0.01%

updated 2026-05-01T21:32:22

2 posts

A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger a write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system privileges this could enable further exploits on the device.

thehackerwire@mastodon.social at 2026-05-02T04:42:45.000Z ##

🟠 CVE-2026-22165 - High (8.1)

A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger a write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T04:42:45.000Z ##

🟠 CVE-2026-22165 - High (8.1)

A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger a write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system priv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-30363
(8.4 HIGH)

EPSS: 0.01%

updated 2026-05-01T21:31:26

2 posts

flipperzero-firmware commit ad2a80 was discovered to contain a stack overflow in the "Main" function.

thehackerwire@mastodon.social at 2026-05-01T23:35:01.000Z ##

🟠 CVE-2026-30363 - High (8.4)

flipperzero-firmware commit ad2a80 was discovered to contain a stack overflow in the "Main" function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-01T23:35:01.000Z ##

🟠 CVE-2026-30363 - High (8.4)

flipperzero-firmware commit ad2a80 was discovered to contain a stack overflow in the "Main" function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42482
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-05-01T21:31:20

2 posts

A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule options used with password candidates of 128 or more characters. The vulnerability is caused by a bounds check that fails to account for the 2x expansio

thehackerwire@mastodon.social at 2026-05-02T05:00:17.000Z ##

🔴 CVE-2026-42482 - Critical (9.8)

A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T05:00:17.000Z ##

🔴 CVE-2026-42482 - Critical (9.8)

A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37531
(9.8 CRITICAL)

EPSS: 0.11%

updated 2026-05-01T21:31:20

2 posts

AGL app-framework-main thru 17.1.12 contains a Zip Slip path traversal vulnerability (CWE-22) combined with a TOCTOU race condition (CWE-367) in the widget installation flow. The is_valid_filename function in wgtpkg-zip.c validates ZIP entry names but does not check for dot notation directory traversal sequences it only blocks absolute paths. The zread extraction function uses openat(workdirfd, fi

thehackerwire@mastodon.social at 2026-05-02T03:12:23.000Z ##

🔴 CVE-2026-37531 - Critical (9.8)

AGL app-framework-main thru 17.1.12 contains a Zip Slip path traversal vulnerability (CWE-22) combined with a TOCTOU race condition (CWE-367) in the widget installation flow. The is_valid_filename function in wgtpkg-zip.c validates ZIP entry names...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T03:12:23.000Z ##

🔴 CVE-2026-37531 - Critical (9.8)

AGL app-framework-main thru 17.1.12 contains a Zip Slip path traversal vulnerability (CWE-22) combined with a TOCTOU race condition (CWE-367) in the widget installation flow. The is_valid_filename function in wgtpkg-zip.c validates ZIP entry names...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37537
(8.1 HIGH)

EPSS: 0.01%

updated 2026-05-01T21:31:20

2 posts

collin80/Open-SAE-J1939 thru commit 744024d4306bc387857dfce439558336806acb06 (2023-03-08) contains an integer underflow leading to out-of-bounds write in Transport Protocol Data Transfer handling. At line 23: uint8_t index = data[0] - 1. When data[0] (sequence number from CAN frame) is 0, index underflows to 255. Subsequent write at tp_dt->data[255*7 + i-1] reaches offset 1791, exceeding the MAX_T

thehackerwire@mastodon.social at 2026-05-02T01:59:54.000Z ##

🟠 CVE-2026-37537 - High (8.1)

collin80/Open-SAE-J1939 thru commit 744024d4306bc387857dfce439558336806acb06 (2023-03-08) contains an integer underflow leading to out-of-bounds write in Transport Protocol Data Transfer handling. At line 23: uint8_t index = data[0] - 1. When data...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T01:59:54.000Z ##

🟠 CVE-2026-37537 - High (8.1)

collin80/Open-SAE-J1939 thru commit 744024d4306bc387857dfce439558336806acb06 (2023-03-08) contains an integer underflow leading to out-of-bounds write in Transport Protocol Data Transfer handling. At line 23: uint8_t index = data[0] - 1. When data...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5405
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-01T21:31:20

1 posts

RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution

thehackerwire@mastodon.social at 2026-05-01T01:56:49.000Z ##

🟠 CVE-2026-5405 - High (7.8)

RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37552
(8.4 HIGH)

EPSS: 0.10%

updated 2026-05-01T20:16:23.680000

2 posts

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). No authentication or signature verification exists on the TCP connection. An attacker with access to the localhost TCP port (server binds 127.0.0.1) can

thehackerwire@mastodon.social at 2026-05-02T04:42:35.000Z ##

🟠 CVE-2026-37552 - High (8.4)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T04:42:35.000Z ##

🟠 CVE-2026-37552 - High (8.4)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37536
(8.8 HIGH)

EPSS: 0.01%

updated 2026-05-01T20:16:23.323000

2 posts

miaofng/uds-c commit e506334e270d77b20c0bc259ac6c7d8c9b702b7a (2016-10-05) contains a stack buffer overflow in send_diagnostic_request. A 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) receives memcpy at offset 1+pid_length with payload_length bytes. MAX_UDS_REQUEST_PAYLOAD_LENGTH=7, so 1+2+7=10 exceeds buffer by 4 bytes. No bounds check on payload_length before memcpy.

thehackerwire@mastodon.social at 2026-05-02T01:53:37.000Z ##

🟠 CVE-2026-37536 - High (8.8)

miaofng/uds-c commit e506334e270d77b20c0bc259ac6c7d8c9b702b7a (2016-10-05) contains a stack buffer overflow in send_diagnostic_request. A 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) receives memcpy at offset 1+pid_length with payload_lengt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T01:53:37.000Z ##

🟠 CVE-2026-37536 - High (8.8)

miaofng/uds-c commit e506334e270d77b20c0bc259ac6c7d8c9b702b7a (2016-10-05) contains a stack buffer overflow in send_diagnostic_request. A 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) receives memcpy at offset 1+pid_length with payload_lengt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37526
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-01T20:16:22.500000

2 posts

AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileged supervision commands (Exit, Do, Sclose, Config, Trace, Debug, Token, slist) without authentication via the abstract Unix socket @urn:AGL:afs:supervision:socket. The on_supervision_call function in src/afb-supervision.c dispatches all 8 commands without any credential verification. The abstract soc

thehackerwire@mastodon.social at 2026-05-02T03:00:22.000Z ##

🟠 CVE-2026-37526 - High (7.8)

AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileged supervision commands (Exit, Do, Sclose, Config, Trace, Debug, Token, slist) without authentication via the abstract Unix socket @Urn:AGL:afs:supe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T03:00:22.000Z ##

🟠 CVE-2026-37526 - High (7.8)

AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileged supervision commands (Exit, Do, Sclose, Config, Trace, Debug, Token, slist) without authentication via the abstract Unix socket @Urn:AGL:afs:supe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37525
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-01T20:16:22.353000

2 posts

AGL app-framework-binder (afb-daemon) through v19.90.0 contains a privilege escalation vulnerability in the supervision Do command. The on_supervision_call function in src/afb-supervision.c explicitly nullifies the request credentials by calling afb_context_change_cred(&xreq->context, NULL) before dispatching an attacker-controlled API call via xapi->itf->call(xapi->closure, xreq). The NULL propag

thehackerwire@mastodon.social at 2026-05-02T03:00:06.000Z ##

🟠 CVE-2026-37525 - High (7.8)

AGL app-framework-binder (afb-daemon) through v19.90.0 contains a privilege escalation vulnerability in the supervision Do command. The on_supervision_call function in src/afb-supervision.c explicitly nullifies the request credentials by calling a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T03:00:06.000Z ##

🟠 CVE-2026-37525 - High (7.8)

AGL app-framework-binder (afb-daemon) through v19.90.0 contains a privilege escalation vulnerability in the supervision Do command. The on_supervision_call function in src/afb-supervision.c explicitly nullifies the request credentials by calling a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22167
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-01T20:16:21.470000

2 posts

Software installed and run as a non-privileged user may conduct improper GPU system calls to force GPU to write to arbitrary physical memory pages. Under certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform altering their behaviour. This attack can lead the GPU to perfo

thehackerwire@mastodon.social at 2026-05-02T04:59:56.000Z ##

🟠 CVE-2026-22167 - High (7.8)

Software installed and run as a non-privileged user may conduct improper GPU system calls to force GPU to write to arbitrary physical memory pages.

Under certain circumstances this exploit could be used to corrupt data pages not allocated by th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T04:59:56.000Z ##

🟠 CVE-2026-22167 - High (7.8)

Software installed and run as a non-privileged user may conduct improper GPU system calls to force GPU to write to arbitrary physical memory pages.

Under certain circumstances this exploit could be used to corrupt data pages not allocated by th...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5403
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-01T19:18:04.737000

1 posts

SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution

thehackerwire@mastodon.social at 2026-05-01T00:31:02.000Z ##

🟠 CVE-2026-5403 - High (7.8)

SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42484
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-05-01T19:16:33

2 posts

A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted PKZIP hash file. The issue affects modules 17200, 17210, 17220, 17225, and 17230. When data_type_enum<=1, attacker-controlled hex data from a user-supplied hash string is decoded into a fixed-size buffer without pr

thehackerwire@mastodon.social at 2026-05-02T06:00:19.000Z ##

🔴 CVE-2026-42484 - Critical (9.8)

A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted PKZIP hash file. The issue affects modules 17200, 17210, 1722...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T06:00:19.000Z ##

🔴 CVE-2026-42484 - Critical (9.8)

A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted PKZIP hash file. The issue affects modules 17200, 17210, 1722...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42478
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-01T19:16:32.093000

2 posts

An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input can trigger dereference of a corrupt or unvalidated pointer during shape construction in libTKDEVRML.so.

thehackerwire@mastodon.social at 2026-05-02T05:00:06.000Z ##

🟠 CVE-2026-42478 - High (7.5)

An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T05:00:06.000Z ##

🟠 CVE-2026-42478 - High (7.5)

An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input ca...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42472
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-05-01T19:16:31.153000

3 posts

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from Redis in the RedisHandler object.

Matchbook3469@mastodon.social at 2026-05-02T15:12:31.000Z ##

🔴 New security advisory:

CVE-2026-42472 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-05-02T04:00:07.000Z ##

🔴 CVE-2026-42472 - Critical (9.8)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from Redis in the RedisHandler object.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T04:00:07.000Z ##

🔴 CVE-2026-42472 - Critical (9.8)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from Redis in the RedisHandler object.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42471
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-01T19:16:30.990000

2 posts

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke client (Connection.php:76) calls unserialize() on data received from the server response, enabling client-side RCE if connecting to a malicious server.

thehackerwire@mastodon.social at 2026-05-02T03:59:55.000Z ##

🟠 CVE-2026-42471 - High (8.1)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke client (Connection.php:76) calls unserialize() on data received from the server response, enabling client-side RCE if connecting to a malicious server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T03:59:55.000Z ##

🟠 CVE-2026-42471 - High (8.1)

Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke client (Connection.php:76) calls unserialize() on data received from the server response, enabling client-side RCE if connecting to a malicious server.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-63547
(7.5 HIGH)

EPSS: 0.09%

updated 2026-05-01T19:16:29.050000

2 posts

An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a crafted packet to the MTU length field

thehackerwire@mastodon.social at 2026-05-01T23:59:56.000Z ##

🟠 CVE-2025-63547 - High (7.5)

An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a crafted packet to the MTU length field

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-01T23:59:56.000Z ##

🟠 CVE-2025-63547 - High (7.5)

An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a crafted packet to the MTU length field

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-52347
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-01T19:16:28.113000

2 posts

An issue in the component DirectIo64.sys of PassMark BurnInTest v11.0 Build 1011, OSForensics v11.1 Build 1007, and PerformanceTest v11.1 Build 1004 allows attackers to access kernel memory and escalate privileges via a crafted IOCTL 0x8011E044 call.

thehackerwire@mastodon.social at 2026-05-01T23:35:10.000Z ##

🟠 CVE-2025-52347 - High (7.8)

An issue in the component DirectIo64.sys of PassMark BurnInTest v11.0 Build 1011, OSForensics v11.1 Build 1007, and PerformanceTest v11.1 Build 1004 allows attackers to access kernel memory and escalate privileges via a crafted IOCTL 0x8011E044 call.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-01T23:35:10.000Z ##

🟠 CVE-2025-52347 - High (7.8)

An issue in the component DirectIo64.sys of PassMark BurnInTest v11.0 Build 1011, OSForensics v11.1 Build 1007, and PerformanceTest v11.1 Build 1004 allows attackers to access kernel memory and escalate privileges via a crafted IOCTL 0x8011E044 call.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42483
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-05-01T18:32:32

3 posts

A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerberos-related modules because account_info_len is calculated from untrusted delimiter positions without upper-bound validation before memcpy copies the data

Matchbook3469@mastodon.social at 2026-05-02T16:59:15.000Z ##

🚨 New security advisory:

CVE-2026-42483 affects Hashcat Hashcat.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #VulnerabilityManagement #CyberSec

##

thehackerwire@mastodon.social at 2026-05-02T06:00:08.000Z ##

🔴 CVE-2026-42483 - Critical (9.8)

A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerber...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T06:00:08.000Z ##

🔴 CVE-2026-42483 - Critical (9.8)

A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerber...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42403
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-01T18:32:32

1 posts

Apache Neethi does not properly detect circular references in policy definitions. When a WS-Policy document contains circular policy references (where Policy A references Policy B which references Policy A), the policy normalization process can enter an infinite loop or cause excessive recursion, leading to a stack overflow or application hang. An attacker can craft malicious policy documents with

thehackerwire@mastodon.social at 2026-05-01T09:59:47.000Z ##

🟠 CVE-2026-42403 - High (7.5)

Apache Neethi does not properly detect circular references in policy definitions. When a WS-Policy document contains circular policy references (where Policy A references Policy B which references Policy A), the policy normalization process can en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42402
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-01T18:32:31

1 posts

Apache Neethi is vulnerable to a Denial of Service attack through algorithmic complexity in policy normalization. Specially crafted WS-Policy documents can trigger an exponential Cartesian cross-product expansion during the normalization process, causing unbounded memory allocation that exhausts the JVM heap. This occurs when the normalization process generates an excessive number of policy altern

thehackerwire@mastodon.social at 2026-05-01T10:00:27.000Z ##

🟠 CVE-2026-42402 - High (7.5)

Apache Neethi is vulnerable to a Denial of Service attack through algorithmic complexity in policy normalization. Specially crafted WS-Policy documents can trigger an exponential Cartesian cross-product expansion during the normalization process, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37539
(9.8 CRITICAL)

EPSS: 0.25%

updated 2026-05-01T18:31:36

2 posts

Buffer overflow vulnerability in cannelloni v2.0.0 in CAN frame parsing in parser.cpp in function parseCANFrame, and decoder.cpp in function decodeFrame allowing remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted CAN FD frames.

thehackerwire@mastodon.social at 2026-05-02T02:00:14.000Z ##

🔴 CVE-2026-37539 - Critical (9.8)

Buffer overflow vulnerability in cannelloni v2.0.0 in CAN frame parsing in parser.cpp in function parseCANFrame, and decoder.cpp in function decodeFrame allowing remote attackers to cause a denial of service (crash) or possibly execute arbitrary c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T02:00:14.000Z ##

🔴 CVE-2026-37539 - Critical (9.8)

Buffer overflow vulnerability in cannelloni v2.0.0 in CAN frame parsing in parser.cpp in function parseCANFrame, and decoder.cpp in function decodeFrame allowing remote attackers to cause a denial of service (crash) or possibly execute arbitrary c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37541
(10.0 CRITICAL)

EPSS: 0.19%

updated 2026-05-01T18:31:36

2 posts

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_gvret.cpp, the length field in GVRET binary data is not properly validated, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted GVRET frames.

thehackerwire@mastodon.social at 2026-05-02T01:53:19.000Z ##

🔴 CVE-2026-37541 - Critical (10)

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_gvret.cpp, the length field in GVRET binary data is not properly validated, allowing remote attackers to cause a denial of service or possibly execute ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T01:53:19.000Z ##

🔴 CVE-2026-37541 - Critical (10)

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_gvret.cpp, the length field in GVRET binary data is not properly validated, allowing remote attackers to cause a denial of service or possibly execute ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42469
(8.6 HIGH)

EPSS: 0.14%

updated 2026-05-01T18:31:36

2 posts

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted CANswitch frames.

thehackerwire@mastodon.social at 2026-05-02T01:00:08.000Z ##

🟠 CVE-2026-42469 - High (8.6)

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T01:00:08.000Z ##

🟠 CVE-2026-42469 - High (8.6)

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute a...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42468
(7.5 HIGH)

EPSS: 0.12%

updated 2026-05-01T18:31:36

2 posts

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_pcap.cpp , the parser's phdr.len field is not properly validated, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted PCAP input.

thehackerwire@mastodon.social at 2026-05-02T00:59:59.000Z ##

🟠 CVE-2026-42468 - High (8.8)

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_pcap.cpp , the parser's phdr.len field is not properly validated, allowing remote attackers to cause a denial of service or possibly execute arbitrary ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T00:59:59.000Z ##

🟠 CVE-2026-42468 - High (8.8)

Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_pcap.cpp , the parser's phdr.len field is not properly validated, allowing remote attackers to cause a denial of service or possibly execute arbitrary ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22166
(9.6 CRITICAL)

EPSS: 0.01%

updated 2026-05-01T18:31:31

2 posts

A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system privileges this could enable subsequent exploit on the system.

thehackerwire@mastodon.social at 2026-05-02T04:42:54.000Z ##

🟠 CVE-2026-22166 - High (8.1)

A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system privil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T04:42:54.000Z ##

🟠 CVE-2026-22166 - High (8.1)

A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system privil...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42467
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-01T18:16:15.497000

2 posts

An issue was discovered in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Binary_Data_Transfer_DM16 causing a denial of service via crafted CAN frame on the J1939 bus.

thehackerwire@mastodon.social at 2026-05-02T00:00:17.000Z ##

🟠 CVE-2026-42467 - High (7.5)

An issue was discovered in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Binary_Data_Transfer_DM16 causing a denial of service via crafted CAN frame on the J1939 bus.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T00:00:17.000Z ##

🟠 CVE-2026-42467 - High (7.5)

An issue was discovered in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Binary_Data_Transfer_DM16 causing a denial of service via crafted CAN frame on the J1939 bus.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-37540
(8.4 HIGH)

EPSS: 0.01%

updated 2026-05-01T18:16:15.047000

2 posts

OpenAMP v2025.10.0 ELF loader contains an integer overflow vulnerability in firmware image parsing. In elf_loader.c, it performs multiplication of two attacker-controlled 16-bit values from the ELF header without overflow checking. On 32-bit embedded systems (STM32MP1, Zynq, i.MX), large values can cause the product to wrap around to a small value.

thehackerwire@mastodon.social at 2026-05-02T02:59:56.000Z ##

🟠 CVE-2026-37540 - High (8.4)

OpenAMP v2025.10.0 ELF loader contains an integer overflow vulnerability in firmware image parsing. In elf_loader.c, it performs multiplication of two attacker-controlled 16-bit values from the ELF header without overflow checking. On 32-bit embed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T02:59:56.000Z ##

🟠 CVE-2026-37540 - High (8.4)

OpenAMP v2025.10.0 ELF loader contains an integer overflow vulnerability in firmware image parsing. In elf_loader.c, it performs multiplication of two attacker-controlled 16-bit values from the ELF header without overflow checking. On 32-bit embed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43003
(8.0 HIGH)

EPSS: 0.01%

updated 2026-05-01T15:33:10.820000

1 posts

An issue was discovered in OpenStack ironic-python-agent 1.0.0 through 11.5.0. Ironic Python Agent (IPA) sometimes executes grub-install from within a chroot of the deployed partition image, leading to code execution in the case of a malicious image.

thehackerwire@mastodon.social at 2026-05-01T10:00:07.000Z ##

🟠 CVE-2026-43003 - High (8)

An issue was discovered in OpenStack ironic-python-agent 1.0.0 through 11.5.0. Ironic Python Agent (IPA) sometimes executes grub-install from within a chroot of the deployed partition image, leading to code execution in the case of a malicious image.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6389
(8.8 HIGH)

EPSS: 0.01%

updated 2026-05-01T15:27:15.287000

1 posts

IBM Turbonomic prometurbo agent 8.16.0 through 8.17.6 IBM Turbonomic Application Resource Management grants excessive cluster‑wide permissions, including unrestricted read access to all secrets. An attacker that compromises the operator or its service account can exfiltrate sensitive credentials, escalate privileges, and potentially achieve full cluster compromise.

thehackerwire@mastodon.social at 2026-04-30T23:02:23.000Z ##

🟠 CVE-2026-6389 - High (8.8)

IBM Turbonomic prometurbo agent 8.16.0 through 8.17.6 IBM Turbonomic Application Resource Management grants excessive cluster‑wide permissions, including unrestricted read access to all secrets. An attacker that compromises the operator or its s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7538
(9.8 CRITICAL)

EPSS: 0.89%

updated 2026-05-01T15:26:24.553000

2 posts

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function Vulnerability of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument proto leads to os command injection. The attack may be initiated remotely. The exploit is publicly available and might be used.

offseq@infosec.exchange at 2026-05-01T03:00:27.000Z ##

🚨 CVE-2026-7538 (CRITICAL, CVSS 9.3): Totolink A8000RU 7.1cu.643_b20200521 OS command injection in CGI handler allows unauthenticated remote code execution. No patch — restrict access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #CVE20267538 #IoTSecurity #Vuln

##

thehackerwire@mastodon.social at 2026-05-01T02:24:10.000Z ##

🔴 CVE-2026-7538 - Critical (9.8)

A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function Vulnerability of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument proto leads to os command injecti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7513
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-01T15:26:24.553000

1 posts

A vulnerability has been found in UTT HiPER 1200GW up to 2.5.3-170306. The impacted element is the function strcpy of the file /goform/formRemoteControl. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.

thehackerwire@mastodon.social at 2026-05-01T00:30:52.000Z ##

🟠 CVE-2026-7513 - High (8.8)

A vulnerability has been found in UTT HiPER 1200GW up to 2.5.3-170306. The impacted element is the function strcpy of the file /goform/formRemoteControl. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3772
(8.8 HIGH)

EPSS: 0.02%

updated 2026-05-01T12:30:36

2 posts

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.9.2. This is due to missing nonce verification in the 'add_plugins_page' and 'add_themes_page' functions. This makes it possible for unauthenticated attackers to overwrite arbitrary plugin and theme PHP files with attacker-controlled code via a forged request, granted they can t

thehackerwire@mastodon.social at 2026-05-02T06:00:31.000Z ##

🟠 CVE-2026-3772 - High (8.8)

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.9.2. This is due to missing nonce verification in the 'add_plugins_page' and 'add_themes_page' functions. This makes it possib...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T06:00:31.000Z ##

🟠 CVE-2026-3772 - High (8.8)

The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.9.2. This is due to missing nonce verification in the 'add_plugins_page' and 'add_themes_page' functions. This makes it possib...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42779
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-05-01T12:30:35

4 posts

The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description: Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed. The fix checks if the class is prese

1 repos

https://github.com/dinosn/CVE-2026-42779

Matchbook3469@mastodon.social at 2026-05-02T10:58:27.000Z ##

🚨 New security advisory:

CVE-2026-42779 affects Apache Mina.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #VulnerabilityManagement #CyberSec

##

offseq at 2026-05-02T00:00:38.476Z ##

🚨 CRITICAL: CVE-2026-42779 in Apache MINA (2.1.0 – 2.1.11 & 2.2.0 – 2.2.6) enables remote code execution via deserialization of untrusted data. Upgrade to 2.1.12/2.2.7 now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-02T00:00:38.000Z ##

🚨 CRITICAL: CVE-2026-42779 in Apache MINA (2.1.0 – 2.1.11 & 2.2.0 – 2.2.6) enables remote code execution via deserialization of untrusted data. Upgrade to 2.1.12/2.2.7 now! radar.offseq.com/threat/cve-20 #OffSeq #ApacheMINA #Vuln #Infosec

##

thehackerwire@mastodon.social at 2026-05-01T11:20:56.000Z ##

🔴 CVE-2026-42779 - Critical (9.8)

The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7567
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-05-01T12:30:30

1 posts

The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-login-token' GET parameter is a scalar string before processing it. When the parameter is supplied as an array, PHP's empty() check is bypassed and sanitize_

1 repos

https://github.com/amirhosseinjamshidi64/CVE-2026-7567-POC

thehackerwire@mastodon.social at 2026-05-01T10:21:43.000Z ##

🔴 CVE-2026-7567 - Critical (9.8)

The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-logi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42778
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-05-01T12:30:25

3 posts

The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description: The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed. Affected versions are

Matchbook3469@mastodon.social at 2026-05-02T08:08:37.000Z ##

🔴 New security advisory:

CVE-2026-42778 affects Apache Mina.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #PatchNow #InfoSecCommunity

##

thehackerwire@mastodon.social at 2026-05-01T11:20:46.000Z ##

🔴 CVE-2026-42778 - Critical (9.8)

The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-01T10:30:26.000Z ##

🚨 CRITICAL: CVE-2026-42778 impacts Apache MINA 2.1.X & 2.2.X — deserialization flaw in IoBuffer.getObject() due to incomplete previous fix. Upgrade to 2.1.12 or 2.2.7 to mitigate RCE risk. Details: radar.offseq.com/threat/cve-20 #OffSeq #ApacheMINA #Vuln #AppSec

##

CVE-2026-43001
(7.9 HIGH)

EPSS: 0.01%

updated 2026-05-01T09:30:31

1 posts

An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an attacker holding an unrestricted application credential for project A to create an EC2 credential targeting project B; a subsequent /v3/ec2tokens exchange w

thehackerwire@mastodon.social at 2026-05-01T09:59:57.000Z ##

🟠 CVE-2026-43001 - High (7.9)

An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7584
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-01T09:30:31

2 posts

The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the serialized data without any validation of the target class or restriction on which modules could be imported. An attacker can craft a serialized experime

offseq@infosec.exchange at 2026-05-01T09:00:26.000Z ##

🔒 HIGH-severity in Zurich Instruments LabOne Q (2.41.0, 26.4.0b1): CVE-2026-7584 enables arbitrary code exec via malicious experiment files. No patch yet — open files only from trusted sources. Monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Infosec #LabOneQ

##

thehackerwire@mastodon.social at 2026-05-01T08:18:28.000Z ##

🟠 CVE-2026-7584 - High (7.8)

The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42994(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-05-01T06:30:24

1 posts

Bitwarden CLI 2026.4.0 from 2026-04-22T21:57Z to 2026-04-22T23:30Z, when obtained from npm, had embedded malicious code. This is related to a Checkmarx supply chain incident.

offseq@infosec.exchange at 2026-05-01T06:00:27.000Z ##

🚩 CVE-2026-42994: Bitwarden CLI v2026.4.0 (npm, Apr 2026) has a HIGH severity OS Command Injection (CVSS 8.8) due to a supply chain compromise. No patch yet. Avoid this version & verify installs. More info: radar.offseq.com/threat/cve-20 #OffSeq #Bitwarden #AppSec

##

CVE-2026-7548
(8.8 HIGH)

EPSS: 1.16%

updated 2026-05-01T03:31:30

2 posts

A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This affects the function sub_41A68C of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument setUssd results in command injection. The attack is possible to be carried out remotely. The exploit is now public and may be used.

offseq@infosec.exchange at 2026-05-01T07:30:27.000Z ##

🔥 HIGH severity: CVE-2026-7548 hits Totolink NR1800X (9.1.0u.6279_B20210910) — remote command injection via setUssd in /cgi-bin/cstecgi.cgi. Exploit is public, no patch yet. Disable remote management ASAP! radar.offseq.com/threat/cve-20 #OffSeq #infosec #vuln #IoT

##

thehackerwire@mastodon.social at 2026-05-01T04:06:00.000Z ##

🟠 CVE-2026-7548 - High (8.8)

A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This affects the function sub_41A68C of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument setUssd results in command injection. The attack is possible t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7546
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-05-01T03:31:30

2 posts

A security vulnerability has been detected in Totolink NR1800X 9.1.0u.6279_B20210910. The impacted element is the function find_host_ip of the component lighttpd. Such manipulation of the argument Host leads to stack-based buffer overflow. The attack can be executed remotely. The exploit has been disclosed publicly and may be used.

offseq@infosec.exchange at 2026-05-01T04:30:26.000Z ##

🚨 CRITICAL: CVE-2026-7546 in Totolink NR1800X (v9.1.0u.6279_B20210910) — stack buffer overflow in lighttpd. Remote code execution possible. No patch yet. Limit device exposure & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #CVE #IoTSecurity #infosec

##

thehackerwire@mastodon.social at 2026-05-01T04:05:51.000Z ##

🔴 CVE-2026-7546 - Critical (9.8)

A security vulnerability has been detected in Totolink NR1800X 9.1.0u.6279_B20210910. The impacted element is the function find_host_ip of the component lighttpd. Such manipulation of the argument Host leads to stack-based buffer overflow. The att...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7512
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-01T00:31:36

1 posts

A flaw has been found in UTT HiPER 1200GW up to 2.5.3-1703. The affected element is the function strcpy of the file /goform/formUser. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been published and may be used.

thehackerwire@mastodon.social at 2026-05-01T00:30:43.000Z ##

🟠 CVE-2026-7512 - High (8.8)

A flaw has been found in UTT HiPER 1200GW up to 2.5.3-1703. The affected element is the function strcpy of the file /goform/formUser. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6543
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-01T00:31:31

1 posts

IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute arbitrary commands with the privileges of the process running Langflow. This allows reading sensitive environment variables (API keys, DB credentials), modifying files, or launching further attacks on the internal network.

thehackerwire@mastodon.social at 2026-04-30T23:02:32.000Z ##

🟠 CVE-2026-6543 - High (8.8)

IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute arbitrary commands with the privileges of the process running Langflow. This allows reading sensitive environment variables (API keys, DB credentials), modifying files...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7551
(8.8 HIGH)

EPSS: 0.22%

updated 2026-05-01T00:31:31

1 posts

HKUDS OpenHarness contains a remote code execution vulnerability in the /bridge slash command that allows remote senders accepted by configuration to execute arbitrary operating system commands. Attackers can invoke the /bridge spawn command with attacker-controlled command text that is forwarded to the bridge session manager and executed through the shared shell subprocess helper, allowing them t

thehackerwire@mastodon.social at 2026-04-30T23:02:14.000Z ##

🟠 CVE-2026-7551 - High (8.8)

HKUDS OpenHarness contains a remote code execution vulnerability in the /bridge slash command that allows remote senders accepted by configuration to execute arbitrary operating system commands. Attackers can invoke the /bridge spawn command with ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4503
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-30T21:30:44

1 posts

IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow could allow an unauthenticated user to view other users' images due to an indirect object reference through a user-controlled key.

Matchbook3469@mastodon.social at 2026-05-01T23:30:39.000Z ##

🟠 New security advisory:

CVE-2026-4503 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #ZeroDay #ThreatIntel

##

CVE-2026-41940
(9.8 CRITICAL)

EPSS: 28.36%

updated 2026-04-30T19:51:26.270000

20 posts

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Nuclei template

41 repos

https://github.com/george1-adel/CVE-2026-41940_exploit

https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker

https://github.com/merdw/cPanel-CVE-2026-41940-Scanner

https://github.com/rdyprtmx/poc-cve-2026-41940

https://github.com/AmirrezaMarzban/portscan-CVE-2026-41940

https://github.com/vineet7800/cpanel-malware-cleaner-cve-2026

https://github.com/0xBlackash/CVE-2026-41940

https://github.com/Christian93111/CVE-2026-41940

https://github.com/zedxod/CVE-2026-41940-POC

https://github.com/0dev1337/cpanelscanner

https://github.com/XsanFlip/poc-cpanel-cve-2026-41940

https://github.com/NULL200OK/cve-2026-41940-tool

https://github.com/ThatNotEasy/CVE-2026-41940

https://github.com/0xF55/cve-2026-41940-exploit

https://github.com/ilmndwntr/CVE-2026-41940-MASS-EXPLOIT

https://github.com/Kagantua/cPanelWHM-AuthBypass

https://github.com/devtint/CVE-2026-41940

https://github.com/senyx122/CVE-2026-41940

https://github.com/MrAriaNet/cPanel-Fix

https://github.com/unteikyou/CVE-2026-41940-AuthBypass-Detector

https://github.com/Sachinart/CVE-2026-41940-cpanel-0day

https://github.com/assetnote/cpanel2shell-scanner

https://github.com/Jenderal92/CVE-2026-41940

https://github.com/mahfuzreham/cpanel-cve-2026-41940

https://github.com/linko-iheb/cve-2026-41940-scanner

https://github.com/MrOplus/CVE-2026-41940

https://github.com/0xabdoulaye/CPANEL-CVE-2026-41940

https://github.com/ynsmroztas/cPanelSniper

https://github.com/rfxn/cpanel-sessionscribe

https://github.com/Lutfifakee-Project/CVE-2026-41940

https://github.com/dennisec/CVE-2026-41940

https://github.com/kmaruthisrikar/CVE-2026-41940-cPanel-Auth-Bypass-Exploit

https://github.com/shahidmallaofficial/cpanel-cve-2026-41940-fix

https://github.com/realawaisakbar/CVE-2026-41940-Exploit-PoC

https://github.com/Wesuiliye/CVE-2026-41940

https://github.com/Ishanoshada/CVE-2026-41940-Exploit-PoC

https://github.com/sebinxavi/cve-checker-2026

https://github.com/3tternp/CVE-2026-41940---cPanel-WHM-check

https://github.com/adriyansyah-mf/cve-2026-41940-poc

https://github.com/AndreiG6/cpanel-cve-2026-41940-ioc

https://github.com/YudaSamuel/cpanel-vuln-scanner

undercodenews@mastodon.social at 2026-05-02T22:13:47.000Z ##

cPanel Zero-Day Mass Exploited: “Sorry” Ransomware Hits Thousands of Servers

Introduction A newly disclosed security flaw in cPanel, tracked as CVE-2026-41940, has rapidly turned into a serious global threat. Cybercriminals are reportedly exploiting the vulnerability at scale to compromise web hosting servers, seize access to management panels, and deploy a ransomware strain known as Sorry. The situation escalated so quickly that emergency patches were released this…

undercodenews.com/cpanel-zero-

##

danielmarsh@social.thepixelspulse.com at 2026-05-02T22:13:40.000Z ##

The 'Sorry' ransomware attacks exposed a critical cPanel zero-day (CVE-2026-41940) that allowed root access on millions of domains for over two months. This post goes beyond the patch, detailing the CRLF injection technique, the staggering blast radius, and the multi-layered persistence mechanisms – from SSH keys to hidden SUID binaries – that mean a simple update won't secure your server.…

tpp.blog/2jzg1bi

#cybersecurity #cpanel #sorryransomware

🤖 This post was AI-generated.

##

nemo@mas.to at 2026-05-02T15:03:58.000Z ##

Reports: A critical cPanel & WHM zero-day (CVE-2026-41940) is being actively exploited since Feb—attackers can bypass auth to gain full admin access. Patch immediately. 🔥🔐⚠️ Read: cyberinsider.com/critical-cpan #cPanel #infosec #zeroDay #cybersecurity

##

beyondmachines1 at 2026-05-02T08:01:29.032Z ##

Critical Authentication Bypass in cPanel and WHM Actively Exploited

A critical authentication bypass vulnerability (CVE-2026-41940, CVSS 9.8) in cPanel and WHM is being actively exploited to grant attackers full root access to web servers.

**If you use cPanel or WHM on your servers, this is urgent, you are being hacked. Immediately run /scripts/upcp --force to apply the emergency patch, then verify the version with /usr/local/cpanel/cpanel -V. Until you've confirmed the update, block external access to ports 2083 and 2087. If you are using cPanel as a customer, reach to your hosting provider to confirm that they have updated cPanel.**

beyondmachines.net/event_detai

##

technadu at 2026-05-02T07:36:09.772Z ##

cPanel CVE-2026-41940 now exploited in the wild.
Ransomware cases emerging, millions exposed.
CISA confirms active attacks.

Source: theregister.com/2026/05/01/cri

💬 Thoughts?
Follow @technadu

##

undercodenews@mastodon.social at 2026-05-02T04:22:32.000Z ##

Critical cPanel Zero-Day Leak Sparks Global Server Takeover Fears as Dark Web Exploit Spreads Fast

Introduction: A Silent Cyberstorm Building Beneath the Internet Surface A newly emerging exploit targeting cPanel & WHM systems has begun circulating across underground cybercrime forums, triggering serious concern among cybersecurity researchers and infrastructure administrators. The vulnerability, tracked as CVE-2026-41940, is reportedly being weaponized in…

undercodenews.com/critical-cpa

##

hackernewsrobot@mastodon.social at 2026-05-01T20:11:16.000Z ##

CPanel and WHM Authentication Bypass – CVE-2026-41940 labs.watchtowr.com/the-interne

##

nemo@mas.to at 2026-05-02T15:03:58.000Z ##

Reports: A critical cPanel & WHM zero-day (CVE-2026-41940) is being actively exploited since Feb—attackers can bypass auth to gain full admin access. Patch immediately. 🔥🔐⚠️ Read: cyberinsider.com/critical-cpan #cPanel #infosec #zeroDay #cybersecurity

##

beyondmachines1@infosec.exchange at 2026-05-02T08:01:29.000Z ##

Critical Authentication Bypass in cPanel and WHM Actively Exploited

A critical authentication bypass vulnerability (CVE-2026-41940, CVSS 9.8) in cPanel and WHM is being actively exploited to grant attackers full root access to web servers.

**If you use cPanel or WHM on your servers, this is urgent, you are being hacked. Immediately run /scripts/upcp --force to apply the emergency patch, then verify the version with /usr/local/cpanel/cpanel -V. Until you've confirmed the update, block external access to ports 2083 and 2087. If you are using cPanel as a customer, reach to your hosting provider to confirm that they have updated cPanel.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

technadu@infosec.exchange at 2026-05-02T07:36:09.000Z ##

cPanel CVE-2026-41940 now exploited in the wild.
Ransomware cases emerging, millions exposed.
CISA confirms active attacks.

Source: theregister.com/2026/05/01/cri

💬 Thoughts?
Follow @technadu

#Infosec #ZeroDay #Ransomware

##

AAKL@infosec.exchange at 2026-05-01T17:17:48.000Z ##

New.

Picus: CVE-2026-41940 Explained: The cPanel & WHM Authentication Bypass That Hit 1.5M Servers picussecurity.com/resource/blo #cPanel #infosec #vulnerability

##

lobsters@mastodon.social at 2026-05-01T10:35:10.000Z ##

cPanel & WHM Authentication Bypass (CVE-2026-41940) lobste.rs/s/m8t9px #php #security
labs.watchtowr.com/the-interne

##

hackersnews@mastodon.cesium.pw at 2026-05-01T09:30:04.000Z ##

CPanel and WHM Authentication Bypass – CVE-2026-41940
news.ycombinator.com/item?id=4

#hackernews #tech

##

hn100@social.lansky.name at 2026-05-01T08:55:09.000Z ##

CPanel and WHM Authentication Bypass – CVE-2026-41940

Link: labs.watchtowr.com/the-interne
Discussion: news.ycombinator.com/item?id=4

##

decio@infosec.exchange at 2026-05-01T06:19:40.000Z ##

⚠️ Si vous administrez ou connaissez quelqu’un qui administre un ou des hébergements avec cPanel & WHM, attention : la vulnérabilité critique CVE-2026-41940 ( vulnerability.circl.lu/vuln/CV ) permets à un attaquant distant de contourner l’authentification et d’obtenir un accès administrateur sans identifiants.
L’exploitation se fait via les interfaces HTTPS exposées, sans interaction utilisateur, ce qui en fait un risque immédiat pour les serveurs accessibles depuis Internet.

Ce type de faille est particulièrement recherché par les cybercriminels et par certaines APT gravitant autour de la Russie : prise de contrôle d’hébergements, déploiement de webshells, détournement de domaines, modification DNS/mail, vol de données ou rebond vers d’autres systèmes.

À corriger en priorité : appliquez les versions corrigées, limitez l’accès à cPanel/WHM via VPN ou allowlist IP, et vérifiez les journaux d’accès.

🩹
👇
https://support.cpanel.net/hc/en-us/articles/40073787579671-Security-CVE-2026-41940-cPanel-WHM-WP2-Security-Update-04-28-2026

🔍
👇
https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/

⬇️
https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass/

💬
⬇️
infosec.pub/post/45774673

#CyberVeille #cpanel #CVE_2026_41940

##

rhudaur@flipboard.com at 2026-05-01T03:24:14.000Z ##

'The Internet is falling down': Critical cPanel CRLF injection vulnerability puts tens of millions of websites at risk of total compromise – hosting providers urged to apply CVE-2026-41940 patch immediately
techradar.com/pro/security/the

Posted into The Dark Side of the Internet @the-dark-side-of-the-internet-rhudaur

##

hn50@social.lansky.name at 2026-05-01T03:00:06.000Z ##

CPanel and WHM Authentication Bypass – CVE-2026-41940

Link: labs.watchtowr.com/the-interne
Discussion: news.ycombinator.com/item?id=4

##

ngate@mastodon.social at 2026-05-01T01:32:16.000Z ##

🚨 Oh no! The sky is falling, and it's bringing an #authentication #bypass with it! 🎉 Forget your passwords, folks; cPanel/WHM's got a new way to let anyone in—CVE-2026-41940. 🤡 But don't worry, the experts are on it... by writing cryptic jokes only they understand. 🙄🔒
labs.watchtowr.com/the-interne #cPanel #WHM #CVE-2026-41940 #cybersecurity #humor #HackerNews #ngated

##

h4ckernews@mastodon.social at 2026-05-01T01:32:10.000Z ##

The Internet Is Falling Down- CPanel/WHM Authentication Bypass CVE-2026-41940

labs.watchtowr.com/the-interne

#HackerNews #CPanel #WHM #Security #Vulnerability #Authentication #Bypass #CVE2026-41940 #Cybersecurity

##

SpaceLifeForm@infosec.exchange at 2026-05-01T00:40:08.000Z ##

No wonder why I worry about Wordpress websites.

labs.watchtowr.com/the-interne

##

CVE-2026-34159
(9.8 CRITICAL)

EPSS: 0.49%

updated 2026-04-30T19:18:32.230000

2 posts

llama.cpp is an inference of several LLM models in C/C++. Prior to version b8492, the RPC backend's deserialize_tensor() skips all bounds validation when a tensor's buffer field is 0. An unauthenticated attacker can read and write arbitrary process memory via crafted GRAPH_COMPUTE messages. Combined with pointer leaks from ALLOC_BUFFER/BUFFER_GET_BASE, this gives full ASLR bypass and remote code e

1 repos

https://github.com/casp3r0x0/CVE-2026-34159

hugovalters@mastodon.social at 2026-05-03T00:03:36.000Z ##

CVE-2026-34159: llama.cpp RPC backend has an unauthenticated, no-bounds-check RCE. Zero buffer field in deserialize_tensor() allows arbitrary memory read/write. No auth, low complexity, CVSS 9.8. Patch to b8492 immediately. #infosec #llamacpp #rce

valtersit.com/cve/2026/04/cve-

##

hugovalters@mastodon.social at 2026-05-03T00:03:36.000Z ##

CVE-2026-34159: llama.cpp RPC backend has an unauthenticated, no-bounds-check RCE. Zero buffer field in deserialize_tensor() allows arbitrary memory read/write. No auth, low complexity, CVSS 9.8. Patch to b8492 immediately. #infosec #llamacpp #rce

valtersit.com/cve/2026/04/cve-

##

CVE-2026-4670
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-04-30T18:30:38

1 posts

Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass. This issue affects MOVEit Automation: from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0.

offseq@infosec.exchange at 2026-05-01T00:00:38.000Z ##

🚨 CVE-2026-4670 (CVSS 9.8): CRITICAL auth bypass in MOVEit Automation (2025.0.0 < 2025.0.9, 2024.0.0 < 2024.1.8, prior). Patch pending — restrict access & monitor advisories. No known in-the-wild exploits. radar.offseq.com/threat/cve-20 #OffSeq #MOVEit #CVE20264670

##

CVE-2026-7333
(9.6 CRITICAL)

EPSS: 0.07%

updated 2026-04-30T18:30:10.083000

1 posts

Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T11:32:09.000Z ##

🔴 CVE-2026-7333 - Critical (9.6)

Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7337
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-30T18:28:40.237000

1 posts

Type Confusion in V8 in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T10:00:46.000Z ##

🟠 CVE-2026-7337 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7338
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-30T18:28:23.367000

1 posts

Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to potentially exploit heap corruption via malicious network traffic. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T10:46:47.000Z ##

🟠 CVE-2026-7338 - High (7.5)

Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to potentially exploit heap corruption via malicious network traffic. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7346
(8.1 HIGH)

EPSS: 0.03%

updated 2026-04-30T18:28:04.463000

1 posts

Inappropriate implementation in Tint in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T08:10:02.000Z ##

🟠 CVE-2026-7346 - High (8.1)

Inappropriate implementation in Tint in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7339
(8.8 HIGH)

EPSS: 0.06%

updated 2026-04-30T18:26:41.267000

1 posts

Heap buffer overflow in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-01T10:46:56.000Z ##

🟠 CVE-2026-7339 - High (8.8)

Heap buffer overflow in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7352
(8.3 HIGH)

EPSS: 0.02%

updated 2026-04-30T16:40:08.557000

1 posts

Use after free in Media in Google Chrome on Android prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T09:00:10.000Z ##

🟠 CVE-2026-7352 - High (8.3)

Use after free in Media in Google Chrome on Android prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7354
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-30T16:38:18.927000

1 posts

Out of bounds read and write in Angle in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T09:03:54.000Z ##

🟠 CVE-2026-7354 - High (8.8)

Out of bounds read and write in Angle in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7356
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-30T16:38:03.603000

1 posts

Use after free in Navigation in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T05:00:26.000Z ##

🟠 CVE-2026-7356 - High (8.8)

Use after free in Navigation in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7357
(7.5 HIGH)

EPSS: 0.02%

updated 2026-04-30T16:37:58.563000

1 posts

Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T08:00:12.000Z ##

🟠 CVE-2026-7357 - High (7.5)

Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7343
(7.5 HIGH)

EPSS: 0.07%

updated 2026-04-30T16:36:22.073000

1 posts

Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-01T11:00:23.000Z ##

🟠 CVE-2026-7343 - High (7.5)

Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7345
(8.3 HIGH)

EPSS: 0.09%

updated 2026-04-30T16:36:06.133000

2 posts

Insufficient validation of untrusted input in Feedback in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T08:43:24.000Z ##

🟠 CVE-2026-7345 - High (8.3)

Insufficient validation of untrusted input in Feedback in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-01T08:09:59.000Z ##

🟠 CVE-2026-7345 - High (8.3)

Insufficient validation of untrusted input in Feedback in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42512
(7.3 HIGH)

EPSS: 0.09%

updated 2026-04-30T15:31:41

2 posts

As dhclient is building an environment to pass to dhclient-script, it may need to resize the array of string pointers. The code which expands the array incorrectly calculates its new size when requesting memory, resulting in a heap buffer overrun. A specially crafted packet can cause dhclient to overrun its buffer of environment entries. This can result in a crash, but it may be possible to lev

thehackerwire@mastodon.social at 2026-05-02T08:00:14.000Z ##

🟠 CVE-2026-42512 - High (8.1)

As dhclient is building an environment to pass to dhclient-script, it may need to resize the array of string pointers. The code which expands the array incorrectly calculates its new size when requesting memory, resulting in a heap buffer overrun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T08:00:14.000Z ##

🟠 CVE-2026-42512 - High (8.1)

As dhclient is building an environment to pass to dhclient-script, it may need to resize the array of string pointers. The code which expands the array incorrectly calculates its new size when requesting memory, resulting in a heap buffer overrun...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42511
(7.3 HIGH)

EPSS: 0.04%

updated 2026-04-30T15:31:40

2 posts

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it. A rogue DHCP server may be able to execute arbirary code as roo

thehackerwire@mastodon.social at 2026-05-02T08:00:24.000Z ##

🟠 CVE-2026-42511 - High (8.1)

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T08:00:24.000Z ##

🟠 CVE-2026-42511 - High (8.1)

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42524
(8.0 HIGH)

EPSS: 0.04%

updated 2026-04-30T15:11:12.703000

1 posts

Jenkins HTML Publisher Plugin 427 and earlier does not escape job name and URL in the legacy wrapper file, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

thehackerwire@mastodon.social at 2026-05-01T03:00:02.000Z ##

🟠 CVE-2026-42524 - High (8)

Jenkins HTML Publisher Plugin 427 and earlier does not escape job name and URL in the legacy wrapper file, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7446
(7.3 HIGH)

EPSS: 0.85%

updated 2026-04-30T14:52:54.847000

2 posts

A vulnerability was detected in VetCoders mcp-server-semgrep 1.0.0. This affects the function analyze_results/filter_results/export_results/compare_results/scan_directory/create_rule of the file src/index.ts of the component MCP Interface. The manipulation of the argument ID results in os command injection. The attack can be executed remotely. The exploit is now public and may be used. Upgrading t

vitobotta@mastodon.social at 2026-05-02T21:13:08.000Z ##

Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.

Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.

nvd.nist.gov/vuln/detail/CVE-2

##

vitobotta@mastodon.social at 2026-05-02T21:13:08.000Z ##

Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.

Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-7416
(7.3 HIGH)

EPSS: 0.19%

updated 2026-04-30T14:52:54.847000

2 posts

A vulnerability was found in PolarVista xcode-mcp-server 1.0.0. This issue affects the function build_project/run_tests of the file src/index.ts of the component MCP Interface. The manipulation of the argument Request results in os command injection. The attack may be launched remotely. The exploit has been made public and could be used. The project was informed of the problem early through an iss

vitobotta@mastodon.social at 2026-05-02T21:13:08.000Z ##

Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.

Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.

nvd.nist.gov/vuln/detail/CVE-2

##

vitobotta@mastodon.social at 2026-05-02T21:13:08.000Z ##

Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.

Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.

nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-7359
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-29T21:31:26

1 posts

Use after free in ANGLE in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T08:00:32.000Z ##

🟠 CVE-2026-7359 - High (8.8)

Use after free in ANGLE in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7358
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-29T21:31:26

1 posts

Use after free in Animation in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T08:00:21.000Z ##

🟠 CVE-2026-7358 - High (8.8)

Use after free in Animation in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35029
(8.8 HIGH)

EPSS: 13.30%

updated 2026-04-29T20:16:30.070000

1 posts

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. Prior to 1.83.0, the /config/update endpoint does not enforce admin role authorization. A user who is already authenticated into the platform can then use this endpoint to modify proxy configuration and environment variables, register custom pass-through endpoint handlers pointing to attacker-controlled Python co

Nuclei template

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-41635
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-04-29T19:08:21.840000

1 posts

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types) does not check the class at all, bypassing the classname allowlist and allowing arbitrary code to be executed. The fix checks if the class is present in the accepted class filter before calling Class.forName().  Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0

thehackerwire@mastodon.social at 2026-05-01T11:20:56.000Z ##

🔴 CVE-2026-42779 - Critical (9.8)

The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:

Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7363
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-29T15:31:46

1 posts

Use after free in Canvas in Google Chrome on Linux, ChromeOS prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-01T08:09:53.000Z ##

🟠 CVE-2026-7363 - High (8.8)

Use after free in Canvas in Google Chrome on Linux, ChromeOS prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7353
(8.3 HIGH)

EPSS: 0.02%

updated 2026-04-29T15:31:45

1 posts

Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T09:03:44.000Z ##

🟠 CVE-2026-7353 - High (8.3)

Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7349
(7.5 HIGH)

EPSS: 0.00%

updated 2026-04-29T15:31:45

1 posts

Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T08:59:51.000Z ##

🟠 CVE-2026-7349 - High (7.5)

Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7361
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-29T15:31:45

2 posts

Use after free in iOS in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-01T08:43:15.000Z ##

🟠 CVE-2026-7361 - High (8.8)

Use after free in iOS in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-01T08:09:50.000Z ##

🟠 CVE-2026-7361 - High (8.8)

Use after free in iOS in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40560
(7.5 HIGH)

EPSS: 0.03%

updated 2026-04-29T15:31:45

1 posts

Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence. Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 7230 3.3.3, Transfer-Encoding must take precedence. An attacker could exploit this to smuggle malicious HTTP requests via a front-end reverse proxy.

thehackerwire@mastodon.social at 2026-05-01T05:00:07.000Z ##

🟠 CVE-2026-40560 - High (7.5)

Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence.

Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 723...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7344
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-29T15:31:44

1 posts

Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-01T11:00:33.000Z ##

🟠 CVE-2026-7344 - High (8.8)

Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7342
(8.8 HIGH)

EPSS: 0.07%

updated 2026-04-29T15:31:44

1 posts

Use after free in WebView in Google Chrome on Android prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T11:00:13.000Z ##

🟠 CVE-2026-7342 - High (8.8)

Use after free in WebView in Google Chrome on Android prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7341
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-29T15:31:44

1 posts

Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T10:47:06.000Z ##

🟠 CVE-2026-7341 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7336
(8.8 HIGH)

EPSS: 0.02%

updated 2026-04-29T15:31:44

1 posts

Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T10:00:37.000Z ##

🟠 CVE-2026-7336 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7335
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-29T15:31:44

1 posts

Use after free in media in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T09:04:04.000Z ##

🟠 CVE-2026-7335 - High (8.8)

Use after free in media in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7350
(8.3 HIGH)

EPSS: 0.02%

updated 2026-04-29T15:31:44

1 posts

Use after free in WebMIDI in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T09:00:00.000Z ##

🟠 CVE-2026-7350 - High (8.3)

Use after free in WebMIDI in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7347
(8.1 HIGH)

EPSS: 0.05%

updated 2026-04-29T15:31:44

2 posts

Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T08:43:33.000Z ##

🟠 CVE-2026-7347 - High (8.1)

Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-01T08:10:08.000Z ##

🟠 CVE-2026-7347 - High (8.1)

Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7348
(8.8 HIGH)

EPSS: 0.03%

updated 2026-04-29T15:31:44

1 posts

Use after free in Codecs in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-01T08:10:11.000Z ##

🟠 CVE-2026-7348 - High (8.8)

Use after free in Codecs in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7355
(8.8 HIGH)

EPSS: 0.08%

updated 2026-04-29T15:31:44

1 posts

Use after free in Media in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-01T05:00:16.000Z ##

🟠 CVE-2026-7355 - High (8.8)

Use after free in Media in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42523
(9.0 None)

EPSS: 0.04%

updated 2026-04-29T15:30:48

1 posts

Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability exploitable by non-anonymous attackers with Overall/Read permission.

thehackerwire@mastodon.social at 2026-05-01T01:57:10.000Z ##

🔴 CVE-2026-42523 - Critical (9)

Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41220
(7.8 HIGH)

EPSS: 0.01%

updated 2026-04-29T15:30:40

1 posts

Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect Cloud Agent (Windows) before build 42183.

thehackerwire@mastodon.social at 2026-04-30T22:07:18.000Z ##

🟠 CVE-2026-41220 - High (7.8)

Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect Cloud Agent (Windows) before build 42183.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5140
(8.8 HIGH)

EPSS: 0.05%

updated 2026-04-29T15:30:39

1 posts

Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus allows Authentication Bypass. This issue affects Pardus: from <=0.6.4 before 0.8.0.

thehackerwire@mastodon.social at 2026-05-01T03:00:13.000Z ##

🟠 CVE-2026-5140 - High (8.8)

Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus allows Authentication Bypass.

This issue affects Pardus: from &lt;=0.6.4 before 0.8.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42520
(7.5 HIGH)

EPSS: 0.34%

updated 2026-04-29T15:30:39

1 posts

Jenkins Credentials Binding Plugin 719.v80e905ef14eb_ and earlier does not sanitize file names for file and zip file credentials, allowing attackers able to provide credentials to a job to write files to arbitrary locations on the node filesystem, which can lead to remote code execution if Jenkins is configured to allow a low-privileged user to configure file or zip file credentials used for a job

thehackerwire@mastodon.social at 2026-05-01T01:57:00.000Z ##

🟠 CVE-2026-42520 - High (7.5)

Jenkins Credentials Binding Plugin 719.v80e905ef14eb_ and earlier does not sanitize file names for file and zip file credentials, allowing attackers able to provide credentials to a job to write files to arbitrary locations on the node filesystem,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42646
(7.6 HIGH)

EPSS: 0.03%

updated 2026-04-29T12:33:14

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Steve Burge TaxoPress simple-tags allows Blind SQL Injection.This issue affects TaxoPress: from n/a through <= 3.44.0.

thehackerwire@mastodon.social at 2026-05-01T03:00:22.000Z ##

🟠 CVE-2026-42646 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Steve Burge TaxoPress simple-tags allows Blind SQL Injection.This issue affects TaxoPress: from n/a through &lt;= 3.44.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-3854
(8.8 HIGH)

EPSS: 0.30%

updated 2026-04-28T21:35:58

7 posts

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delim

4 repos

https://github.com/lysophavin18/CVE-2026-3854-PoC

https://github.com/LACHHAB-Anas/Exploit_CVE-2026-3854

https://github.com/5kr1pt/CVE-2026-3854

https://github.com/simondankelmann/cve-2026-3854-test

felhasznalo@social.99113377.xyz at 2026-05-02T21:07:49.000Z ##

prog.hu/hirek/7088/github-cve-

#magyar #hungarian #GitHub

##

mastokukei@social.josko.org at 2026-05-02T18:01:56.000Z ##

kernel vulnerability (CVE-2026-31431)**: "Copy Fail" exploit granting root access.
- **PostgreSQL updates**: Releases of PgQue v0.1, pgexporter 0.8, pgmoneta 0.21, and PostgreSQL 19 feature freeze.
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), migrations to alternatives like Codeberg and Radicle. [2/2]

##

mastokukei@social.josko.org at 2026-05-02T18:01:46.000Z ##

Fail")**
- Critical local privilege escalation exploit affecting major Linux distributions
- Patch status and responses from various Linux distros (Debian, Fedora, Ubuntu, etc.)

3. **Arduino and ESP32 Libraries**
- New releases for sensors, robotics, and IoT projects (e.g., TMT_SmartConnect, ScioSense_ENS17x, Windnerd_Core)

4. **GitHub Reliability and Alternatives**
- Frequent outages, security vulnerabilities (e.g., CVE-2026-3854)
- Migrations to [2/3]

##

mastokukei@social.josko.org at 2026-05-02T09:01:53.000Z ##

Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei masto.kukei.eu/browse/programm category:
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), migrations to alternatives like Codeberg and Radicle.
- **PostgreSQL updates**: Releases of PgQue v0.1, pgexporter 0.8, pgmoneta 0.21, and discussions on PostgreSQL 19 feature freeze.
- **Linux kernel vulnerability (CVE-2026-31431)**: "Copy [1/2]

##

mastokukei@social.josko.org at 2026-05-02T09:01:44.000Z ##

releases for TMT_SmartConnect, ScioSense_ENS17x, ATD3.5-S3_HandySense, ESP32_Host_MIDI, and others.
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), and migrations to alternatives like Codeberg and Radicle.
- **Ubuntu/Canonical DDoS attack**: Prolonged outages affecting Ubuntu websites, Snap store, and Launchpad. [2/2]

##

ChrisShort@hachyderm.io at 2026-05-01T23:34:31.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog #devopsish wiz.io/blog/github-rce-vulnera

##

ChrisShort@hachyderm.io at 2026-05-01T23:34:31.000Z ##

GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog #devopsish wiz.io/blog/github-rce-vulnera

##

CVE-2026-38834
(7.3 HIGH)

EPSS: 13.21%

updated 2026-04-27T16:44:38.997000

1 posts

Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerability in the do_ping_action function via the hostName parameter. This vulnerability allows attackers to execute arbitrary commands via a crafted request.

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-39987
(9.8 CRITICAL)

EPSS: 56.09%

updated 2026-04-27T16:30:09

1 posts

## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal WebSocket endpoint `/terminal/ws` lacks authentication validation, allowing an unauthenticated attacker to obtain a full PTY shell and execute arbitrary system commands. Unlike other WebSocket endpoints (e.g., `/ws`) that correctly call `validate_auth()` for authentication, the `/terminal/ws` endpoint only checks the

Nuclei template

7 repos

https://github.com/mki9/CVE-2026-39987_exploit

https://github.com/fevar54/marimo_CVE-2026-39987_RCE_PoC

https://github.com/Dhiaelhak-Rached/CVE-2026-39987-lab-or-marimo-cve-lab

https://github.com/0xBlackash/CVE-2026-39987

https://github.com/h3raklez/CVE-2026-39987

https://github.com/Nxploited/CVE-2026-39987

https://github.com/keraattin/CVE-2026-39987

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-41409
(9.8 CRITICAL)

EPSS: 0.14%

updated 2026-04-27T12:30:39

1 posts

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allowed to be deserialized was applied too late after a static initializer in a class to be read might already have been executed. Affected versions are Apache MINA 2.0.0 <= 2.0.27, 2.1.0 <= 2.1.10, and 2.2.0 <= 2.2.5. The problem is resolved in Apache MINA 2.0.28, 2.1.

thehackerwire@mastodon.social at 2026-05-01T11:20:46.000Z ##

🔴 CVE-2026-42778 - Critical (9.8)

The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-29635
(8.8 HIGH)

EPSS: 69.69%

updated 2026-04-24T18:30:36

1 posts

A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an authorized attacker to execute arbitrary commands on remote devices by sending a POST request to /goform/set_prohibiting via the corresponding function, triggering remote command execution.

CVE-2026-40912(CVSS UNKNOWN)

EPSS: 0.06%

updated 2026-04-24T16:37:54

2 posts

## Summary There is a high severity authentication bypass vulnerability in Traefik's `StripPrefixRegex` middleware when used in combination with `ForwardAuth`, `BasicAuth`, or `DigestAuth`. The middleware matches the regex against the decoded URL path but uses the resulting byte length to slice the percent-encoded raw path. When a dot (or multiple dots) appears in the prefix portion of the URL,

thehackerwire@mastodon.social at 2026-05-02T07:00:22.000Z ##

🟠 CVE-2026-40912 - High (8.2)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's StripPrefixRegex middleware when used in combination with ForwardAuth,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T07:00:22.000Z ##

🟠 CVE-2026-40912 - High (8.2)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's StripPrefixRegex middleware when used in combination with ForwardAuth,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39858(CVSS UNKNOWN)

EPSS: 0.05%

updated 2026-04-24T16:33:44

2 posts

## Summary There is a high severity authentication bypass vulnerability in Traefik's `ForwardAuth` and snippet-based authentication middleware. Traefik's forwarded-header sanitization logic targets only canonical header names (e.g., `X-Forwarded-Proto`) and does not strip or normalize alias variants that use underscores instead of dashes (e.g., `X_Forwarded_Proto`). These unsanitized alias header

thehackerwire@mastodon.social at 2026-05-02T07:00:12.000Z ##

🔴 CVE-2026-39858 - Critical (10)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's for...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T07:00:12.000Z ##

🔴 CVE-2026-39858 - Critical (10)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's for...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35051(CVSS UNKNOWN)

EPSS: 0.01%

updated 2026-04-24T16:31:25

2 posts

## Summary There is a high-severity authentication bypass vulnerability in Traefik's `ForwardAuth` middleware when `trustForwardHeader=false` is configured and Traefik is deployed behind a trusted upstream proxy. While `X-Forwarded-*` headers (such as `X-Forwarded-For`, `X-Forwarded-Host`, and `X-Forwarded-Proto`) from trusted context are correctly rebuilt, it does not strip or rebuild `X-Forwar

thehackerwire@mastodon.social at 2026-05-02T07:00:01.000Z ##

🔴 CVE-2026-35051 - Critical (10)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is an authentication bypass vulnerability in Traefik's ForwardAuth middleware when trustForwardHeader=false is configured and Traefik is d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-02T07:00:01.000Z ##

🔴 CVE-2026-35051 - Critical (10)

Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is an authentication bypass vulnerability in Traefik's ForwardAuth middleware when trustForwardHeader=false is configured and Traefik is d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39808
(9.8 CRITICAL)

EPSS: 13.10%

updated 2026-04-22T15:32:37

1 posts

A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

Nuclei template

4 repos

https://github.com/ynsmroztas/FortiSandbox-RCE-Exploit-CVE-2026-39808

https://github.com/Lechansky/CVE-2026-39808

https://github.com/samu-delucas/CVE-2026-39808

https://github.com/0xBlackash/CVE-2026-39808

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4747
(8.8 HIGH)

EPSS: 0.09%

updated 2026-04-20T13:47:31.163000

2 posts

Each RPCSEC_GSS data packet is validated by a routine which checks a signature in the packet. This routine copies a portion of the packet into a stack buffer, but fails to ensure that the buffer is sufficiently large, and a malicious client can trigger a stack overflow. Notably, this does not require the client to authenticate itself first. As kgssapi.ko's RPCSEC_GSS implementation is vulnerabl

2 repos

https://github.com/kaleth4/CVE-2026-4747

https://github.com/kaleth4/CVE-2026-4747-

grahamperrin@bsd.cafe at 2026-05-02T08:13:39.000Z ##

It's fair to say that <nitter.net/cperciva/status/204>, a few hours before Gary's video, was not bullshit:

" In April, FreeBSD issued eight security advisories. Six of them were for issues found by AI."

Colin Percival quotes his own post from March 2026:

"… LLMs are producing lots of slop, but they're also finding a heck of a lot of real vulnerabilities."

@seuros if you disagree with CWE-121 – the Common Weakness Enumeration (CWE™) for CVE-2026-4747 – you might contact MITRE – <cve.org/CVERecord?id=CVE-2026->.

Cc @garyhtech @cperciva@mastodon.social

@cperciva@bird.makeup (automated)

#AI #FreeBSD #vulnerability #Anthropic #Claude #Mythos #security #infosec

##

grahamperrin@bsd.cafe at 2026-05-02T08:13:39.000Z ##

It's fair to say that <nitter.net/cperciva/status/204>, a few hours before Gary's video, was not bullshit:

" In April, FreeBSD issued eight security advisories. Six of them were for issues found by AI."

Colin Percival quotes his own post from March 2026:

"… LLMs are producing lots of slop, but they're also finding a heck of a lot of real vulnerabilities."

@seuros if you disagree with CWE-121 – the Common Weakness Enumeration (CWE™) for CVE-2026-4747 – you might contact MITRE – <cve.org/CVERecord?id=CVE-2026->.

Cc @garyhtech @cperciva@mastodon.social

@cperciva@bird.makeup (automated)

#AI #FreeBSD #vulnerability #Anthropic #Claude #Mythos #security #infosec

##

CVE-2026-2262
(7.5 HIGH)

EPSS: 29.11%

updated 2026-04-18T00:31:10

1 posts

The Easy Appointments plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.12.21 via the `/wp-json/wp/v2/eablocks/ea_appointments/` REST API endpoint. This is due to the endpoint being registered with `'permission_callback' => '__return_true'`, which allows access without any authentication or authorization checks. This makes it possible for

Nuclei template

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-4659
(7.5 HIGH)

EPSS: 0.04%

updated 2026-04-17T09:31:18

1 posts

The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbitrary File Read via the Repeater JSON/CSV URL parameter in versions up to, and including, 2.0.6. This is due to insufficient path traversal sanitization in the URLtoRelative() and urlToPath() functions, combined with the ability to enable debug output in widget settings. The URLtoRelative() function only performs a simp

hugovalters@mastodon.social at 2026-05-02T20:19:16.000Z ##

CVE-2026-4659: Unlimited Elements plugin <=2.0.6 allows any Author to read arbitrary files via path traversal in URLtoRelative(). No patch exists. Fix your own damn code or pull the plugin. #InfoSec #WordPress

valtersit.com/cve/2026/04/cve-

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 66.67%

updated 2026-04-16T21:49:17

1 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

9 repos

https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-

https://github.com/hg0434hongzh0/CVE-2026-34197

https://github.com/dinosn/CVE-2026-34197

https://github.com/keraattin/CVE-2026-34197

https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197

https://github.com/0xBlackash/CVE-2026-34197

https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

https://github.com/DEVSECURITYSPRO/CVE-2026-34197

https://github.com/Catherines77/ActiveMQ-EXPtools

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-3396
(7.5 HIGH)

EPSS: 16.99%

updated 2026-04-08T12:31:36

1 posts

WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL Injection via the 'post-author' parameter in all versions up to, and including, 4.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queri

Nuclei template

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-35616
(9.8 CRITICAL)

EPSS: 41.37%

updated 2026-04-06T18:12:57.863000

1 posts

A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through 7.4.6 may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests.

Nuclei template

7 repos

https://github.com/0xBlackash/CVE-2026-35616

https://github.com/fevar54/forticlient_ems_cve_2026_35616_poc.py

https://github.com/keraattin/CVE-2026-35616

https://github.com/BishopFox/CVE-2026-35616-check

https://github.com/fevar54/CVE-2026-35616-detector.py

https://github.com/Alaatk/CVE-2026-35616

https://github.com/wa6n3r/CVE-2026-35616

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-29014
(9.8 CRITICAL)

EPSS: 17.07%

updated 2026-04-03T18:32:15

1 posts

MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injection vulnerability that allows remote attackers to execute arbitrary code by sending crafted requests with malicious PHP code. Attackers can exploit insufficient input neutralization in the execution path to achieve remote code execution and gain full control over the affected server.

Nuclei template

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2026-2699
(9.8 CRITICAL)

EPSS: 23.78%

updated 2026-04-02T15:31:40

1 posts

Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthenticated attacker to access restricted configuration pages. This leads to changing system configuration and potential remote code execution.

Nuclei template

2 repos

https://github.com/0xBlackash/CVE-2026-2699

https://github.com/watchtowrlabs/watchTowr-vs-Progress-ShareFile-CVE-2026-2699

secdb@infosec.exchange at 2026-05-01T00:02:03.000Z ##

📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at secdb.nttzen.cloud/dashboard

Total CVEs: 5807

Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219

Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56

Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102

Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111

Top EPSS Score:
- CVE-2026-34197 - 65.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39987 - 55.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35616 - 41.37 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2262 - 29.11 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-2699 - 23.78 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-29014 - 17.07 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-3396 - 16.99 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-35029 - 13.30 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-38834 - 13.21 % (secdb.nttzen.cloud/cve/detail/)
- CVE-2026-39808 - 11.27 % (secdb.nttzen.cloud/cve/detail/)

##

CVE-2025-55182
(10.0 CRITICAL)

EPSS: 82.01%

updated 2025-12-09T16:53:25

2 posts

### Impact There is an unauthenticated remote code execution vulnerability in React Server Components. We recommend upgrading immediately. The vulnerability is present in versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 of: * [react-server-dom-webpack](https://www.npmjs.com/package/react-server-dom-webpack) * [react-server-dom-parcel](https://www.npmjs.com/package/react-server-dom-parcel) * [react-s

Nuclei template

100 repos

https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell

https://github.com/freeqaz/react2shell

https://github.com/techgaun/cve-2025-55182-scanner

https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc

https://github.com/hoosin/CVE-2025-55182

https://github.com/c0rydoras/CVE-2025-55182

https://github.com/kOaDT/poc-cve-2025-55182

https://github.com/ejpir/CVE-2025-55182-bypass

https://github.com/shyambhanushali/React2Shell

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182-The-Deserialization-Bug-That-Broke-the-Web

https://github.com/ynsmroztas/NextRce

https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182

https://github.com/shamo0/react2shell-PoC

https://github.com/keklick1337/CVE-2025-55182-golang-PoC

https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool

https://github.com/zzhorc/CVE-2025-55182

https://github.com/Cillian-Collins/CVE-2025-55182

https://github.com/dwisiswant0/CVE-2025-55182

https://github.com/Pizz33/CVE-2025-55182-burpscanner

https://github.com/sudo-Yangziran/CVE-2025-55182POC

https://github.com/AliHzSec/CVE-2025-55182

https://github.com/MoLeft/React2Shell-Toolbox

https://github.com/EynaExp/CVE-2025-55182-POC

https://github.com/songsanggggg/CVE-2025-55182

https://github.com/subhdotsol/CVE-2025-55182

https://github.com/kavienanj/CVE-2025-55182

https://github.com/hexsh1dow/CVE-2025-55182

https://github.com/heiheishushu/rsc_detect_CVE-2025-55182

https://github.com/emredavut/CVE-2025-55182

https://github.com/Spritualkb/CVE-2025-55182-exp

https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script

https://github.com/kondukto-io/vulnerable-next-js-poc

https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension

https://github.com/VeilVulp/RscScan-cve-2025-55182

https://github.com/nehkark/CVE-2025-55182

https://github.com/cybertechajju/R2C-CVE-2025-55182-66478

https://github.com/Security-Phoenix-demo/react2shell-scanner-rce-react-next-CVE-2025-55182-CVE-2025-66478

https://github.com/rix4uni/CVE-2025-55182

https://github.com/yanoshercohen/React2Shell_CVE-2025-55182

https://github.com/Updatelap/CVE-2025-55182

https://github.com/xalgord/React2Shell

https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell

https://github.com/santihabib/CVE-2025-55182-analysis

https://github.com/whiteov3rflow/CVE-2025-55182-poc

https://github.com/assetnote/react2shell-scanner

https://github.com/alfazhossain/CVE-2025-55182-Exploiter

https://github.com/MemerGamer/CVE-2025-55182

https://github.com/sumanrox/rschunter

https://github.com/zack0x01/vuln-app-CVE-2025-55182

https://github.com/gensecaihq/react2shell-scanner

https://github.com/LemonTeatw1/CVE-2025-55182-exploit

https://github.com/websecuritylabs/React2Shell-Library

https://github.com/Archerkong/CVE-2025-55182

https://github.com/jctommasi/react2shellVulnApp

https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension

https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js

https://github.com/RuoJi6/CVE-2025-55182-RCE-shell

https://github.com/Rsatan/Next.js-Exploit-Tool

https://github.com/zr0n/react2shell

https://github.com/vulncheck-oss/cve-2025-55182

https://github.com/jf0x3a/CVE-2025-55182-exploit

https://github.com/sickwell/CVE-2025-55182

https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-

https://github.com/hidden-investigations/react2shell-scanner

https://github.com/hualy13/CVE-2025-55182

https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive

https://github.com/alsaut1/react2shell-lab

https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182

https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182

https://github.com/msanft/CVE-2025-55182

https://github.com/mrknow001/RSC_Detector

https://github.com/ThemeHackers/CVE-2025-55182

https://github.com/fatguru/CVE-2025-55182-scanner

https://github.com/hackersatyamrastogi/react2shell-ultimate

https://github.com/l4rm4nd/CVE-2025-55182

https://github.com/TrixSec/CVE-2025-55182-Scanner

https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182

https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-

https://github.com/acheong08/CVE-2025-55182-poc

https://github.com/snipevx/React2Shell-POC

https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC

https://github.com/StealthMoud/CVE-2025-55182-Scanner

https://github.com/CymulateResearch/React2Shell-Scanner

https://github.com/theori-io/reactguard

https://github.com/xcanwin/CVE-2025-55182-React-RCE

https://github.com/GelukCrab/React-Server-Components-RCE

https://github.com/logesh-GIT001/CVE-2025-55182

https://github.com/Chocapikk/CVE-2025-55182

https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool

https://github.com/alptexans/RSC-Detect-CVE-2025-55182

https://github.com/momika233/CVE-2025-55182-bypass

https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS

https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script

https://github.com/ejpir/CVE-2025-55182-research

https://github.com/xkillbit/cve-2025-55182-scanner

https://github.com/im-ezboy/CVE-2025-55182-zoomeye

https://github.com/surajhacx/react2shellpoc

https://github.com/ZihxS/check-react-rce-cve-2025-55182

https://github.com/BlackTechX011/React2Shell

https://github.com/timsonner/React2Shell-CVE-2025-55182

blog@insicurezzadigitale.com at 2026-05-02T14:37:38.000Z ##

SHADOW-EARTH-053: la campagna APT cinese che spia governi asiatici, la NATO e i diplomatici cubani

Trend Micro ha smascherato SHADOW-EARTH-053, un gruppo APT allineato alla Cina attivo dal dicembre 2024 che ha colpito governi e contractor difesa in Pakistan, India, Malaysia, Taiwan e Polonia. In parallelo, un'operazione correlata ha violato le email di 68 diplomatici cubani a Washington sfruttando Exchange non patchati. Analisi tecnica di ShadowPad, Godzilla webshell, CVE-2025-55182 e delle implicazioni per i difensori.

insicurezzadigitale.com/shadow

##

blog@insicurezzadigitale.com at 2026-05-02T14:37:38.000Z ##

SHADOW-EARTH-053: la campagna APT cinese che spia governi asiatici, la NATO e i diplomatici cubani

Trend Micro ha smascherato SHADOW-EARTH-053, un gruppo APT allineato alla Cina attivo dal dicembre 2024 che ha colpito governi e contractor difesa in Pakistan, India, Malaysia, Taiwan e Polonia. In parallelo, un'operazione correlata ha violato le email di 68 diplomatici cubani a Washington sfruttando Exchange non patchati. Analisi tecnica di ShadowPad, Godzilla webshell, CVE-2025-55182 e delle implicazioni per i difensori.

insicurezzadigitale.com/shadow

##

thecybermind at 2026-05-01T21:33:03.276Z ##

CVE‑2023‑4966 remains actively exploited in Citrix NetScaler ADC environments. This critical session hijacking vulnerability enables unauthenticated attackers to obtain authenticated access. Our latest Threat Brief outlines risk impact, exploitation context, and required mitigation actions.

thecybermind.co/2026/05/01/cit

##

thecybermind@infosec.exchange at 2026-05-01T21:33:03.000Z ##

CVE‑2023‑4966 remains actively exploited in Citrix NetScaler ADC environments. This critical session hijacking vulnerability enables unauthenticated attackers to obtain authenticated access. Our latest Threat Brief outlines risk impact, exploitation context, and required mitigation actions. #CVE

thecybermind.co/2026/05/01/cit

##

CVE-2024-52046
(9.8 CRITICAL)

EPSS: 80.14%

updated 2025-02-12T10:15:13.573000

1 posts

The ObjectSerializationDecoder in Apache MINA uses Java’s native deserialization protocol to process incoming serialized data but lacks the necessary security checks and defenses. This vulnerability allows attackers to exploit the deserialization process by sending specially crafted malicious serialized data, potentially leading to remote code execution (RCE) attacks.

thehackerwire@mastodon.social at 2026-05-01T11:20:46.000Z ##

🔴 CVE-2026-42778 - Critical (9.8)

The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:

The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

SteveThompson@mastodon.social at 2026-05-01T19:17:26.000Z ##

Severe Linux Copy Fail security flaw uncovered using AI scanning help

theverge.com/tech/922243/linux

BRAIN.US.COM

#Headlines #news #press

##

verge@mastodon.social at 2026-05-01T17:10:02.000Z ##

Severe Linux Copy Fail security flaw uncovered using AI scanning help theverge.com/tech/922243/linux

##

theverge@flipboard.com at 2026-05-01T16:55:16.000Z ##

Severe Linux Copy Fail security flaw uncovered using AI scanning help
theverge.com/tech/922243/linux

Posted into Tech News @tech-news-theverge

##

gtronix@infosec.exchange at 2026-05-01T17:00:49.000Z ##

"Severe Linux Copy Fail security flaw uncovered using AI scanning help"

"Nearly every Linux distribution released since 2017 is currently vulnerable to a security bug called "Copy Fail" that allows any user to give themselves administrator privileges."

theverge.com/tech/922243/linux

#Linux #Python

##

Visit counter For Websites