##
Updated at UTC 2026-05-03T04:37:34.805415
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-31431 | 7.8 | 2.25% | 86 | 100 | 2026-05-03T03:30:30 | In the Linux kernel, the following vulnerability has been resolved: crypto: alg | |
| CVE-2026-7675 | 8.8 | 0.00% | 2 | 0 | 2026-05-03T03:16:15.613000 | A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to | |
| CVE-2026-7674 | 8.8 | 0.00% | 4 | 0 | 2026-05-03T02:17:12.993000 | A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. T | |
| CVE-2026-2554 | 8.1 | 0.00% | 4 | 2 | 2026-05-02T14:16:17.707000 | The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Lis | |
| CVE-2026-4062 | 7.5 | 0.07% | 2 | 0 | 2026-05-02T12:31:28 | The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection vi | |
| CVE-2026-4061 | 7.5 | 0.07% | 2 | 0 | 2026-05-02T12:31:28 | The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection vi | |
| CVE-2026-7489 | 8.8 | 0.08% | 2 | 0 | 2026-05-02T12:31:28 | CTMS developed by Sunnet has a SQL Injection vulnerability, allowing authenticat | |
| CVE-2026-7491 | 8.1 | 0.04% | 4 | 0 | 2026-05-02T12:31:22 | School App developed by Zyosoft has an Insecure Direct Object Reference vulnerab | |
| CVE-2026-6320 | 7.5 | 0.10% | 4 | 0 | 2026-05-02T12:16:16.750000 | The Salon Booking System – Free Version plugin for WordPress is vulnerable to Ar | |
| CVE-2026-4060 | 7.5 | 0.07% | 2 | 0 | 2026-05-02T12:16:15.430000 | The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection vi | |
| CVE-2026-5324 | 7.2 | 0.09% | 2 | 0 | 2026-05-02T09:31:21 | The Brizy – Page Builder plugin for WordPress is vulnerable to Unauthenticated S | |
| CVE-2026-7649 | 7.5 | 0.08% | 4 | 0 | 2026-05-02T09:31:21 | The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profi | |
| CVE-2026-2052 | 8.8 | 0.06% | 2 | 0 | 2026-05-02T09:31:21 | The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Clas | |
| CVE-2026-7607 | 8.8 | 0.04% | 2 | 0 | 2026-05-02T09:31:21 | A security vulnerability has been detected in TRENDnet TEW-821DAP 1.12B01. Impac | |
| CVE-2026-7647 | 8.1 | 0.01% | 2 | 0 | 2026-05-02T06:30:30 | The Profile Builder Pro plugin for WordPress is vulnerable to PHP Object Injecti | |
| CVE-2026-4882 | 9.8 | 0.06% | 4 | 0 | 2026-05-02T06:30:30 | The User Registration Advanced Fields plugin for WordPress is vulnerable to arbi | |
| CVE-2026-7641 | 8.8 | 0.02% | 2 | 0 | 2026-05-02T06:30:30 | The Import and export users and customers plugin for WordPress is vulnerable to | |
| CVE-2026-6963 | 8.8 | 0.02% | 2 | 0 | 2026-05-02T06:30:30 | The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access du | |
| CVE-2026-7458 | 9.8 | 0.07% | 4 | 0 | 2026-05-02T05:16:01.420000 | The User Verification by PickPlugins plugin for WordPress is vulnerable to authe | |
| CVE-2026-43824 | 7.7 | 0.01% | 5 | 0 | 2026-05-02T02:16:00.747000 | In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows rea | |
| CVE-2026-42786 | 0 | 0.06% | 2 | 0 | 2026-05-02T02:16:00.467000 | Allocation of Resources Without Limits or Throttling vulnerability in mtrudel ba | |
| CVE-2026-39804 | 0 | 0.04% | 2 | 0 | 2026-05-02T02:16:00.013000 | Allocation of Resources Without Limits or Throttling vulnerability in mtrudel ba | |
| CVE-2026-37530 | 7.5 | 0.01% | 2 | 0 | 2026-05-01T21:32:27 | AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in t | |
| CVE-2026-37538 | 7.5 | 0.04% | 2 | 0 | 2026-05-01T21:32:27 | Buffer overflow vulnerability in socketcand 0.4.2 in file socketcand.c in functi | |
| CVE-2026-37534 | 9.8 | 0.01% | 2 | 0 | 2026-05-01T21:32:27 | Integer underflow vulnerability in Open-SAE-J1939 thru commit b6caf884df46435e53 | |
| CVE-2026-42485 | 7.5 | 0.04% | 2 | 0 | 2026-05-01T21:32:27 | AGL agl-service-can-low-level contains a stack buffer overflow in the uds-c libr | |
| CVE-2025-63548 | 7.5 | 0.11% | 2 | 0 | 2026-05-01T21:32:27 | An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to ca | |
| CVE-2026-37457 | 7.5 | 0.04% | 2 | 0 | 2026-05-01T21:32:27 | An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode() | |
| CVE-2026-42473 | 9.8 | 0.04% | 3 | 0 | 2026-05-01T21:32:22 | Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The se | |
| CVE-2026-22165 | 8.1 | 0.01% | 2 | 0 | 2026-05-01T21:32:22 | A web page that contains unusual WebGPU content loaded into the GPU GLES render | |
| CVE-2026-30363 | 8.4 | 0.01% | 2 | 0 | 2026-05-01T21:31:26 | flipperzero-firmware commit ad2a80 was discovered to contain a stack overflow in | |
| CVE-2026-42482 | 9.8 | 0.07% | 2 | 0 | 2026-05-01T21:31:20 | A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() | |
| CVE-2026-37531 | 9.8 | 0.11% | 2 | 0 | 2026-05-01T21:31:20 | AGL app-framework-main thru 17.1.12 contains a Zip Slip path traversal vulnerabi | |
| CVE-2026-37537 | 8.1 | 0.01% | 2 | 0 | 2026-05-01T21:31:20 | collin80/Open-SAE-J1939 thru commit 744024d4306bc387857dfce439558336806acb06 (20 | |
| CVE-2026-5405 | 7.8 | 0.01% | 1 | 0 | 2026-05-01T21:31:20 | RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 all | |
| CVE-2026-37552 | 8.4 | 0.10% | 2 | 0 | 2026-05-01T20:16:23.680000 | Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sy | |
| CVE-2026-37536 | 8.8 | 0.01% | 2 | 0 | 2026-05-01T20:16:23.323000 | miaofng/uds-c commit e506334e270d77b20c0bc259ac6c7d8c9b702b7a (2016-10-05) conta | |
| CVE-2026-37526 | 7.8 | 0.02% | 2 | 0 | 2026-05-01T20:16:22.500000 | AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process | |
| CVE-2026-37525 | 7.8 | 0.01% | 2 | 0 | 2026-05-01T20:16:22.353000 | AGL app-framework-binder (afb-daemon) through v19.90.0 contains a privilege esca | |
| CVE-2026-22167 | 7.8 | 0.01% | 2 | 0 | 2026-05-01T20:16:21.470000 | Software installed and run as a non-privileged user may conduct improper GPU sys | |
| CVE-2026-5403 | 7.8 | 0.01% | 1 | 0 | 2026-05-01T19:18:04.737000 | SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of | |
| CVE-2026-42484 | 9.8 | 0.07% | 2 | 0 | 2026-05-01T19:16:33 | A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashca | |
| CVE-2026-42478 | 7.5 | 0.03% | 2 | 0 | 2026-05-01T19:16:32.093000 | An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 pars | |
| CVE-2026-42472 | 9.8 | 0.04% | 3 | 0 | 2026-05-01T19:16:31.153000 | Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The se | |
| CVE-2026-42471 | 8.1 | 0.04% | 2 | 0 | 2026-05-01T19:16:30.990000 | Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sy | |
| CVE-2025-63547 | 7.5 | 0.09% | 2 | 0 | 2026-05-01T19:16:29.050000 | An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to ca | |
| CVE-2025-52347 | 7.8 | 0.02% | 2 | 0 | 2026-05-01T19:16:28.113000 | An issue in the component DirectIo64.sys of PassMark BurnInTest v11.0 Build 1011 | |
| CVE-2026-42483 | 9.8 | 0.08% | 3 | 0 | 2026-05-01T18:32:32 | A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allow | |
| CVE-2026-42403 | 7.5 | 0.03% | 1 | 0 | 2026-05-01T18:32:32 | Apache Neethi does not properly detect circular references in policy definitions | |
| CVE-2026-42402 | 7.5 | 0.03% | 1 | 0 | 2026-05-01T18:32:31 | Apache Neethi is vulnerable to a Denial of Service attack through algorithmic co | |
| CVE-2026-37539 | 9.8 | 0.25% | 2 | 0 | 2026-05-01T18:31:36 | Buffer overflow vulnerability in cannelloni v2.0.0 in CAN frame parsing in parse | |
| CVE-2026-37541 | 10.0 | 0.19% | 2 | 0 | 2026-05-01T18:31:36 | Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.00 | |
| CVE-2026-42469 | 8.6 | 0.14% | 2 | 0 | 2026-05-01T18:31:36 | Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.00 | |
| CVE-2026-42468 | 7.5 | 0.12% | 2 | 0 | 2026-05-01T18:31:36 | Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.00 | |
| CVE-2026-22166 | 9.6 | 0.01% | 2 | 0 | 2026-05-01T18:31:31 | A web page that contains unusual WebGPU content loaded into the GPU GLES render | |
| CVE-2026-42467 | 7.5 | 0.04% | 2 | 0 | 2026-05-01T18:16:15.497000 | An issue was discovered in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf9 | |
| CVE-2026-37540 | 8.4 | 0.01% | 2 | 0 | 2026-05-01T18:16:15.047000 | OpenAMP v2025.10.0 ELF loader contains an integer overflow vulnerability in firm | |
| CVE-2026-43003 | 8.0 | 0.01% | 1 | 0 | 2026-05-01T15:33:10.820000 | An issue was discovered in OpenStack ironic-python-agent 1.0.0 through 11.5.0. I | |
| CVE-2026-6389 | 8.8 | 0.01% | 1 | 0 | 2026-05-01T15:27:15.287000 | IBM Turbonomic prometurbo agent 8.16.0 through 8.17.6 IBM Turbonomic Application | |
| CVE-2026-7538 | 9.8 | 0.89% | 2 | 0 | 2026-05-01T15:26:24.553000 | A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. This iss | |
| CVE-2026-7513 | 8.8 | 0.04% | 1 | 0 | 2026-05-01T15:26:24.553000 | A vulnerability has been found in UTT HiPER 1200GW up to 2.5.3-170306. The impac | |
| CVE-2026-3772 | 8.8 | 0.02% | 2 | 0 | 2026-05-01T12:30:36 | The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery i | |
| CVE-2026-42779 | 9.8 | 0.14% | 4 | 1 | 2026-05-01T12:30:35 | The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here | |
| CVE-2026-7567 | 9.8 | 0.07% | 1 | 1 | 2026-05-01T12:30:30 | The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass | |
| CVE-2026-42778 | 9.8 | 0.14% | 3 | 0 | 2026-05-01T12:30:25 | The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here | |
| CVE-2026-43001 | 7.9 | 0.01% | 1 | 0 | 2026-05-01T09:30:31 | An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credential | |
| CVE-2026-7584 | 7.8 | 0.02% | 2 | 0 | 2026-05-01T09:30:31 | The LabOne Q serialization framework uses a class-loading mechanism (import_cls) | |
| CVE-2026-42994 | None | 0.05% | 1 | 0 | 2026-05-01T06:30:24 | Bitwarden CLI 2026.4.0 from 2026-04-22T21:57Z to 2026-04-22T23:30Z, when obtaine | |
| CVE-2026-7548 | 8.8 | 1.16% | 2 | 0 | 2026-05-01T03:31:30 | A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This aff | |
| CVE-2026-7546 | 9.8 | 0.08% | 2 | 0 | 2026-05-01T03:31:30 | A security vulnerability has been detected in Totolink NR1800X 9.1.0u.6279_B2021 | |
| CVE-2026-7512 | 8.8 | 0.04% | 1 | 0 | 2026-05-01T00:31:36 | A flaw has been found in UTT HiPER 1200GW up to 2.5.3-1703. The affected element | |
| CVE-2026-6543 | 8.8 | 0.04% | 1 | 0 | 2026-05-01T00:31:31 | IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute | |
| CVE-2026-7551 | 8.8 | 0.22% | 1 | 0 | 2026-05-01T00:31:31 | HKUDS OpenHarness contains a remote code execution vulnerability in the /bridge | |
| CVE-2026-4503 | 7.5 | 0.04% | 1 | 0 | 2026-04-30T21:30:44 | IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow could allow an unauthenticated | |
| CVE-2026-41940 | 9.8 | 28.36% | 20 | 41 | template | 2026-04-30T19:51:26.270000 | cPanel and WHM versions after 11.40 contain an authentication bypass vulnerabili |
| CVE-2026-34159 | 9.8 | 0.49% | 2 | 1 | 2026-04-30T19:18:32.230000 | llama.cpp is an inference of several LLM models in C/C++. Prior to version b8492 | |
| CVE-2026-4670 | 9.8 | 0.07% | 1 | 0 | 2026-04-30T18:30:38 | Authentication bypass by primary weakness vulnerability in Progress Software MOV | |
| CVE-2026-7333 | 9.6 | 0.07% | 1 | 0 | 2026-04-30T18:30:10.083000 | Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote | |
| CVE-2026-7337 | 8.8 | 0.03% | 1 | 0 | 2026-04-30T18:28:40.237000 | Type Confusion in V8 in Google Chrome prior to 147.0.7727.138 allowed a remote a | |
| CVE-2026-7338 | 7.5 | 0.00% | 1 | 0 | 2026-04-30T18:28:23.367000 | Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attac | |
| CVE-2026-7346 | 8.1 | 0.03% | 1 | 0 | 2026-04-30T18:28:04.463000 | Inappropriate implementation in Tint in Google Chrome prior to 147.0.7727.138 al | |
| CVE-2026-7339 | 8.8 | 0.06% | 1 | 0 | 2026-04-30T18:26:41.267000 | Heap buffer overflow in WebRTC in Google Chrome prior to 147.0.7727.138 allowed | |
| CVE-2026-7352 | 8.3 | 0.02% | 1 | 0 | 2026-04-30T16:40:08.557000 | Use after free in Media in Google Chrome on Android prior to 147.0.7727.138 allo | |
| CVE-2026-7354 | 8.8 | 0.02% | 1 | 0 | 2026-04-30T16:38:18.927000 | Out of bounds read and write in Angle in Google Chrome prior to 147.0.7727.138 a | |
| CVE-2026-7356 | 8.8 | 0.08% | 1 | 0 | 2026-04-30T16:38:03.603000 | Use after free in Navigation in Google Chrome prior to 147.0.7727.138 allowed a | |
| CVE-2026-7357 | 7.5 | 0.02% | 1 | 0 | 2026-04-30T16:37:58.563000 | Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote | |
| CVE-2026-7343 | 7.5 | 0.07% | 1 | 0 | 2026-04-30T16:36:22.073000 | Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allo | |
| CVE-2026-7345 | 8.3 | 0.09% | 2 | 0 | 2026-04-30T16:36:06.133000 | Insufficient validation of untrusted input in Feedback in Google Chrome prior to | |
| CVE-2026-42512 | 7.3 | 0.09% | 2 | 0 | 2026-04-30T15:31:41 | As dhclient is building an environment to pass to dhclient-script, it may need t | |
| CVE-2026-42511 | 7.3 | 0.04% | 2 | 0 | 2026-04-30T15:31:40 | The BOOTP file field is written to the lease file without escaping embedded doub | |
| CVE-2026-42524 | 8.0 | 0.04% | 1 | 0 | 2026-04-30T15:11:12.703000 | Jenkins HTML Publisher Plugin 427 and earlier does not escape job name and URL i | |
| CVE-2026-7446 | 7.3 | 0.85% | 2 | 0 | 2026-04-30T14:52:54.847000 | A vulnerability was detected in VetCoders mcp-server-semgrep 1.0.0. This affects | |
| CVE-2026-7416 | 7.3 | 0.19% | 2 | 0 | 2026-04-30T14:52:54.847000 | A vulnerability was found in PolarVista xcode-mcp-server 1.0.0. This issue affec | |
| CVE-2026-7359 | 8.8 | 0.02% | 1 | 0 | 2026-04-29T21:31:26 | Use after free in ANGLE in Google Chrome prior to 147.0.7727.138 allowed a remot | |
| CVE-2026-7358 | 8.8 | 0.03% | 1 | 0 | 2026-04-29T21:31:26 | Use after free in Animation in Google Chrome prior to 147.0.7727.138 allowed a r | |
| CVE-2026-35029 | 8.8 | 13.30% | 1 | 0 | template | 2026-04-29T20:16:30.070000 | LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) fo |
| CVE-2026-41635 | 9.8 | 0.10% | 1 | 0 | 2026-04-29T19:08:21.840000 | Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them | |
| CVE-2026-7363 | 8.8 | 0.03% | 1 | 0 | 2026-04-29T15:31:46 | Use after free in Canvas in Google Chrome on Linux, ChromeOS prior to 147.0.7727 | |
| CVE-2026-7353 | 8.3 | 0.02% | 1 | 0 | 2026-04-29T15:31:45 | Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.138 allowed a | |
| CVE-2026-7349 | 7.5 | 0.00% | 1 | 0 | 2026-04-29T15:31:45 | Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attac | |
| CVE-2026-7361 | 8.8 | 0.02% | 2 | 0 | 2026-04-29T15:31:45 | Use after free in iOS in Google Chrome prior to 147.0.7727.138 allowed a remote | |
| CVE-2026-40560 | 7.5 | 0.03% | 1 | 0 | 2026-04-29T15:31:45 | Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improp | |
| CVE-2026-7344 | 8.8 | 0.02% | 1 | 0 | 2026-04-29T15:31:44 | Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727. | |
| CVE-2026-7342 | 8.8 | 0.07% | 1 | 0 | 2026-04-29T15:31:44 | Use after free in WebView in Google Chrome on Android prior to 147.0.7727.138 al | |
| CVE-2026-7341 | 8.8 | 0.02% | 1 | 0 | 2026-04-29T15:31:44 | Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remo | |
| CVE-2026-7336 | 8.8 | 0.02% | 1 | 0 | 2026-04-29T15:31:44 | Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remo | |
| CVE-2026-7335 | 8.8 | 0.08% | 1 | 0 | 2026-04-29T15:31:44 | Use after free in media in Google Chrome prior to 147.0.7727.138 allowed a remot | |
| CVE-2026-7350 | 8.3 | 0.02% | 1 | 0 | 2026-04-29T15:31:44 | Use after free in WebMIDI in Google Chrome prior to 147.0.7727.138 allowed a rem | |
| CVE-2026-7347 | 8.1 | 0.05% | 2 | 0 | 2026-04-29T15:31:44 | Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a | |
| CVE-2026-7348 | 8.8 | 0.03% | 1 | 0 | 2026-04-29T15:31:44 | Use after free in Codecs in Google Chrome prior to 147.0.7727.138 allowed a remo | |
| CVE-2026-7355 | 8.8 | 0.08% | 1 | 0 | 2026-04-29T15:31:44 | Use after free in Media in Google Chrome prior to 147.0.7727.138 allowed a remot | |
| CVE-2026-42523 | 9.0 | 0.04% | 1 | 0 | 2026-04-29T15:30:48 | Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job UR | |
| CVE-2026-41220 | 7.8 | 0.01% | 1 | 0 | 2026-04-29T15:30:40 | Local privilege escalation due to improper input validation. The following produ | |
| CVE-2026-5140 | 8.8 | 0.05% | 1 | 0 | 2026-04-29T15:30:39 | Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TU | |
| CVE-2026-42520 | 7.5 | 0.34% | 1 | 0 | 2026-04-29T15:30:39 | Jenkins Credentials Binding Plugin 719.v80e905ef14eb_ and earlier does not sanit | |
| CVE-2026-42646 | 7.6 | 0.03% | 1 | 0 | 2026-04-29T12:33:14 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-3854 | 8.8 | 0.30% | 7 | 4 | 2026-04-28T21:35:58 | An improper neutralization of special elements vulnerability was identified in G | |
| CVE-2026-38834 | 7.3 | 13.21% | 1 | 0 | 2026-04-27T16:44:38.997000 | Tenda W30E V2.0 V16.01.0.21 was found to contain a command injection vulnerabili | |
| CVE-2026-39987 | 9.8 | 56.09% | 1 | 7 | template | 2026-04-27T16:30:09 | ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal |
| CVE-2026-41409 | 9.8 | 0.14% | 1 | 0 | 2026-04-27T12:30:39 | The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incom | |
| CVE-2025-29635 | 8.8 | 69.69% | 1 | 0 | 2026-04-24T18:30:36 | A command injection vulnerability in D-Link DIR-823X 240126 and 240802 allows an | |
| CVE-2026-40912 | None | 0.06% | 2 | 0 | 2026-04-24T16:37:54 | ## Summary There is a high severity authentication bypass vulnerability in Trae | |
| CVE-2026-39858 | None | 0.05% | 2 | 0 | 2026-04-24T16:33:44 | ## Summary There is a high severity authentication bypass vulnerability in Trae | |
| CVE-2026-35051 | None | 0.01% | 2 | 0 | 2026-04-24T16:31:25 | ## Summary There is a high-severity authentication bypass vulnerability in Trae | |
| CVE-2026-39808 | 9.8 | 13.10% | 1 | 4 | template | 2026-04-22T15:32:37 | A improper neutralization of special elements used in an os command ('os command |
| CVE-2026-4747 | 8.8 | 0.09% | 2 | 2 | 2026-04-20T13:47:31.163000 | Each RPCSEC_GSS data packet is validated by a routine which checks a signature i | |
| CVE-2026-2262 | 7.5 | 29.11% | 1 | 0 | template | 2026-04-18T00:31:10 | The Easy Appointments plugin for WordPress is vulnerable to Sensitive Informatio |
| CVE-2026-4659 | 7.5 | 0.04% | 1 | 0 | 2026-04-17T09:31:18 | The Unlimited Elements for Elementor plugin for WordPress is vulnerable to Arbit | |
| CVE-2026-34197 | 8.8 | 66.67% | 1 | 9 | template | 2026-04-16T21:49:17 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti |
| CVE-2026-3396 | 7.5 | 16.99% | 1 | 0 | template | 2026-04-08T12:31:36 | WCAPF – WooCommerce Ajax Product Filter plugin is vulnerable to time-based SQL I |
| CVE-2026-35616 | 9.8 | 41.37% | 1 | 7 | template | 2026-04-06T18:12:57.863000 | A improper access control vulnerability in Fortinet FortiClientEMS 7.4.5 through |
| CVE-2026-29014 | 9.8 | 17.07% | 1 | 0 | template | 2026-04-03T18:32:15 | MetInfo CMS versions 7.9, 8.0, and 8.1 contain an unauthenticated PHP code injec |
| CVE-2026-2699 | 9.8 | 23.78% | 1 | 2 | template | 2026-04-02T15:31:40 | Customer Managed ShareFile Storage Zones Controller (SZC) allows an unauthentica |
| CVE-2025-55182 | 10.0 | 82.01% | 2 | 100 | template | 2025-12-09T16:53:25 | ### Impact There is an unauthenticated remote code execution vulnerability in R |
| CVE-2023-4966 | 9.4 | 94.35% | 2 | 14 | template | 2025-10-24T13:42:55.550000 | Sensitive information disclosure in NetScaler ADC and NetScaler Gateway when con |
| CVE-2024-52046 | 9.8 | 80.14% | 1 | 0 | 2025-02-12T10:15:13.573000 | The ObjectSerializationDecoder in Apache MINA uses Java’s native deserialization | |
| CVE-2026-41651 | 0 | 0.20% | 1 | 8 | N/A | ||
| CVE-2026-3141 | 0 | 0.00% | 4 | 1 | N/A |
updated 2026-05-03T03:30:30
86 posts
100 repos
https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail
https://github.com/SeanRickerd/cve-2026-31431
https://github.com/attaattaatta/CVE-2026-31431
https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431
https://github.com/diemoeve/copyfail-rs
https://github.com/eximiait/CVE-2026-31431
https://github.com/mfloresdacunha/CVE-2026-31431
https://github.com/theori-io/copy-fail-CVE-2026-31431
https://github.com/qi4L/CVE-2026-31431-Container-Escape
https://github.com/yiyihuohuo/CVE-2026-31431
https://github.com/cozystack/copy-fail-blocker
https://github.com/haydenjames/CVE-2026-31431-check
https://github.com/abdullaabdullazade/CVE-2026-31431
https://github.com/Alfredooe/CVE-2026-31431
https://github.com/gubaiovo/CVE-2026-31431
https://github.com/kadir/copy-fail-CVE-2026-31431-IOC
https://github.com/ben-slates/CVE-2026-31431-Exploit
https://github.com/suominen/CVE-2026-31431
https://github.com/moaaz-mostafa123/CVE-2026-31431
https://github.com/abhishekhargan/CVE-2026-31431
https://github.com/Dabbleam/CVE-2026-31431-mitigation
https://github.com/FrosterDL/CVE-2026-31431
https://github.com/wesmar/CVE-2026-31431
https://github.com/slauger/CVE-2026-31431
https://github.com/rvizx/CVE-2026-31431
https://github.com/badsectorlabs/copyfail-go
https://github.com/malwarekid/CVE-2026-31431
https://github.com/glask1d/CVE-2026-31431-PoC
https://github.com/poyea/CVE-2026-31431.c
https://github.com/rippsec/cve-2026-31431
https://github.com/JuanBindez/CVE-2026-31431
https://github.com/sammwyy/copyfail-rs
https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite
https://github.com/adysec/cve-2026-31431
https://github.com/rootsecdev/cve_2026_31431
https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE
https://github.com/OmerAti/almalinux-fix-cve-2026-31431
https://github.com/twowb/CVE-2026-31431-
https://github.com/dorianhhuc/CVE-2026-31431
https://github.com/atgreen/block-copyfail
https://github.com/ryan2929/CVE-2026-31431
https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs
https://github.com/leelong2020/cve-2026-31431
https://github.com/pedromizz/copy-fail
https://github.com/0xac1dc0de/CVE-2026-31431
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC
https://github.com/XsanFlip/CVE-2026-31431-Patch
https://github.com/freelabz/CVE-2026-31431
https://github.com/ruattd/cve-2026-31431
https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection
https://github.com/mishl-dev/CVE_2026_31431
https://github.com/Boos4721/copyfail-rs
https://github.com/TheMursalin/CVE-2026-31431
https://github.com/ExploitEoom/CVE-2026-31431
https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431
https://github.com/sngrotesque/CVE-2026-31431
https://github.com/professional-slacker/alg_check
https://github.com/G01d3nW01f/CVE-2026-31431
https://github.com/lonelyor/CVE-2026-31431-exp
https://github.com/offsecguy/CVE-2026-31431
https://github.com/Linux-zs/cve-2026-31431-mitigation
https://github.com/desultory/CVE-2026-31431
https://github.com/rfxn/copyfail
https://github.com/deckhouse/d8-copy-fail-mitigation
https://github.com/0xShe/CVE-2026-31431
https://github.com/Naimadx123/cve_2026_31431
https://github.com/nisec-eric/cve-2026-31431
https://github.com/H1d3r/copy-fail_LPE_Interactive
https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431
https://github.com/AliHzSec/CVE-2026-31431
https://github.com/tgies/copy-fail-c
https://github.com/Xerxes-2/CVE-2026-31431-rs
https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431
https://github.com/yxdm02/CVE-2026-31431
https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431
https://github.com/b5null/CVE-2026-31431-C
https://github.com/Gr-1m/CVE-2026-31431
https://github.com/bigwario/copy-fail-CVE-2026-31431-C
https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431
https://github.com/someCorp/copyFail-CVE-2026-31431-workaround-bash
https://github.com/websecnl/CVE-2026-31431
https://github.com/sec17br/CVE-2026-31431-Copy-Fail
https://github.com/ashok523/cve-2026-31431
https://github.com/RoflSecurity/copy_fail
https://github.com/wgnet/wg.copyfail.patch
https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit
https://github.com/ErdemOzgen/copy-fail-cve-2026-31431
https://github.com/aestechno/cve-2026-31431-ansible
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC
https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit
https://github.com/xd20111/CVE-2026-31431
https://github.com/HulnotHutu/CVE-2026-31431
https://github.com/0xBlackash/CVE-2026-31431
https://github.com/ZephrFish/CopyFail-CVE-2026-31431
https://github.com/povzayd/CVE-2026-31431
https://github.com/luotian2/CVE-2026-31431
https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation
https://github.com/MartinPham/copy-fail-CVE-2026-31431-php
Copy Fail: la #vulnerabilidad de #Linux que lleva 9 años escondida y permite obtener root con un script de 732 bytes
https://wwwhatsnew.com/2026/05/02/copy-fail-cve-2026-31431-linux-kernel-vulnerabilidad-ia-mayo-2026/
##kernel vulnerability (CVE-2026-31431)**: "Copy Fail" exploit granting root access.
- **PostgreSQL updates**: Releases of PgQue v0.1, pgexporter 0.8, pgmoneta 0.21, and PostgreSQL 19 feature freeze.
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), migrations to alternatives like Codeberg and Radicle. [2/2]
Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #technologyAtKukei https://masto.kukei.eu/browse/technology category:
Here are the top 6 most discussed topics from the aggregated Mastodon posts:
1. **AI and Large Language Models (LLMs)**
- AI tools like Claude, ChatGPT, and GitHub Copilot
- AI-generated content, ethics, and controversies
- AI coding agents and their impact on software development
2. **Linux Kernel Vulnerability (CVE-2026-31431 - "Copy [1/3]
##Nine years in the Linux kernel and nobody noticed. "Copy Fail" (CVE-2026-31431) lets any local user grab root in seconds. CISA just added it to KEV. Working exploits for Ubuntu, Amazon Linux, RHEL, SUSE. Patch. - https://www.cisa.gov/news-events/alerts/2026/05/01/cisa-adds-one-known-exploited-vulnerability-catalog
##« Mettez à jour le paquet du noyau de votre distribution avec une version incluant le #commit a664bf3d603d de la branche principale », expliquent les chercheurs, « la plupart des principales distributions proposent désormais ce correctif », comme #Debian (https://security-tracker.debian.org/tracker/CVE-2026-31431) (Forky et Sid), #Ubuntu (https://ubuntu.com/security/CVE-2026-31431), par exemple mais la mise en place est encore en cours chez #RedHat (https://access.redhat.com/security/cve/cve-2026-31431) et #Suse.
Fin de l'article.
10/
#Patch #Linux #Ubuntu #CopyFail #Root #Cybersecurity #Docker #Kubernetes
##En utilisant un script Python (https://github.com/theori-io/copy-fail-CVE-2026-31431/blob/main/copy_fail_exp.py) très court (732 octets) qui ne fait appel qu’à des bibliothèques standard et ciblant le page cache du noyau, il est possible d’accéder au binaire qui permet d’être superutilisateur : /usr/bin/su. La modification se fait en mémoire, pas directement sur le périphérique de stockage.
7/
##C’est l’entreprise de sécurité Xint.io qui a révélé (https://xint.io/blog/copy-fail-linux-distributions), ce mercredi 29 avril, cette vulnérabilité (CVE-2026-31431, d’une sévérité élevée de 7,8/10) permettant une élévation des privilèges en local.
Le score n’est « que » de 7,8 car le vecteur d’attaque est local (AV:L) : il faut déjà avoir un accès local sur la machine, ici un compte utilisateur. La même avec une attaque depuis le réseau (AV:N) se serait approchée de 10.
2/
##Copy Fail (CVE-2026-31431) is a Linux kernel LPE that gives root access on every major linux distro.
All that is needed is local shell access and a few lines of python.
https://forum.hashpwn.net/post/12727
#cybersecurity #copyfail #linux #exploit #cve202631431 #hashpwn
##I can't tell how dangerous Linux CVE-2026-31431 is, given it's just "local privilege escalation," but updating all my web servers anyway I guess 🤷🏻♂️
##Rocky - https://kb.ciq.com/article/rocky-linux/rl-cve-2026-31431-mitigation
(couldn't find an official link)
Slackware - nothing on http://www.slackware.com/security/list.php?l=slackware-security&y=2026
Ubuntu - https://ubuntu.com/security/CVE-2026-31431
all around very unclear
#copyfail - ¯\_(ツ)_/¯
##Fedora - https://bugzilla.redhat.com/show_bug.cgi?id=2460538
"For any Fedora users finding a link here: this was fixed in kernel 6.19.12, and all current Fedora branches are already at or past that version."
Gentoo - https://bugs.gentoo.org/973385
Kali - should have it by tracking Debian security
Suse / OpenSuse etc. - https://www.suse.com/security/cve/CVE-2026-31431.html
RedHat - https://access.redhat.com/security/cve/cve-2026-31431
relevant for various downstreams
Alma - https://almalinux.org/blog/2026-05-01-cve-2026-31431-copy-fail/
fixed
Alpine - https://security.alpinelinux.org/vuln/CVE-2026-31431
fixed (per https://fosstodon.org/@alpinelinux/116500119563494081)
Arch - https://security.archlinux.org/CVE-2026-31431
https://security.archlinux.org/AVG-2908
fixed in linux 6.19.12-1
Centos - pending RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=2460538
?
Debian - https://security-tracker.debian.org/tracker/CVE-2026-31431
13 (Trixie), 12 (bookworm), 11 (bullseye) all still vulnerable, but fixed in security releases
Le sigh. Every time we go around and have to do this again and manually figure out wtf each of the ten thousand linux distributions provides their security updates and current status.
Spending my Saturday morning searching for CVE-2026-31431 and "copyfail" patch status is just 👍.
Anyway, here's what I have so far:
##@bortzmeyer this does not answer your question but was written by a Redhatter to address the situation with RHEL / Fedora
https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/
##CVE-2026-31431 added to KEV.
Linux kernel vuln, active exploitation confirmed.
Patch ASAP.
💬 Thoughts?
Follow @technadu
Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei https://masto.kukei.eu/browse/programming category:
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), migrations to alternatives like Codeberg and Radicle.
- **PostgreSQL updates**: Releases of PgQue v0.1, pgexporter 0.8, pgmoneta 0.21, and discussions on PostgreSQL 19 feature freeze.
- **Linux kernel vulnerability (CVE-2026-31431)**: "Copy [1/2]
Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #technologyAtKukei https://masto.kukei.eu/browse/technology category:
- **AI coding tools and controversies**: Claude Code deleting databases, GitHub Copilot’s usage-based billing, AI-generated code ownership debates, and Zig’s anti-AI contribution policy.
- **Linux kernel vulnerability (CVE-2026-31431)**: "Copy Fail" exploit granting root access; affects major distros since 2017.
- **Arduino/ESP32 libraries**: New [1/2]
ADDENDUM: Now also a blog post at https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/
##Ça y est le noyau #Linux pour #Debian 12 est sorti avec le correctif pour #CopyFail :
##Some more details from our CVE page on CVE-2026-31431 at https://access.redhat.com/security/cve/cve-2026-31431 For more infos also on availability of updates see https://nvd.nist.gov/vuln/detail/CVE-2026-31431and https://www.cve.org/CVERecord?id=CVE-2026-31431 And check the errata/update/advisory pages of your distribution.
2/4
##Para quem usa Linux Mint numa versão suportada, um patch do "kmod" que mitiga o "Copy.Fail" está disponível nas actualizações de sistema:
https://forums.linuxmint.com/viewtopic.php?p=2780569#p2780569
De todo o modo, confirmem que versão do kmod têm instalada, com o comando "apt list --installed kmod" (sem as aspas) no terminal e se o resultado for "31+20240202-2ubuntu7.2" já têm a actualização de mitigação.
Se ainda assim tiverem dúvidas, podem verificar as alterações que a versão instalada do kmod fez ao vosso sistema, correndo, no terminal, o comando "apt changelog kmod", se virem "Disable loading of algif_aead module to mitigate CVE-2026-31431 (LP: #2150743) - debian/modprobe.d/disable-algif_aead.conf" então a mitigação está instalada.
Considerando o estado actual dos servidores do Ubuntu, é possível que haja alguns avisos/erros quando correrem o Gestor de actualizações do Linux Mint. Se isso acontecer, tentem actualizar um pouco mais tarde (já vi vários computadores avisarem que ocorreu um erro e, ainda assim, logo de seguida, mostrarem as actualizações disponíveis, incluindo do kmod versão 31+20240202-2ubuntu7.2).
O Linux é vosso amigo.
#LinuxMint #CopyFail #linuxsecurity
Linux-Kernel-Lücke CVE-2026-31431: Lokale Rechteerweiterung auf Root über algif_aead
Eine Schwachstelle im Krypto-Subsystem des Linux-Kernels erlaubt es nicht privilegierten lokalen Nutzern, Root-Rechte zu erlangen – ohne die Datei auf der Festplatte zu verändern.
##Linuxの脆弱性対策について(CVE-2026-31431、Copy Fail) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 : 👀
---
https://www.ipa.go.jp/security/security-alert/2026/alert20260501.html
@jorge bazzite is on a different machine but similarly vulnerable. It's on stable, kernel 6.19.11-ogc1.1.fc44.x86_64 and shows vulnerable to cve-2026-31431
##"Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers"
"The Linux vulnerabilities have been patched—but many machines remain at risk. The exploit, dubbed CopyFail and tracked as CVE-2026-31431, allows hackers to take over PCs and data center servers."
##Heads up #linux folks, #Debian has released a #security fix for the CVE-2026-31431 (copy fail) issue.
It's out for Bookworm (kernel 6.1.170) and Trixie (6.12.85).
Patch away!
##CVE ID: CVE-2026-31431
Vendor: Linux
Product: Kernel
Date Added: 2026-05-01
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-31431
Nine years in the Linux kernel and nobody noticed. "Copy Fail" (CVE-2026-31431) lets any local user grab root in seconds. CISA just added it to KEV. Working exploits for Ubuntu, Amazon Linux, RHEL, SUSE. Patch. - https://www.cisa.gov/news-events/alerts/2026/05/01/cisa-adds-one-known-exploited-vulnerability-catalog
##« Mettez à jour le paquet du noyau de votre distribution avec une version incluant le #commit a664bf3d603d de la branche principale », expliquent les chercheurs, « la plupart des principales distributions proposent désormais ce correctif », comme #Debian (https://security-tracker.debian.org/tracker/CVE-2026-31431) (Forky et Sid), #Ubuntu (https://ubuntu.com/security/CVE-2026-31431), par exemple mais la mise en place est encore en cours chez #RedHat (https://access.redhat.com/security/cve/cve-2026-31431) et #Suse.
Fin de l'article.
10/
#Patch #Linux #Ubuntu #CopyFail #Root #Cybersecurity #Docker #Kubernetes
##En utilisant un script Python (https://github.com/theori-io/copy-fail-CVE-2026-31431/blob/main/copy_fail_exp.py) très court (732 octets) qui ne fait appel qu’à des bibliothèques standard et ciblant le page cache du noyau, il est possible d’accéder au binaire qui permet d’être superutilisateur : /usr/bin/su. La modification se fait en mémoire, pas directement sur le périphérique de stockage.
7/
##C’est l’entreprise de sécurité Xint.io qui a révélé (https://xint.io/blog/copy-fail-linux-distributions), ce mercredi 29 avril, cette vulnérabilité (CVE-2026-31431, d’une sévérité élevée de 7,8/10) permettant une élévation des privilèges en local.
Le score n’est « que » de 7,8 car le vecteur d’attaque est local (AV:L) : il faut déjà avoir un accès local sur la machine, ici un compte utilisateur. La même avec une attaque depuis le réseau (AV:N) se serait approchée de 10.
2/
##Copy Fail (CVE-2026-31431) is a Linux kernel LPE that gives root access on every major linux distro.
All that is needed is local shell access and a few lines of python.
https://forum.hashpwn.net/post/12727
#cybersecurity #copyfail #linux #exploit #cve202631431 #hashpwn
##I can't tell how dangerous Linux CVE-2026-31431 is, given it's just "local privilege escalation," but updating all my web servers anyway I guess 🤷🏻♂️
##Rocky - https://kb.ciq.com/article/rocky-linux/rl-cve-2026-31431-mitigation
(couldn't find an official link)
Slackware - nothing on http://www.slackware.com/security/list.php?l=slackware-security&y=2026
Ubuntu - https://ubuntu.com/security/CVE-2026-31431
all around very unclear
#copyfail - ¯\_(ツ)_/¯
##Fedora - https://bugzilla.redhat.com/show_bug.cgi?id=2460538
"For any Fedora users finding a link here: this was fixed in kernel 6.19.12, and all current Fedora branches are already at or past that version."
Gentoo - https://bugs.gentoo.org/973385
Kali - should have it by tracking Debian security
Suse / OpenSuse etc. - https://www.suse.com/security/cve/CVE-2026-31431.html
RedHat - https://access.redhat.com/security/cve/cve-2026-31431
relevant for various downstreams
Alma - https://almalinux.org/blog/2026-05-01-cve-2026-31431-copy-fail/
fixed
Alpine - https://security.alpinelinux.org/vuln/CVE-2026-31431
fixed (per https://fosstodon.org/@alpinelinux/116500119563494081)
Arch - https://security.archlinux.org/CVE-2026-31431
https://security.archlinux.org/AVG-2908
fixed in linux 6.19.12-1
Centos - pending RedHat: https://bugzilla.redhat.com/show_bug.cgi?id=2460538
?
Debian - https://security-tracker.debian.org/tracker/CVE-2026-31431
13 (Trixie), 12 (bookworm), 11 (bullseye) all still vulnerable, but fixed in security releases
Le sigh. Every time we go around and have to do this again and manually figure out wtf each of the ten thousand linux distributions provides their security updates and current status.
Spending my Saturday morning searching for CVE-2026-31431 and "copyfail" patch status is just 👍.
Anyway, here's what I have so far:
##@bortzmeyer this does not answer your question but was written by a Redhatter to address the situation with RHEL / Fedora
https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/
##CVE-2026-31431 added to KEV.
Linux kernel vuln, active exploitation confirmed.
Patch ASAP.
💬 Thoughts?
Follow @technadu
ADDENDUM: Now also a blog post at https://jan.wildeboer.net/2026/05/PSA-CopyFail-CVE-2026-31431/
##Ça y est le noyau #Linux pour #Debian 12 est sorti avec le correctif pour #CopyFail :
##Some more details from our CVE page on CVE-2026-31431 at https://access.redhat.com/security/cve/cve-2026-31431 For more infos also on availability of updates see https://nvd.nist.gov/vuln/detail/CVE-2026-31431and https://www.cve.org/CVERecord?id=CVE-2026-31431 And check the errata/update/advisory pages of your distribution.
2/4
##Para quem usa Linux Mint numa versão suportada, um patch do "kmod" que mitiga o "Copy.Fail" está disponível nas actualizações de sistema:
https://forums.linuxmint.com/viewtopic.php?p=2780569#p2780569
De todo o modo, confirmem que versão do kmod têm instalada, com o comando "apt list --installed kmod" (sem as aspas) no terminal e se o resultado for "31+20240202-2ubuntu7.2" já têm a actualização de mitigação.
Se ainda assim tiverem dúvidas, podem verificar as alterações que a versão instalada do kmod fez ao vosso sistema, correndo, no terminal, o comando "apt changelog kmod", se virem "Disable loading of algif_aead module to mitigate CVE-2026-31431 (LP: #2150743) - debian/modprobe.d/disable-algif_aead.conf" então a mitigação está instalada.
Considerando o estado actual dos servidores do Ubuntu, é possível que haja alguns avisos/erros quando correrem o Gestor de actualizações do Linux Mint. Se isso acontecer, tentem actualizar um pouco mais tarde (já vi vários computadores avisarem que ocorreu um erro e, ainda assim, logo de seguida, mostrarem as actualizações disponíveis, incluindo do kmod versão 31+20240202-2ubuntu7.2).
O Linux é vosso amigo.
#LinuxMint #CopyFail #linuxsecurity
Linuxの脆弱性対策について(CVE-2026-31431、Copy Fail) | 情報セキュリティ | IPA 独立行政法人 情報処理推進機構 : 👀
---
https://www.ipa.go.jp/security/security-alert/2026/alert20260501.html
@jorge bazzite is on a different machine but similarly vulnerable. It's on stable, kernel 6.19.11-ogc1.1.fc44.x86_64 and shows vulnerable to cve-2026-31431
##"Dangerous New Linux Exploit Gives Attackers Root Access to Countless Computers"
"The Linux vulnerabilities have been patched—but many machines remain at risk. The exploit, dubbed CopyFail and tracked as CVE-2026-31431, allows hackers to take over PCs and data center servers."
##Heads up #linux folks, #Debian has released a #security fix for the CVE-2026-31431 (copy fail) issue.
It's out for Bookworm (kernel 6.1.170) and Trixie (6.12.85).
Patch away!
##CVE ID: CVE-2026-31431
Vendor: Linux
Product: Kernel
Date Added: 2026-05-01
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-31431
🚨 [CISA-2026:0501] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0501)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-31431 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-31431)
- Name: Linux Kernel Incorrect Resource Transfer Between Spheres Vulnerability
- Action: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Linux
- Product: Kernel
- Notes: https://lore.kernel.org/linux-cve-announce/2026042214-CVE-2026-31431-3d65@gregkh/; https://xint.io/blog/copy-fail-linux-distributions#the-fix-6 ; https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/about/ ; https://nvd.nist.gov/vuln/detail/CVE-2026-31431
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260501 #cisa20260501 #cve_2026_31431 #cve202631431
##There are approximately 488 Linux kernel CVEs per month* and not a lot of reason to think that CVE-2026-31431("copy .fail") is particularly special.
- It's an LPE (local privilege escalation). Yes, we should take it seriously and never give up the dream. No, you should not rely on non-virtualized containers to provide a true multi-tenant security boundary.
- Every potential attacker in the world has been able to observe the vulnerability in source code form since mid-2017 (9 years ago).
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=72548b093ee38a6d4f2a19e6ef1948ae05c181f7
- The vendor was notified of the vulnerability 2026-03-23 (39 days ago), apparently with enough detail to put together a patch in ~3 days.
- Every potential attacker in the world was informed of the specific vulnerability 30 days ago (2026-03-31 at the latest) when the patch was committed with the header "Reported-by: Taeyang Lee <0wn@ theori. io>" Theori .io advertises both offensive and defensive security information services on their site.
https://git.kernel.org/pub/scm/linux/kernel/git/herbert/crypto-2.6.git/commit/?id=a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5
The researchers:
- Notified the kernel security team
- Observed the patch committed
- Waited another 34 days
- Published a detailed writeup
Professionally done, IMO.
The researchers followed the process outlined on the affected vendor's website. Specifically:
"the kernel security team strongly recommends that as a reporter of a potential security issue you DO NOT contact the “linux-distros” mailing list UNTIL...[list that includes some absurdly vague conditions]"
https://docs.kernel.org/process/security-bugs.html
To do much more than follow the vendor's preferred disclosure process often amounts to demanding that *your* bug be given special attention and treatment. Which is a thing researchers sometimes do. Naturally it's hard to be objective about one's own finding.
Assessing and prioritizing bug reports is generally the job of the *vendor's* security team, *not* the researchers. There are exceptions. But to force special handling for your bug is simply to blindly take resources away from all the reports that will lead to the 487 other CVEs that month. And some of those might not be LPEs. They could be wormable remote network holes or virtual machine breakout bugs.
In this case, the kernel security team appears to have decided that the appropriate response was to let downstream read about it when the patch was committed to source control like everybody else. A CVE was publicly announced 11 days later, for a total of 30 days after being notified.
There are far worse systems.
Regardless, that process is theirs to manage. It's between the Linux kernel team and whoever they have made promises to.
I don't know about you, but I get my Linux for free. Nobody promised me anything.
* Data from stack .watch/product/linux/linux-kernel/, 14 month average
##""Copy Fail" is a rare Linux bug that can turn an unprivileged user into a root admin in seconds"
"Tracked as CVE-2026-31431, Copy Fail could represent a significant security risk in the making."
##🛡️ In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.
##Good morning, everybody.
Short version. Trying to find a mitigation for CVE-2026-31431 on AWS ECS using image registry.access.redhat.com/ubi9/ubi
Infra is also wandering around trying to find a solution. Either we use grubby, which `dnf install` has no clue as to where it might be. Also tried grub2-common and grubby-bls which various pages had me look for.
So, if anyone has already worked this out, please ping me.
##As it turns out, the #Linux kernel https://copy.fail vulnerability is more like a speculative execution bug than first reported. It breaks out of containers (!) ... expect some VM + VPS + keylogging fxckery next, as with Meltdown/Spectre https://blog.toolslib.net/2026/04/30/cve-2026-31431-copy-fail-what-you-need-to-know/
##https://cert.europa.eu/publications/security-advisories/2026-005/
Dietpi hasn't released the patched kernel yet Debian 1:6.12.85. It's still stuck on the vulnerable 1:6.12.75 version. :(
##Releases are still pending, but our repositories all received upgraded kernels to address copy.fail (CVE-2026-31431).
So make sure you upgrade to the latest available kernels.
edge: >= linux-lts-6.18.22
3.23: >= linux-lts-6.18.22
3.22: >= linux-lts-6.12.85
3.21: >= linux-lts-6.12.85
3.20: >= linux-lts-6.6.137
3.19: >= linux-lts-6.6.137
3.18: >= linux-lts-6.1.170
3.17: >= linux-lts-5.15.204
@RootMoose I tried the vulnerability on my Debian unstable system and...it didn't work? Might be that the kernel version I have already got the patch (even if it wasn't labeled as such).
Anyway, I think they released an update:
https://ostechnix.com/debian-13-trixie-copy-fail-cve-2026-31431-vulnerability-fix/
What I learned from patching Docker Engine default seccomp profile for CVE-2026-31431 (Copy Fail)
1. If a seccomp rule already filters an argument (like AF_VSOCK), it's just a matter of adding a second negation for the AF_ALG, right?
Wrong!
These are two rules that are OR'd. Effectively breaking the previous single negation.
The right fix was to reshape it into a range check with the gt/lt opcode:
- "arg0 < 38"
- "arg0 == 39"
- "arg0 > 40"
That cleanly leaves both "AF_ALG" (38) and "AF_VSOCK" (40) unmatched, so they fall through to deny.
2. There's also a second syscall...
Filtering socket(2) alone is not enough.
On x86 (and some other platforms) there's also a legacy predecessors to socket syscall called socketcall(2).
On amd64 it can still be used if the process switches to the ia32 compat mode (with int 80h).
Unfortunately it must be blocked completely because the pointer argument cannot be inspected by seccomp.
This only impacts very old 32 bit binaries though.
3. The error you return matters
If you block socketcall by returning EPERM, the libseccomp will automatically happily generate an ALLOW rule for the socket(2).
Not sure about the full reasoning behind it yet, but ENOSYS works fine.
Now.. time to enjoy the long weekend
##That's not what the disclosure timeline claims:
2026-03-23 Reported to Linux kernel security team
2026-03-24 Initial acknowledgment
2026-03-25 Patches proposed and reviewed
2026-04-01 Patch committed to mainline
2026-04-22 CVE-2026-31431 assigned
2026-04-29 Public disclosure (https://copy.fail/)
Is this timeline in error?
##I did this on my exposed servers, even though I think the actual risk for me and my machines is low as an exploit needs local user access. I verified that none of the services and containers I run on my machines caused problems after this change. Everything kept on working as before, so all is safe.
I'm keeping an eye on https://access.redhat.com/security/cve/cve-2026-31431 for updates.
##For anyone following the copy.fail issues on Linux there is now a PoC for Kubernetes as well as the previous LPE one
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC
General information on the CVE via https://copy.fail/
##@s1n3rgy4@cyberplace.social https://sempreupdate.com.br/copy-fail-linux-cve-2026-31431-acesso-root/ o tal do copy fail
##Copy Fail: The 732-Byte Script That Roots Every Major #Linux Systems
https://ostechnix.com/copy-fail-cve-2026-31431-linux-kernel-root-exploit/
##Fresh gist: mitigating CVE-2026-31431 ("Copy Fail") on RHEL 8/9/10 with a tiny Ansible playbook.
It blacklists algif_aead via a kernel boot arg (initcall_blacklist=algif_aead_init), reboots only when needed, and asserts the mitigation actually stuck after reboot. Idempotent & safe to re-run.
https://codeberg.org/Larvitz/gists/src/branch/main/2026/20260501-CVE-2026-31431_RHEL_Mitigation.md
#Ansible #RHEL #Linux #InfoSec #SysAdmin #DevOps #CVE #CVE_2026_31431 #copyfail
##@jwildeboer Great 🙂
Created a little Ansible playbook to apply the mitigation to multiple servers: https://codeberg.org/Larvitz/gists/src/branch/main/2026/20260501-CVE-2026-31431_RHEL_Mitigation.md
##the line between #vulnerability #disclosure and #AI #advertisement becomes ever more blurry ....
#thereIsNoAI
#thereIsInParticularNoSustainableAI
#alsoNoReponsibleAI
CVE-2026-31431 #copyFail
##Docker Engine is safe against CVE-2026-31431 now.
Patch ASAP:
https://github.com/moby/moby/releases/tag/docker-v29.4.2
@ctoney Just wondering the same. Seems Ubuntu LTS remains non-fixed?
Ubuntu's grandmother Debian seems on top of things.
Tested the oft cited PoC (https://github.com/theori-io/copy-fail-CVE-2026-31431/blob/main/copy_fail_exp.py) on patched 6.12.85+deb13-amd64 for Trixie:
```
root@cake:~# su - eat
eat@cake:~$ vim foo.py
eat@cake:~$ cat foo.py | python3 && su
Password: su: Authentication failure
Password:
```
today in #fedora qa:
* CVE-2026-31431 ("copy fail") mitigation in fedora infra - Fedora kernels are patched already but we have hosts running EL; applied mitigations on those most accessible to potentially-untrusted workloads, updated/rebooted a bunch of Fedora hosts
* re-reviewed g-i-s and toolbox update PRs - https://forge.fedoraproject.org/quality/os-autoinst-distri-fedora/pulls/517#issuecomment-677467 , https://forge.fedoraproject.org/quality/os-autoinst-distri-fedora/pulls/534#issuecomment-677479
* rest of the day still trying to nail down rmdepcheck on #eln with @yselkowitz - https://forge.fedoraproject.org/quality/rmdepcheck/pulls/40
Debian's patched 6.12.85+deb13-amd64 #1 SMP PREEMPT_DYNAMIC seems GTG with the PoC published here:
https://github.com/theori-io/copy-fail-CVE-2026-31431/blob/main/copy_fail_exp.py
```
root@cake:~# su - eat
eat@cake:~$ vim foo.py
eat@cake:~$ cat foo.py | python3 && su
Password: su: Authentication failure
Password:
```
Bit worried about where Ubuntu is at. Ominously, their own fix announcement page seems down:
https://ubuntu.com/blog/copy-fail-vulnerability-fixes-available
##CopyFail implementation in Rust:
##Zumindest #Debian hat das Problem CVE-2026-31431 beseitigt:
https://security-tracker.debian.org/tracker/CVE-2026-31431
CVE-2026-31431 (Copy Fail): Linux Kernel LPE https://securityboulevard.com/2026/04/cve-2026-31431-copy-fail-linux-kernel-lpe/
##Checking the #CopyFail #CVE_2026_31431 status on #AlpineLinux, again nothing heard officially from @alpinelinux but I did see this:
https://github.com/theori-io/copy-fail-CVE-2026-31431/issues/4#issuecomment-4354558846
Maybe the issue has been quietly dealt with or was never an issue to begin with? It'd be nice to know for certain.
##:nugget: CVE-2026-31431 https://copy.fail/
I cannot believe this 0day happened a few days after I updated everything... good news is.. I can update with zero downtime for the most part.
If you notice a small outage, it should take a minute at max but I'll try to keep it small.
###CopyFail #cve_2026_31431 I wrote about denying containers access to AF_ALG sockets with SELinux
https://blog.feistel.party/2026/04/30/deny-alg-socket-to-containers-with-selinux-to-mitigate-cve-2026-31431.html
It would be interesting to see whether the copy-fail vuln (CVE-2026-31431) could be used to root an Android phone. I am a bit reluctant to install Magisk on my primary Android device, would love to see if the vuln could be an alternative. Lmao.
##Debian has patched for copy fail / CVE-2026-31431 in trixe (latest release) with 6.12.85-1 today, and testing and unstable were fixed yesterday.
https://timeloop.cafe/@alienghic/116495525642399082
There's also a pretty easy to enable mitigation that blocks the exploit, by disabling the buggy module.
https://xint.io/blog/copy-fail-linux-distributions#remediation-7
##No official announcement yet, but Copy Fail (CVE-2026-31431) has already been fixed in the Fedora kernels: 6.19.12. According to Red Hat / Fedora kernel tracking, "all current Fedora branches are already at or beyond kernel 6.19.12.
TL;DR - If your Fedora system is fully updated, you are already protected against Copy Fail.
##For those wondering when #Debian will have patches for #CopyFaill, I've been following this page:
https://security-tracker.debian.org/tracker/CVE-2026-31431
Trixie just got patched. Still waiting for Bookworm.
##updated 2026-05-03T03:16:15.613000
2 posts
🟠 CVE-2026-7675 - High (8.8)
A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7675/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7675 - High (8.8)
A vulnerability has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. Impacted is the function start_lan of the file /apply.cgi. The manipulation of the argument Channel/ApCliSsid leads to buffer overflow. The attack is possible ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7675/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-03T02:17:12.993000
4 posts
🔎 HIGH-severity (CVSS 8.7) buffer overflow in Shenzhen Libituo LBT-T300-HW1 (v1.2.0 – 1.2.8), CVE-2026-7674. Web Management Interface at risk, remote exploit possible. No patch yet — restrict access & stay alert. https://radar.offseq.com/threat/cve-2026-7674-buffer-overflow-in-shenzhen-libituo--817395ad #OffSeq #Vuln #IoTSec #Infosec
##🟠 CVE-2026-7674 - High (8.8)
A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7674/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔎 HIGH-severity (CVSS 8.7) buffer overflow in Shenzhen Libituo LBT-T300-HW1 (v1.2.0 – 1.2.8), CVE-2026-7674. Web Management Interface at risk, remote exploit possible. No patch yet — restrict access & stay alert. https://radar.offseq.com/threat/cve-2026-7674-buffer-overflow-in-shenzhen-libituo--817395ad #OffSeq #Vuln #IoTSec #Infosec
##🟠 CVE-2026-7674 - High (8.8)
A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7674/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T14:16:17.707000
4 posts
2 repos
https://github.com/mbanyamer/CVE-2026-25546-godot-mcp-0.1.1-OS-Command-Injection
🔒 CVE-2026-2554: HIGH-severity IDOR in WCFM – Frontend Manager for WooCommerce lets Vendor+ users delete any account, incl. admins. No patch yet. Restrict Vendor access & monitor user deletions. More: https://radar.offseq.com/threat/cve-2026-2554-cwe-639-authorization-bypass-through-d8e3f679 #OffSeq #WordPress #WooCommerce #Infosec
##🟠 CVE-2026-2554 - High (8.1)
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_custom...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2554/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔒 CVE-2026-2554: HIGH-severity IDOR in WCFM – Frontend Manager for WooCommerce lets Vendor+ users delete any account, incl. admins. No patch yet. Restrict Vendor access & monitor user deletions. More: https://radar.offseq.com/threat/cve-2026-2554-cwe-639-authorization-bypass-through-d8e3f679 #OffSeq #WordPress #WooCommerce #Infosec
##🟠 CVE-2026-2554 - High (8.1)
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_custom...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2554/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T12:31:28
2 posts
🟠 CVE-2026-4062 - High (7.5)
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'object_ids' and 'exclude_object_ids' parameters in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied paramet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4062 - High (7.5)
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'object_ids' and 'exclude_object_ids' parameters in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied paramet...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T12:31:28
2 posts
🟠 CVE-2026-4061 - High (7.5)
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'map_post_type' parameter in all versions up to, and including, 1.13.18. This is due to the `SearchResults` hook explicitly calling `stripslashes_deep($_POST)` w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4061 - High (7.5)
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'map_post_type' parameter in all versions up to, and including, 1.13.18. This is due to the `SearchResults` hook explicitly calling `stripslashes_deep($_POST)` w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T12:31:28
2 posts
🟠 CVE-2026-7489 - High (8.8)
CTMS developed by Sunnet has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7489/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7489 - High (8.8)
CTMS developed by Sunnet has a SQL Injection vulnerability, allowing authenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7489/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T12:31:22
4 posts
🟠 CVE-2026-7491 - High (8.1)
School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7491/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-7491 (HIGH, CVSS 8.6): Zyosoft School App v0 is vulnerable to auth bypass via user-controlled keys (CWE-639). Authenticated users can access & modify others' data. No patch yet — restrict access & stay alert for updates. https://radar.offseq.com/threat/cve-2026-7491-cwe-639-authorization-bypass-through-2581445b #OffSeq #Vuln #AppSec
##🟠 CVE-2026-7491 - High (8.1)
School App developed by Zyosoft has an Insecure Direct Object Reference vulnerability, allowing authenticated remote attackers to modify a specific parameter to read and modify other users' data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7491/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-7491 (HIGH, CVSS 8.6): Zyosoft School App v0 is vulnerable to auth bypass via user-controlled keys (CWE-639). Authenticated users can access & modify others' data. No patch yet — restrict access & stay alert for updates. https://radar.offseq.com/threat/cve-2026-7491-cwe-639-authorization-bypass-through-2581445b #OffSeq #Vuln #AppSec
##updated 2026-05-02T12:16:16.750000
4 posts
🚨 CVE-2026-6320 (HIGH): Path traversal in Salon Booking System – Free (WordPress, ≤10.30.25) enables unauthenticated file reads via booking emails. No patch out yet — disable or restrict plugin use to reduce risk. https://radar.offseq.com/threat/cve-2026-6320-cwe-22-improper-limitation-of-a-path-85369388 #OffSeq #WordPress #Vuln
##🟠 CVE-2026-6320 - High (7.5)
The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6320/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-6320 (HIGH): Path traversal in Salon Booking System – Free (WordPress, ≤10.30.25) enables unauthenticated file reads via booking emails. No patch out yet — disable or restrict plugin use to reduce risk. https://radar.offseq.com/threat/cve-2026-6320-cwe-22-improper-limitation-of-a-path-85369388 #OffSeq #WordPress #Vuln
##🟠 CVE-2026-6320 - High (7.5)
The Salon Booking System – Free Version plugin for WordPress is vulnerable to Arbitrary File Read in versions up to, and including, 10.30.25. This is due to the public booking flow accepting attacker-controlled file-field values and later using ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6320/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T12:16:15.430000
2 posts
🟠 CVE-2026-4060 - High (7.5)
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'sort' parameter in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied parameter and lack of sufficient prepar...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4060/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4060 - High (7.5)
The Geo Mashup plugin for WordPress is vulnerable to Time-Based SQL Injection via the 'sort' parameter in all versions up to, and including, 1.13.18. This is due to insufficient escaping on the user supplied parameter and lack of sufficient prepar...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4060/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T09:31:21
2 posts
🔎 CVE-2026-5324: HIGH (CVSS 7.2) XSS in Brizy – Page Builder (≤2.8.11) lets unauth'd attackers inject scripts into form data. Admins risk session hijack viewing Leads. Restrict access, monitor for patches. https://radar.offseq.com/threat/cve-2026-5324-cwe-79-improper-neutralization-of-in-973821a2 #OffSeq #WordPress #XSS #Vuln
##🔎 CVE-2026-5324: HIGH (CVSS 7.2) XSS in Brizy – Page Builder (≤2.8.11) lets unauth'd attackers inject scripts into form data. Admins risk session hijack viewing Leads. Restrict access, monitor for patches. https://radar.offseq.com/threat/cve-2026-5324-cwe-79-improper-neutralization-of-in-973821a2 #OffSeq #WordPress #XSS #Vuln
##updated 2026-05-02T09:31:21
4 posts
🟠 CVE-2026-7649 - High (7.5)
The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7649/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7649 - High (7.5)
The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7649/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7649 - High (7.5)
The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7649/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7649 - High (7.5)
The ARMember – Membership Plugin, Content Restriction, Member Levels, User Profile & User signup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'orderby' parameter in all versions up to, and including, 4.0.60 due to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7649/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T09:31:21
2 posts
🟠 CVE-2026-2052 - High (8.8)
The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.2 via the Display Logic feature. This is due to the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2052/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2052 - High (8.8)
The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.2 via the Display Logic feature. This is due to the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2052/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T09:31:21
2 posts
🟠 CVE-2026-7607 - High (8.8)
A security vulnerability has been detected in TRENDnet TEW-821DAP 1.12B01. Impacted is the function auto_update_firmware of the component Firmware Udpate. The manipulation of the argument str leads to buffer overflow. The attack may be initiated r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7607/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7607 - High (8.8)
A security vulnerability has been detected in TRENDnet TEW-821DAP 1.12B01. Impacted is the function auto_update_firmware of the component Firmware Udpate. The manipulation of the argument str leads to buffer overflow. The attack may be initiated r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7607/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T06:30:30
2 posts
🟠 CVE-2026-7647 - High (8.1)
The Profile Builder Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to and including 3.14.5. This is due to the use of PHP's maybe_unserialize() function on the attacker-controlled 'args' POST parameter within the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7647/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7647 - High (8.1)
The Profile Builder Pro plugin for WordPress is vulnerable to PHP Object Injection in all versions up to and including 3.14.5. This is due to the use of PHP's maybe_unserialize() function on the attacker-controlled 'args' POST parameter within the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7647/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T06:30:30
4 posts
🚨 CRITICAL: CVE-2026-4882 in WPEverest User Registration Advanced Fields ≤1.6.20 lets unauthenticated attackers upload dangerous files via Profile Picture field — possible RCE. Disable this field until patched! https://radar.offseq.com/threat/cve-2026-4882-cwe-434-unrestricted-upload-of-file--0d013f12 #OffSeq #WordPress #Security #CVE20264882
##🔴 CVE-2026-4882 - Critical (9.8)
The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'URAF_AJAX::method_upload' function in all versions up to, and including, 1.6.20. This makes it possible ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4882/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-4882 in WPEverest User Registration Advanced Fields ≤1.6.20 lets unauthenticated attackers upload dangerous files via Profile Picture field — possible RCE. Disable this field until patched! https://radar.offseq.com/threat/cve-2026-4882-cwe-434-unrestricted-upload-of-file--0d013f12 #OffSeq #WordPress #Security #CVE20264882
##🔴 CVE-2026-4882 - Critical (9.8)
The User Registration Advanced Fields plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'URAF_AJAX::method_upload' function in all versions up to, and including, 1.6.20. This makes it possible ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4882/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T06:30:30
2 posts
🟠 CVE-2026-7641 - High (8.8)
The Import and export users and customers plugin for WordPress is vulnerable to Privilege Escalation in all versions up to and including 2.0.8 via the `save_extra_user_profile_fields()` function. This is due to an incomplete blocklist that correct...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7641 - High (8.8)
The Import and export users and customers plugin for WordPress is vulnerable to Privilege Escalation in all versions up to and including 2.0.8 via the `save_extra_user_profile_fields()` function. This is due to an incomplete blocklist that correct...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7641/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T06:30:30
2 posts
🟠 CVE-2026-6963 - High (8.8)
The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wmg_save_provider_config AJAX action in all versions up to, and including, 1.8. This makes it possible for authenticated attacke...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6963/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6963 - High (8.8)
The WP Mail Gateway plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wmg_save_provider_config AJAX action in all versions up to, and including, 1.8. This makes it possible for authenticated attacke...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6963/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T05:16:01.420000
4 posts
🚨 CRITICAL: CVE-2026-7458 in User Verification by PickPlugins (≤2.0.46) enables auth bypass via weak OTP checks. Attackers can log in as any verified user, including admins. No patch yet — disable or restrict plugin! https://radar.offseq.com/threat/cve-2026-7458-cwe-288-authentication-bypass-using--78b8e551 #OffSeq #WordPress #Vuln
##🔴 CVE-2026-7458 - Critical (9.8)
The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verificatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7458/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-7458 in User Verification by PickPlugins (≤2.0.46) enables auth bypass via weak OTP checks. Attackers can log in as any verified user, including admins. No patch yet — disable or restrict plugin! https://radar.offseq.com/threat/cve-2026-7458-cwe-288-authentication-bypass-using--78b8e551 #OffSeq #WordPress #Vuln
##🔴 CVE-2026-7458 - Critical (9.8)
The User Verification by PickPlugins plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 2.0.46. This is due to the use of a loose PHP comparison operator to validate OTP codes in the "user_verificatio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7458/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T02:16:00.747000
5 posts
🟠 New security advisory:
CVE-2026-43824 affects multiple systems.
• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-43824-argocd-diff-leaks-k8s-secret-data
⚠️ HIGH-severity vuln (CVE-2026-43824) in Argo CD 3.2.0 – 3.2.10 & 3.3.0 – 3.3.8: ServerSideDiff leaks cleartext Kubernetes Secrets. Restrict feature use & monitor for patches. Details: https://radar.offseq.com/threat/cve-2026-43824-cwe-212-improper-removal-of-sensiti-5eb1043e #OffSeq #ArgoCD #Kubernetes #Vuln
##🟠 CVE-2026-43824 - High (7.7)
In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows reading cleartext Kubernetes Secret data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43824/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH-severity vuln (CVE-2026-43824) in Argo CD 3.2.0 – 3.2.10 & 3.3.0 – 3.3.8: ServerSideDiff leaks cleartext Kubernetes Secrets. Restrict feature use & monitor for patches. Details: https://radar.offseq.com/threat/cve-2026-43824-cwe-212-improper-removal-of-sensiti-5eb1043e #OffSeq #ArgoCD #Kubernetes #Vuln
##🟠 CVE-2026-43824 - High (7.7)
In Argo CD 3.2.0 before 3.2.11 and 3.3.0 before 3.3.9, ServerSideDiff allows reading cleartext Kubernetes Secret data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43824/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-02T02:16:00.467000
2 posts
🚨 CVE-2026-42786 (HIGH): mtrudel bandit 0.5.0 – <1.11.0 lets remote attackers cause DoS via unlimited WebSocket continuation frames (resource exhaustion). Affects Phoenix Channels & LiveView. Patch pending — monitor & limit connections. https://radar.offseq.com/threat/cve-2026-42786-cwe-770-allocation-of-resources-wit-56eb6fa8 #OffSeq #CVE #Elixir
##🚨 CVE-2026-42786 (HIGH): mtrudel bandit 0.5.0 – <1.11.0 lets remote attackers cause DoS via unlimited WebSocket continuation frames (resource exhaustion). Affects Phoenix Channels & LiveView. Patch pending — monitor & limit connections. https://radar.offseq.com/threat/cve-2026-42786-cwe-770-allocation-of-resources-wit-56eb6fa8 #OffSeq #CVE #Elixir
##updated 2026-05-02T02:16:00.013000
2 posts
🚨 CVE-2026-39804 (HIGH): mtrudel bandit <1.11.0 allows remote DoS via memory exhaustion if WebSocket permessage-deflate is enabled. Disable compression to mitigate. Affects only non-default configs. Details: https://radar.offseq.com/threat/cve-2026-39804-cwe-770-allocation-of-resources-wit-b21fc525 #OffSeq #Vuln #DoS #Elixir
##🚨 CVE-2026-39804 (HIGH): mtrudel bandit <1.11.0 allows remote DoS via memory exhaustion if WebSocket permessage-deflate is enabled. Disable compression to mitigate. Affects only non-default configs. Details: https://radar.offseq.com/threat/cve-2026-39804-cwe-770-allocation-of-resources-wit-b21fc525 #OffSeq #Vuln #DoS #Elixir
##updated 2026-05-01T21:32:27
2 posts
🟠 CVE-2026-37530 - High (7.5)
AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUE...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37530 - High (7.5)
AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUE...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:32:27
2 posts
🟠 CVE-2026-37538 - High (7.5)
Buffer overflow vulnerability in socketcand 0.4.2 in file socketcand.c in function main allows attackers to cause a denial of service or other unspecified impacts via crafted bus_name.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37538/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37538 - High (7.5)
Buffer overflow vulnerability in socketcand 0.4.2 in file socketcand.c in function main allows attackers to cause a denial of service or other unspecified impacts via crafted bus_name.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37538/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:32:27
2 posts
🔴 CVE-2026-37534 - Critical (9.8)
Integer underflow vulnerability in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Transport_Protocol_Data_Transfer,allows attackers to write to arbitrary memory via crafted sequence number from t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37534/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-37534 - Critical (9.8)
Integer underflow vulnerability in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Transport_Protocol_Data_Transfer,allows attackers to write to arbitrary memory via crafted sequence number from t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37534/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:32:27
2 posts
🟠 CVE-2026-42485 - High (7.5)
AGL agl-service-can-low-level contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUEST_PAYLOAD_LE...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42485 - High (7.5)
AGL agl-service-can-low-level contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUEST_PAYLOAD_LE...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42485/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:32:27
2 posts
🟠 CVE-2025-63548 - High (7.5)
An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a packet specially crafted to bear a non-valid value in any Boolean field.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-63548 - High (7.5)
An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a packet specially crafted to bear a non-valid value in any Boolean field.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:32:27
2 posts
🟠 CVE-2026-37457 - High (7.5)
An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode() function (bgpd/bgp_flowspec_util.c) of FRRouting (FRR) stable/10.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted FlowSpec component.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37457/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37457 - High (7.5)
An off-by-one out-of-bounds write vulnerability in the bgp_flowspec_op_decode() function (bgpd/bgp_flowspec_util.c) of FRRouting (FRR) stable/10.0 allows attackers to cause a Denial of Service (DoS) via supplying a crafted FlowSpec component.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37457/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:32:22
3 posts
⛔ New security advisory:
CVE-2026-42473 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-42473-mixphp-unauth-rce-via-deserialization
🔴 CVE-2026-42473 - Critical (9.8)
Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from the filesystem in the FileHandler object.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42473/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-42473 - Critical (9.8)
Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from the filesystem in the FileHandler object.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42473/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:32:22
2 posts
🟠 CVE-2026-22165 - High (8.1)
A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger a write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22165/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22165 - High (8.1)
A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger a write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system priv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22165/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:31:26
2 posts
🟠 CVE-2026-30363 - High (8.4)
flipperzero-firmware commit ad2a80 was discovered to contain a stack overflow in the "Main" function.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30363/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-30363 - High (8.4)
flipperzero-firmware commit ad2a80 was discovered to contain a stack overflow in the "Main" function.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-30363/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:31:20
2 posts
🔴 CVE-2026-42482 - Critical (9.8)
A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42482/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-42482 - Critical (9.8)
A stack-based buffer overflow in mangle_to_hex_lower() and mangle_to_hex_upper() in src/rp_cpu.c in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted rule file, or via the -j or -k rule...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42482/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:31:20
2 posts
🔴 CVE-2026-37531 - Critical (9.8)
AGL app-framework-main thru 17.1.12 contains a Zip Slip path traversal vulnerability (CWE-22) combined with a TOCTOU race condition (CWE-367) in the widget installation flow. The is_valid_filename function in wgtpkg-zip.c validates ZIP entry names...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-37531 - Critical (9.8)
AGL app-framework-main thru 17.1.12 contains a Zip Slip path traversal vulnerability (CWE-22) combined with a TOCTOU race condition (CWE-367) in the widget installation flow. The is_valid_filename function in wgtpkg-zip.c validates ZIP entry names...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:31:20
2 posts
🟠 CVE-2026-37537 - High (8.1)
collin80/Open-SAE-J1939 thru commit 744024d4306bc387857dfce439558336806acb06 (2023-03-08) contains an integer underflow leading to out-of-bounds write in Transport Protocol Data Transfer handling. At line 23: uint8_t index = data[0] - 1. When data...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37537/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37537 - High (8.1)
collin80/Open-SAE-J1939 thru commit 744024d4306bc387857dfce439558336806acb06 (2023-03-08) contains an integer underflow leading to out-of-bounds write in Transport Protocol Data Transfer handling. At line 23: uint8_t index = data[0] - 1. When data...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37537/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T21:31:20
1 posts
🟠 CVE-2026-5405 - High (7.8)
RDP protocol dissector crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5405/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T20:16:23.680000
2 posts
🟠 CVE-2026-37552 - High (8.4)
Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37552 - High (8.4)
Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke TCP server (Server.php:87) receives data from a TCP socket, passes it directly to Opis\Closure\unserialize(), then executes the result via call_user_func(). ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T20:16:23.323000
2 posts
🟠 CVE-2026-37536 - High (8.8)
miaofng/uds-c commit e506334e270d77b20c0bc259ac6c7d8c9b702b7a (2016-10-05) contains a stack buffer overflow in send_diagnostic_request. A 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) receives memcpy at offset 1+pid_length with payload_lengt...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37536 - High (8.8)
miaofng/uds-c commit e506334e270d77b20c0bc259ac6c7d8c9b702b7a (2016-10-05) contains a stack buffer overflow in send_diagnostic_request. A 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) receives memcpy at offset 1+pid_length with payload_lengt...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37536/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T20:16:22.500000
2 posts
🟠 CVE-2026-37526 - High (7.8)
AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileged supervision commands (Exit, Do, Sclose, Config, Trace, Debug, Token, slist) without authentication via the abstract Unix socket @Urn:AGL:afs:supe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37526/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37526 - High (7.8)
AGL app-framework-binder (afb-daemon) through v19.90.0 allows any local process to execute privileged supervision commands (Exit, Do, Sclose, Config, Trace, Debug, Token, slist) without authentication via the abstract Unix socket @Urn:AGL:afs:supe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37526/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T20:16:22.353000
2 posts
🟠 CVE-2026-37525 - High (7.8)
AGL app-framework-binder (afb-daemon) through v19.90.0 contains a privilege escalation vulnerability in the supervision Do command. The on_supervision_call function in src/afb-supervision.c explicitly nullifies the request credentials by calling a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37525 - High (7.8)
AGL app-framework-binder (afb-daemon) through v19.90.0 contains a privilege escalation vulnerability in the supervision Do command. The on_supervision_call function in src/afb-supervision.c explicitly nullifies the request credentials by calling a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T20:16:21.470000
2 posts
🟠 CVE-2026-22167 - High (7.8)
Software installed and run as a non-privileged user may conduct improper GPU system calls to force GPU to write to arbitrary physical memory pages.
Under certain circumstances this exploit could be used to corrupt data pages not allocated by th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22167 - High (7.8)
Software installed and run as a non-privileged user may conduct improper GPU system calls to force GPU to write to arbitrary physical memory pages.
Under certain circumstances this exploit could be used to corrupt data pages not allocated by th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T19:18:04.737000
1 posts
🟠 CVE-2026-5403 - High (7.8)
SBC codec crash in Wireshark 4.6.0 to 4.6.4 and 4.4.0 to 4.4.14 allows denial of service and possible code execution
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5403/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T19:16:33
2 posts
🔴 CVE-2026-42484 - Critical (9.8)
A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted PKZIP hash file. The issue affects modules 17200, 17210, 1722...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42484/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-42484 - Critical (9.8)
A heap-based buffer overflow in hex_to_binary in the PKZIP hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted PKZIP hash file. The issue affects modules 17200, 17210, 1722...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42484/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T19:16:32.093000
2 posts
🟠 CVE-2026-42478 - High (7.5)
An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42478/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42478 - High (7.5)
An issue was discovered in VrmlData_IndexedFaceSet::TShape in the VRML V2.0 parser in Open CASCADE Technology (OCCT) V8_0_0_rc5 allows attackers to cause a denial of service via a crafted VRML file. The issue occurs because malformed VRML input ca...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42478/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T19:16:31.153000
3 posts
🔴 New security advisory:
CVE-2026-42472 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-42472-mixphp-unauth-rce-via-deserialization
🔴 CVE-2026-42472 - Critical (9.8)
Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from Redis in the RedisHandler object.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-42472 - Critical (9.8)
Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The session and cache handlers use unserialize() on data from Redis in the RedisHandler object.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42472/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T19:16:30.990000
2 posts
🟠 CVE-2026-42471 - High (8.1)
Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke client (Connection.php:76) calls unserialize() on data received from the server response, enabling client-side RCE if connecting to a malicious server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42471/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42471 - High (8.1)
Unsafe deserialization vulnerability in MixPHP Framework 2.x thru 2.2.17. The sync-invoke client (Connection.php:76) calls unserialize() on data received from the server response, enabling client-side RCE if connecting to a malicious server.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42471/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T19:16:29.050000
2 posts
🟠 CVE-2025-63547 - High (7.5)
An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a crafted packet to the MTU length field
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-63547 - High (7.5)
An issue in Eprosima Micro-XREC-DDS Agent v.3.0.1 allows a remote attacker to cause a denial of service via a crafted packet to the MTU length field
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-63547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T19:16:28.113000
2 posts
🟠 CVE-2025-52347 - High (7.8)
An issue in the component DirectIo64.sys of PassMark BurnInTest v11.0 Build 1011, OSForensics v11.1 Build 1007, and PerformanceTest v11.1 Build 1004 allows attackers to access kernel memory and escalate privileges via a crafted IOCTL 0x8011E044 call.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-52347/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-52347 - High (7.8)
An issue in the component DirectIo64.sys of PassMark BurnInTest v11.0 Build 1011, OSForensics v11.1 Build 1007, and PerformanceTest v11.1 Build 1004 allows attackers to access kernel memory and escalate privileges via a crafted IOCTL 0x8011E044 call.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-52347/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:32:32
3 posts
🚨 New security advisory:
CVE-2026-42483 affects Hashcat Hashcat.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-42483-hashcat-heap-overflow-dos-or-rce
🔴 CVE-2026-42483 - Critical (9.8)
A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerber...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42483/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-42483 - Critical (9.8)
A heap-based buffer overflow in the Kerberos hash parser in hashcat v7.1.2 allows an attacker to cause a denial of service or possibly execute arbitrary code via a crafted Kerberos hash file. The issue affects module_hash_decode in multiple Kerber...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42483/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:32:32
1 posts
🟠 CVE-2026-42403 - High (7.5)
Apache Neethi does not properly detect circular references in policy definitions. When a WS-Policy document contains circular policy references (where Policy A references Policy B which references Policy A), the policy normalization process can en...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42403/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:32:31
1 posts
🟠 CVE-2026-42402 - High (7.5)
Apache Neethi is vulnerable to a Denial of Service attack through algorithmic complexity in policy normalization. Specially crafted WS-Policy documents can trigger an exponential Cartesian cross-product expansion during the normalization process, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42402/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:31:36
2 posts
🔴 CVE-2026-37539 - Critical (9.8)
Buffer overflow vulnerability in cannelloni v2.0.0 in CAN frame parsing in parser.cpp in function parseCANFrame, and decoder.cpp in function decodeFrame allowing remote attackers to cause a denial of service (crash) or possibly execute arbitrary c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37539/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-37539 - Critical (9.8)
Buffer overflow vulnerability in cannelloni v2.0.0 in CAN frame parsing in parser.cpp in function parseCANFrame, and decoder.cpp in function decodeFrame allowing remote attackers to cause a denial of service (crash) or possibly execute arbitrary c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37539/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:31:36
2 posts
🔴 CVE-2026-37541 - Critical (10)
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_gvret.cpp, the length field in GVRET binary data is not properly validated, allowing remote attackers to cause a denial of service or possibly execute ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37541/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-37541 - Critical (10)
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_gvret.cpp, the length field in GVRET binary data is not properly validated, allowing remote attackers to cause a denial of service or possibly execute ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37541/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:31:36
2 posts
🟠 CVE-2026-42469 - High (8.6)
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42469 - High (8.6)
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:31:36
2 posts
🟠 CVE-2026-42468 - High (8.8)
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_pcap.cpp , the parser's phdr.len field is not properly validated, allowing remote attackers to cause a denial of service or possibly execute arbitrary ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42468 - High (8.8)
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_pcap.cpp , the parser's phdr.len field is not properly validated, allowing remote attackers to cause a denial of service or possibly execute arbitrary ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42468/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:31:31
2 posts
🟠 CVE-2026-22166 - High (8.1)
A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system privil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22166/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22166 - High (8.1)
A web page that contains unusual WebGPU content loaded into the GPU GLES render process and can trigger write UAF crash in the GPU GLES user-space shared library. On certain platforms, when the process executing graphics workload has system privil...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22166/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:16:15.497000
2 posts
🟠 CVE-2026-42467 - High (7.5)
An issue was discovered in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Binary_Data_Transfer_DM16 causing a denial of service via crafted CAN frame on the J1939 bus.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42467/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42467 - High (7.5)
An issue was discovered in Open-SAE-J1939 thru commit b6caf884df46435e539b1ecbf92b6c29b345bdfe (2025-11-30) in SAE_J1939_Read_Binary_Data_Transfer_DM16 causing a denial of service via crafted CAN frame on the J1939 bus.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42467/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T18:16:15.047000
2 posts
🟠 CVE-2026-37540 - High (8.4)
OpenAMP v2025.10.0 ELF loader contains an integer overflow vulnerability in firmware image parsing. In elf_loader.c, it performs multiplication of two attacker-controlled 16-bit values from the ELF header without overflow checking. On 32-bit embed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37540/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-37540 - High (8.4)
OpenAMP v2025.10.0 ELF loader contains an integer overflow vulnerability in firmware image parsing. In elf_loader.c, it performs multiplication of two attacker-controlled 16-bit values from the ELF header without overflow checking. On 32-bit embed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-37540/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T15:33:10.820000
1 posts
🟠 CVE-2026-43003 - High (8)
An issue was discovered in OpenStack ironic-python-agent 1.0.0 through 11.5.0. Ironic Python Agent (IPA) sometimes executes grub-install from within a chroot of the deployed partition image, leading to code execution in the case of a malicious image.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43003/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T15:27:15.287000
1 posts
🟠 CVE-2026-6389 - High (8.8)
IBM Turbonomic prometurbo agent 8.16.0 through 8.17.6 IBM Turbonomic Application Resource Management grants excessive cluster‑wide permissions, including unrestricted read access to all secrets. An attacker that compromises the operator or its s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6389/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T15:26:24.553000
2 posts
🚨 CVE-2026-7538 (CRITICAL, CVSS 9.3): Totolink A8000RU 7.1cu.643_b20200521 OS command injection in CGI handler allows unauthenticated remote code execution. No patch — restrict access & monitor vendor updates. https://radar.offseq.com/threat/cve-2026-7538-os-command-injection-in-totolink-a80-28438d15 #OffSeq #CVE20267538 #IoTSecurity #Vuln
##🔴 CVE-2026-7538 - Critical (9.8)
A vulnerability was identified in Totolink A8000RU 7.1cu.643_b20200521. This issue affects the function Vulnerability of the file /cgi-bin/cstecgi.cgi of the component CGI Handler. The manipulation of the argument proto leads to os command injecti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7538/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T15:26:24.553000
1 posts
🟠 CVE-2026-7513 - High (8.8)
A vulnerability has been found in UTT HiPER 1200GW up to 2.5.3-170306. The impacted element is the function strcpy of the file /goform/formRemoteControl. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T12:30:36
2 posts
🟠 CVE-2026-3772 - High (8.8)
The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.9.2. This is due to missing nonce verification in the 'add_plugins_page' and 'add_themes_page' functions. This makes it possib...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3772/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3772 - High (8.8)
The WP Editor plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.9.2. This is due to missing nonce verification in the 'add_plugins_page' and 'add_themes_page' functions. This makes it possib...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3772/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T12:30:35
4 posts
1 repos
🚨 New security advisory:
CVE-2026-42779 affects Apache Mina.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-42779-mina-unauthenticated-rce-via-bad-fix
🚨 CRITICAL: CVE-2026-42779 in Apache MINA (2.1.0 – 2.1.11 & 2.2.0 – 2.2.6) enables remote code execution via deserialization of untrusted data. Upgrade to 2.1.12/2.2.7 now! https://radar.offseq.com/threat/cve-2026-42779-cwe-502-deserialization-of-untruste-d7661188 #OffSeq #ApacheMINA #Vuln #Infosec
##🚨 CRITICAL: CVE-2026-42779 in Apache MINA (2.1.0 – 2.1.11 & 2.2.0 – 2.2.6) enables remote code execution via deserialization of untrusted data. Upgrade to 2.1.12/2.2.7 now! https://radar.offseq.com/threat/cve-2026-42779-cwe-502-deserialization-of-untruste-d7661188 #OffSeq #ApacheMINA #Vuln #Infosec
##🔴 CVE-2026-42779 - Critical (9.8)
The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:
Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42779/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T12:30:30
1 posts
1 repos
🔴 CVE-2026-7567 - Critical (9.8)
The Temporary Login plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.0.0. This is due to improper input validation in the maybe_login_temporary_user() function, which fails to verify that the 'temp-logi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7567/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T12:30:25
3 posts
🔴 New security advisory:
CVE-2026-42778 affects Apache Mina.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-42778-apache-mina-iobuffer-rce-patch-bypass
🔴 CVE-2026-42778 - Critical (9.8)
The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:
The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-42778 impacts Apache MINA 2.1.X & 2.2.X — deserialization flaw in IoBuffer.getObject() due to incomplete previous fix. Upgrade to 2.1.12 or 2.2.7 to mitigate RCE risk. Details: https://radar.offseq.com/threat/cve-2026-42778-cwe-502-deserialization-of-untruste-db0b103e #OffSeq #ApacheMINA #Vuln #AppSec
##updated 2026-05-01T09:30:31
1 posts
🟠 CVE-2026-43001 - High (7.9)
An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T09:30:31
2 posts
🔒 HIGH-severity in Zurich Instruments LabOne Q (2.41.0, 26.4.0b1): CVE-2026-7584 enables arbitrary code exec via malicious experiment files. No patch yet — open files only from trusted sources. Monitor vendor updates. https://radar.offseq.com/threat/cve-2026-7584-cwe-502-deserialization-of-untrusted-3a9a6f64 #OffSeq #Vulnerability #Infosec #LabOneQ
##🟠 CVE-2026-7584 - High (7.8)
The LabOne Q serialization framework uses a class-loading mechanism (import_cls) to dynamically import and instantiate Python classes during deserialization. Prior to the fix, this mechanism accepted arbitrary fully-qualified class names from the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7584/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T06:30:24
1 posts
🚩 CVE-2026-42994: Bitwarden CLI v2026.4.0 (npm, Apr 2026) has a HIGH severity OS Command Injection (CVSS 8.8) due to a supply chain compromise. No patch yet. Avoid this version & verify installs. More info: https://radar.offseq.com/threat/cve-2026-42994-cwe-78-improper-neutralization-of-s-70529260 #OffSeq #Bitwarden #AppSec
##updated 2026-05-01T03:31:30
2 posts
🔥 HIGH severity: CVE-2026-7548 hits Totolink NR1800X (9.1.0u.6279_B20210910) — remote command injection via setUssd in /cgi-bin/cstecgi.cgi. Exploit is public, no patch yet. Disable remote management ASAP! https://radar.offseq.com/threat/cve-2026-7548-command-injection-in-totolink-nr1800-9109fa5c #OffSeq #infosec #vuln #IoT
##🟠 CVE-2026-7548 - High (8.8)
A vulnerability was detected in Totolink NR1800X 9.1.0u.6279_B20210910. This affects the function sub_41A68C of the file /cgi-bin/cstecgi.cgi. Performing a manipulation of the argument setUssd results in command injection. The attack is possible t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T03:31:30
2 posts
🚨 CRITICAL: CVE-2026-7546 in Totolink NR1800X (v9.1.0u.6279_B20210910) — stack buffer overflow in lighttpd. Remote code execution possible. No patch yet. Limit device exposure & monitor vendor updates. https://radar.offseq.com/threat/cve-2026-7546-stack-based-buffer-overflow-in-totol-717d05bc #OffSeq #CVE #IoTSecurity #infosec
##🔴 CVE-2026-7546 - Critical (9.8)
A security vulnerability has been detected in Totolink NR1800X 9.1.0u.6279_B20210910. The impacted element is the function find_host_ip of the component lighttpd. Such manipulation of the argument Host leads to stack-based buffer overflow. The att...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7546/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T00:31:36
1 posts
🟠 CVE-2026-7512 - High (8.8)
A flaw has been found in UTT HiPER 1200GW up to 2.5.3-1703. The affected element is the function strcpy of the file /goform/formUser. Executing a manipulation can lead to buffer overflow. The attack can be launched remotely. The exploit has been p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T00:31:31
1 posts
🟠 CVE-2026-6543 - High (8.8)
IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute arbitrary commands with the privileges of the process running Langflow. This allows reading sensitive environment variables (API keys, DB credentials), modifying files...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6543/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-01T00:31:31
1 posts
🟠 CVE-2026-7551 - High (8.8)
HKUDS OpenHarness contains a remote code execution vulnerability in the /bridge slash command that allows remote senders accepted by configuration to execute arbitrary operating system commands. Attackers can invoke the /bridge spawn command with ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T21:30:44
1 posts
🟠 New security advisory:
CVE-2026-4503 affects multiple systems.
• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-4503-langflow-desktop-unauthenticated-data-leak
updated 2026-04-30T19:51:26.270000
20 posts
41 repos
https://github.com/george1-adel/CVE-2026-41940_exploit
https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker
https://github.com/merdw/cPanel-CVE-2026-41940-Scanner
https://github.com/rdyprtmx/poc-cve-2026-41940
https://github.com/AmirrezaMarzban/portscan-CVE-2026-41940
https://github.com/vineet7800/cpanel-malware-cleaner-cve-2026
https://github.com/0xBlackash/CVE-2026-41940
https://github.com/Christian93111/CVE-2026-41940
https://github.com/zedxod/CVE-2026-41940-POC
https://github.com/0dev1337/cpanelscanner
https://github.com/XsanFlip/poc-cpanel-cve-2026-41940
https://github.com/NULL200OK/cve-2026-41940-tool
https://github.com/ThatNotEasy/CVE-2026-41940
https://github.com/0xF55/cve-2026-41940-exploit
https://github.com/ilmndwntr/CVE-2026-41940-MASS-EXPLOIT
https://github.com/Kagantua/cPanelWHM-AuthBypass
https://github.com/devtint/CVE-2026-41940
https://github.com/senyx122/CVE-2026-41940
https://github.com/MrAriaNet/cPanel-Fix
https://github.com/unteikyou/CVE-2026-41940-AuthBypass-Detector
https://github.com/Sachinart/CVE-2026-41940-cpanel-0day
https://github.com/assetnote/cpanel2shell-scanner
https://github.com/Jenderal92/CVE-2026-41940
https://github.com/mahfuzreham/cpanel-cve-2026-41940
https://github.com/linko-iheb/cve-2026-41940-scanner
https://github.com/MrOplus/CVE-2026-41940
https://github.com/0xabdoulaye/CPANEL-CVE-2026-41940
https://github.com/ynsmroztas/cPanelSniper
https://github.com/rfxn/cpanel-sessionscribe
https://github.com/Lutfifakee-Project/CVE-2026-41940
https://github.com/dennisec/CVE-2026-41940
https://github.com/kmaruthisrikar/CVE-2026-41940-cPanel-Auth-Bypass-Exploit
https://github.com/shahidmallaofficial/cpanel-cve-2026-41940-fix
https://github.com/realawaisakbar/CVE-2026-41940-Exploit-PoC
https://github.com/Wesuiliye/CVE-2026-41940
https://github.com/Ishanoshada/CVE-2026-41940-Exploit-PoC
https://github.com/sebinxavi/cve-checker-2026
https://github.com/3tternp/CVE-2026-41940---cPanel-WHM-check
https://github.com/adriyansyah-mf/cve-2026-41940-poc
cPanel Zero-Day Mass Exploited: “Sorry” Ransomware Hits Thousands of Servers
Introduction A newly disclosed security flaw in cPanel, tracked as CVE-2026-41940, has rapidly turned into a serious global threat. Cybercriminals are reportedly exploiting the vulnerability at scale to compromise web hosting servers, seize access to management panels, and deploy a ransomware strain known as Sorry. The situation escalated so quickly that emergency patches were released this…
##The 'Sorry' ransomware attacks exposed a critical cPanel zero-day (CVE-2026-41940) that allowed root access on millions of domains for over two months. This post goes beyond the patch, detailing the CRLF injection technique, the staggering blast radius, and the multi-layered persistence mechanisms – from SSH keys to hidden SUID binaries – that mean a simple update won't secure your server.…
#cybersecurity #cpanel #sorryransomware
🤖 This post was AI-generated.
##Reports: A critical cPanel & WHM zero-day (CVE-2026-41940) is being actively exploited since Feb—attackers can bypass auth to gain full admin access. Patch immediately. 🔥🔐⚠️ Read: https://cyberinsider.com/critical-cpanel-zero-day-auth-bypass-exploited-since-february/ #cPanel #infosec #zeroDay #cybersecurity
##Critical Authentication Bypass in cPanel and WHM Actively Exploited
A critical authentication bypass vulnerability (CVE-2026-41940, CVSS 9.8) in cPanel and WHM is being actively exploited to grant attackers full root access to web servers.
**If you use cPanel or WHM on your servers, this is urgent, you are being hacked. Immediately run /scripts/upcp --force to apply the emergency patch, then verify the version with /usr/local/cpanel/cpanel -V. Until you've confirmed the update, block external access to ports 2083 and 2087. If you are using cPanel as a customer, reach to your hosting provider to confirm that they have updated cPanel.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-authentication-bypass-in-cpanel-and-whm-actively-exploited-t-j-b-6-s/gD2P6Ple2L
cPanel CVE-2026-41940 now exploited in the wild.
Ransomware cases emerging, millions exposed.
CISA confirms active attacks.
Source: https://www.theregister.com/2026/05/01/critical_cpanel_vuln_hits_cisa/
💬 Thoughts?
Follow @technadu
Critical cPanel Zero-Day Leak Sparks Global Server Takeover Fears as Dark Web Exploit Spreads Fast
Introduction: A Silent Cyberstorm Building Beneath the Internet Surface A newly emerging exploit targeting cPanel & WHM systems has begun circulating across underground cybercrime forums, triggering serious concern among cybersecurity researchers and infrastructure administrators. The vulnerability, tracked as CVE-2026-41940, is reportedly being weaponized in…
##CPanel and WHM Authentication Bypass – CVE-2026-41940 https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/
##Reports: A critical cPanel & WHM zero-day (CVE-2026-41940) is being actively exploited since Feb—attackers can bypass auth to gain full admin access. Patch immediately. 🔥🔐⚠️ Read: https://cyberinsider.com/critical-cpanel-zero-day-auth-bypass-exploited-since-february/ #cPanel #infosec #zeroDay #cybersecurity
##Critical Authentication Bypass in cPanel and WHM Actively Exploited
A critical authentication bypass vulnerability (CVE-2026-41940, CVSS 9.8) in cPanel and WHM is being actively exploited to grant attackers full root access to web servers.
**If you use cPanel or WHM on your servers, this is urgent, you are being hacked. Immediately run /scripts/upcp --force to apply the emergency patch, then verify the version with /usr/local/cpanel/cpanel -V. Until you've confirmed the update, block external access to ports 2083 and 2087. If you are using cPanel as a customer, reach to your hosting provider to confirm that they have updated cPanel.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/critical-authentication-bypass-in-cpanel-and-whm-actively-exploited-t-j-b-6-s/gD2P6Ple2L
cPanel CVE-2026-41940 now exploited in the wild.
Ransomware cases emerging, millions exposed.
CISA confirms active attacks.
Source: https://www.theregister.com/2026/05/01/critical_cpanel_vuln_hits_cisa/
💬 Thoughts?
Follow @technadu
New.
Picus: CVE-2026-41940 Explained: The cPanel & WHM Authentication Bypass That Hit 1.5M Servers https://www.picussecurity.com/resource/blog/cve-2026-41940-explained-cpanel-whm-authentication-bypass-hit-1-5m-servers #cPanel #infosec #vulnerability
##cPanel & WHM Authentication Bypass (CVE-2026-41940) https://lobste.rs/s/m8t9px #php #security
https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/
CPanel and WHM Authentication Bypass – CVE-2026-41940
https://news.ycombinator.com/item?id=47969288
CPanel and WHM Authentication Bypass – CVE-2026-41940
Link: https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/
Discussion: https://news.ycombinator.com/item?id=47969288
⚠️ Si vous administrez ou connaissez quelqu’un qui administre un ou des hébergements avec cPanel & WHM, attention : la vulnérabilité critique CVE-2026-41940 ( https://vulnerability.circl.lu/vuln/CVE-2026-41940 ) permets à un attaquant distant de contourner l’authentification et d’obtenir un accès administrateur sans identifiants.
L’exploitation se fait via les interfaces HTTPS exposées, sans interaction utilisateur, ce qui en fait un risque immédiat pour les serveurs accessibles depuis Internet.
Ce type de faille est particulièrement recherché par les cybercriminels et par certaines APT gravitant autour de la Russie : prise de contrôle d’hébergements, déploiement de webshells, détournement de domaines, modification DNS/mail, vol de données ou rebond vers d’autres systèmes.
À corriger en priorité : appliquez les versions corrigées, limitez l’accès à cPanel/WHM via VPN ou allowlist IP, et vérifiez les journaux d’accès.
⬇️
https://www.rapid7.com/blog/post/etr-cve-2026-41940-cpanel-whm-authentication-bypass/
'The Internet is falling down': Critical cPanel CRLF injection vulnerability puts tens of millions of websites at risk of total compromise – hosting providers urged to apply CVE-2026-41940 patch immediately
https://www.techradar.com/pro/security/the-internet-is-falling-down-critical-cpanel-crlf-injection-vulnerability-puts-tens-of-millions-of-websites-at-risk-of-total-compromise-hosting-providers-urged-to-apply-cve-2026-41940-patch-immediately?utm_source=flipboard&utm_medium=activitypub
Posted into The Dark Side of the Internet @the-dark-side-of-the-internet-rhudaur
##CPanel and WHM Authentication Bypass – CVE-2026-41940
Link: https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/
Discussion: https://news.ycombinator.com/item?id=47969288
🚨 Oh no! The sky is falling, and it's bringing an #authentication #bypass with it! 🎉 Forget your passwords, folks; cPanel/WHM's got a new way to let anyone in—CVE-2026-41940. 🤡 But don't worry, the experts are on it... by writing cryptic jokes only they understand. 🙄🔒
https://labs.watchtowr.com/the-internet-is-falling-down-falling-down-falling-down-cpanel-whm-authentication-bypass-cve-2026-41940/ #cPanel #WHM #CVE-2026-41940 #cybersecurity #humor #HackerNews #ngated
The Internet Is Falling Down- CPanel/WHM Authentication Bypass CVE-2026-41940
#HackerNews #CPanel #WHM #Security #Vulnerability #Authentication #Bypass #CVE2026-41940 #Cybersecurity
##No wonder why I worry about Wordpress websites.
##updated 2026-04-30T19:18:32.230000
2 posts
1 repos
CVE-2026-34159: llama.cpp RPC backend has an unauthenticated, no-bounds-check RCE. Zero buffer field in deserialize_tensor() allows arbitrary memory read/write. No auth, low complexity, CVSS 9.8. Patch to b8492 immediately. #infosec #llamacpp #rce
##CVE-2026-34159: llama.cpp RPC backend has an unauthenticated, no-bounds-check RCE. Zero buffer field in deserialize_tensor() allows arbitrary memory read/write. No auth, low complexity, CVSS 9.8. Patch to b8492 immediately. #infosec #llamacpp #rce
##updated 2026-04-30T18:30:38
1 posts
🚨 CVE-2026-4670 (CVSS 9.8): CRITICAL auth bypass in MOVEit Automation (2025.0.0 < 2025.0.9, 2024.0.0 < 2024.1.8, prior). Patch pending — restrict access & monitor advisories. No known in-the-wild exploits. https://radar.offseq.com/threat/cve-2026-4670-cwe-305-authentication-bypass-by-pri-dff96cb4 #OffSeq #MOVEit #CVE20264670
##updated 2026-04-30T18:30:10.083000
1 posts
🔴 CVE-2026-7333 - Critical (9.6)
Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7333/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T18:28:40.237000
1 posts
🟠 CVE-2026-7337 - High (8.8)
Type Confusion in V8 in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7337/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T18:28:23.367000
1 posts
🟠 CVE-2026-7338 - High (7.5)
Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to potentially exploit heap corruption via malicious network traffic. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7338/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T18:28:04.463000
1 posts
🟠 CVE-2026-7346 - High (8.1)
Inappropriate implementation in Tint in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T18:26:41.267000
1 posts
🟠 CVE-2026-7339 - High (8.8)
Heap buffer overflow in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7339/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T16:40:08.557000
1 posts
🟠 CVE-2026-7352 - High (8.3)
Use after free in Media in Google Chrome on Android prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T16:38:18.927000
1 posts
🟠 CVE-2026-7354 - High (8.8)
Out of bounds read and write in Angle in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7354/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T16:38:03.603000
1 posts
🟠 CVE-2026-7356 - High (8.8)
Use after free in Navigation in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7356/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T16:37:58.563000
1 posts
🟠 CVE-2026-7357 - High (7.5)
Use after free in GPU in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7357/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T16:36:22.073000
1 posts
🟠 CVE-2026-7343 - High (7.5)
Use after free in Views in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7343/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T16:36:06.133000
2 posts
🟠 CVE-2026-7345 - High (8.3)
Insufficient validation of untrusted input in Feedback in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7345/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7345 - High (8.3)
Insufficient validation of untrusted input in Feedback in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7345/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T15:31:41
2 posts
🟠 CVE-2026-42512 - High (8.1)
As dhclient is building an environment to pass to dhclient-script, it may need to resize the array of string pointers. The code which expands the array incorrectly calculates its new size when requesting memory, resulting in a heap buffer overrun...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42512 - High (8.1)
As dhclient is building an environment to pass to dhclient-script, it may need to resize the array of string pointers. The code which expands the array incorrectly calculates its new size when requesting memory, resulting in a heap buffer overrun...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T15:31:40
2 posts
🟠 CVE-2026-42511 - High (8.1)
The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42511 - High (8.1)
The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T15:11:12.703000
1 posts
🟠 CVE-2026-42524 - High (8)
Jenkins HTML Publisher Plugin 427 and earlier does not escape job name and URL in the legacy wrapper file, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-30T14:52:54.847000
2 posts
Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.
Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.
##Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.
Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.
##updated 2026-04-30T14:52:54.847000
2 posts
Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.
Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.
##Command injection in MCP servers. Not surprised. CVE-2026-7446 hits mcp-server-semgrep, and CVE-2026-7416 hits xcode-mcp-server.
Both let remote attackers inject OS commands with no auth needed. The attack surface on MCP servers keeps growing, and most of these community-built tools were never designed with security in mind. mcp-server-semgrep has a fix in v1.0.1, but who's checking their MCP server versions? Nobody. That's the problem.
##updated 2026-04-29T21:31:26
1 posts
🟠 CVE-2026-7359 - High (8.8)
Use after free in ANGLE in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T21:31:26
1 posts
🟠 CVE-2026-7358 - High (8.8)
Use after free in Animation in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7358/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T20:16:30.070000
1 posts
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-29T19:08:21.840000
1 posts
🔴 CVE-2026-42779 - Critical (9.8)
The fix for CVE-2026-41635 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:
Apache MINA's AbstractIoBuffer.resolveClass() contains two branches, one of them (for static classes or primitive types...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42779/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:46
1 posts
🟠 CVE-2026-7363 - High (8.8)
Use after free in Canvas in Google Chrome on Linux, ChromeOS prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7363/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:45
1 posts
🟠 CVE-2026-7353 - High (8.3)
Heap buffer overflow in Skia in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7353/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:45
1 posts
🟠 CVE-2026-7349 - High (7.5)
Use after free in Cast in Google Chrome prior to 147.0.7727.138 allowed an attacker on the local network segment to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7349/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:45
2 posts
🟠 CVE-2026-7361 - High (8.8)
Use after free in iOS in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7361/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7361 - High (8.8)
Use after free in iOS in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7361/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:45
1 posts
🟠 CVE-2026-40560 - High (7.5)
Starman versions before 0.4018 for Perl allows HTTP Request Smuggling via Improper Header Precedence.
Starman incorrectly prioritizes "Content-Length" over "Transfer-Encoding: chunked" when both headers are present in an HTTP request. Per RFC 723...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40560/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
1 posts
🟠 CVE-2026-7344 - High (8.8)
Use after free in Accessibility in Google Chrome on Windows prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7344/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
1 posts
🟠 CVE-2026-7342 - High (8.8)
Use after free in WebView in Google Chrome on Android prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7342/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
1 posts
🟠 CVE-2026-7341 - High (8.8)
Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7341/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
1 posts
🟠 CVE-2026-7336 - High (8.8)
Use after free in WebRTC in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7336/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
1 posts
🟠 CVE-2026-7335 - High (8.8)
Use after free in media in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7335/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
1 posts
🟠 CVE-2026-7350 - High (8.3)
Use after free in WebMIDI in Google Chrome prior to 147.0.7727.138 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7350/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
2 posts
🟠 CVE-2026-7347 - High (8.1)
Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7347/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7347 - High (8.1)
Use after free in Chromoting in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7347/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
1 posts
🟠 CVE-2026-7348 - High (8.8)
Use after free in Codecs in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7348/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:31:44
1 posts
🟠 CVE-2026-7355 - High (8.8)
Use after free in Media in Google Chrome prior to 147.0.7727.138 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7355/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:30:48
1 posts
🔴 CVE-2026-42523 - Critical (9)
Jenkins GitHub Plugin 1.46.0 and earlier improperly processes the current job URL as part of JavaScript implementing validation of the feature "GitHub hook trigger for GITScm polling", resulting in a stored cross-site scripting (XSS) vulnerability...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:30:40
1 posts
🟠 CVE-2026-41220 - High (7.8)
Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect Cloud Agent (Windows) before build 42183.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41220/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:30:39
1 posts
🟠 CVE-2026-5140 - High (8.8)
Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus allows Authentication Bypass.
This issue affects Pardus: from <=0.6.4 before 0.8.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5140/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T15:30:39
1 posts
🟠 CVE-2026-42520 - High (7.5)
Jenkins Credentials Binding Plugin 719.v80e905ef14eb_ and earlier does not sanitize file names for file and zip file credentials, allowing attackers able to provide credentials to a job to write files to arbitrary locations on the node filesystem,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-29T12:33:14
1 posts
🟠 CVE-2026-42646 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Steve Burge TaxoPress simple-tags allows Blind SQL Injection.This issue affects TaxoPress: from n/a through <= 3.44.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42646/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-28T21:35:58
7 posts
4 repos
https://github.com/lysophavin18/CVE-2026-3854-PoC
https://github.com/LACHHAB-Anas/Exploit_CVE-2026-3854
https://prog.hu/hirek/7088/github-cve-2026-3854-kritikus-rce-sebezhetoseg-kodtar
##kernel vulnerability (CVE-2026-31431)**: "Copy Fail" exploit granting root access.
- **PostgreSQL updates**: Releases of PgQue v0.1, pgexporter 0.8, pgmoneta 0.21, and PostgreSQL 19 feature freeze.
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), migrations to alternatives like Codeberg and Radicle. [2/2]
Fail")**
- Critical local privilege escalation exploit affecting major Linux distributions
- Patch status and responses from various Linux distros (Debian, Fedora, Ubuntu, etc.)
3. **Arduino and ESP32 Libraries**
- New releases for sensors, robotics, and IoT projects (e.g., TMT_SmartConnect, ScioSense_ENS17x, Windnerd_Core)
4. **GitHub Reliability and Alternatives**
- Frequent outages, security vulnerabilities (e.g., CVE-2026-3854)
- Migrations to [2/3]
Blip blop, I'm a #mastobot.
Here is a summary (in beta) of the latest posts in #programmingAtKukei https://masto.kukei.eu/browse/programming category:
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), migrations to alternatives like Codeberg and Radicle.
- **PostgreSQL updates**: Releases of PgQue v0.1, pgexporter 0.8, pgmoneta 0.21, and discussions on PostgreSQL 19 feature freeze.
- **Linux kernel vulnerability (CVE-2026-31431)**: "Copy [1/2]
releases for TMT_SmartConnect, ScioSense_ENS17x, ATD3.5-S3_HandySense, ESP32_Host_MIDI, and others.
- **GitHub reliability and pricing**: Frequent outages, security vulnerabilities (e.g., CVE-2026-3854), and migrations to alternatives like Codeberg and Radicle.
- **Ubuntu/Canonical DDoS attack**: Prolonged outages affecting Ubuntu websites, Snap store, and Launchpad. [2/2]
GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog #devopsish https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854
##GitHub RCE Vulnerability: CVE-2026-3854 Breakdown | Wiz Blog #devopsish https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854
##updated 2026-04-27T16:44:38.997000
1 posts
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-27T16:30:09
1 posts
7 repos
https://github.com/mki9/CVE-2026-39987_exploit
https://github.com/fevar54/marimo_CVE-2026-39987_RCE_PoC
https://github.com/Dhiaelhak-Rached/CVE-2026-39987-lab-or-marimo-cve-lab
https://github.com/0xBlackash/CVE-2026-39987
https://github.com/h3raklez/CVE-2026-39987
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-27T12:30:39
1 posts
🔴 CVE-2026-42778 - Critical (9.8)
The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:
The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T18:30:36
1 posts
Mirai Turns Unsupported D-Link Routers into DDoS Weapons Using CVE-2025-29635
#CVE_2025_29635 #Mirai
https://www.secpod.com/blog/mirai-turns-unsupported-d-link-routers-into-ddos-weapons-using-cve-2025-29635/
updated 2026-04-24T16:37:54
2 posts
🟠 CVE-2026-40912 - High (8.2)
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's StripPrefixRegex middleware when used in combination with ForwardAuth,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40912/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40912 - High (8.2)
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's StripPrefixRegex middleware when used in combination with ForwardAuth,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40912/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T16:33:44
2 posts
🔴 CVE-2026-39858 - Critical (10)
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's for...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-39858 - Critical (10)
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is a high severity authentication bypass vulnerability in Traefik's ForwardAuth and snippet-based authentication middleware. Traefik's for...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-24T16:31:25
2 posts
🔴 CVE-2026-35051 - Critical (10)
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is an authentication bypass vulnerability in Traefik's ForwardAuth middleware when trustForwardHeader=false is configured and Traefik is d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35051/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-35051 - Critical (10)
Traefik is an HTTP reverse proxy and load balancer. Prior to versions 2.11.43, 3.6.14, and 3.7.0-rc.2, there is an authentication bypass vulnerability in Traefik's ForwardAuth middleware when trustForwardHeader=false is configured and Traefik is d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35051/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-04-22T15:32:37
1 posts
4 repos
https://github.com/ynsmroztas/FortiSandbox-RCE-Exploit-CVE-2026-39808
https://github.com/Lechansky/CVE-2026-39808
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-20T13:47:31.163000
2 posts
2 repos
It's fair to say that <https://nitter.net/cperciva/status/2049591719143059860>, a few hours before Gary's video, was not bullshit:
" In April, FreeBSD issued eight security advisories. Six of them were for issues found by AI."
Colin Percival quotes his own post from March 2026:
"… LLMs are producing lots of slop, but they're also finding a heck of a lot of real vulnerabilities."
@seuros if you disagree with CWE-121 – the Common Weakness Enumeration (CWE™) for CVE-2026-4747 – you might contact MITRE – <https://www.cve.org/CVERecord?id=CVE-2026-4747>.
Cc @garyhtech @cperciva@mastodon.social
@cperciva@bird.makeup (automated)
#AI #FreeBSD #vulnerability #Anthropic #Claude #Mythos #security #infosec
##It's fair to say that <https://nitter.net/cperciva/status/2049591719143059860>, a few hours before Gary's video, was not bullshit:
" In April, FreeBSD issued eight security advisories. Six of them were for issues found by AI."
Colin Percival quotes his own post from March 2026:
"… LLMs are producing lots of slop, but they're also finding a heck of a lot of real vulnerabilities."
@seuros if you disagree with CWE-121 – the Common Weakness Enumeration (CWE™) for CVE-2026-4747 – you might contact MITRE – <https://www.cve.org/CVERecord?id=CVE-2026-4747>.
Cc @garyhtech @cperciva@mastodon.social
@cperciva@bird.makeup (automated)
#AI #FreeBSD #vulnerability #Anthropic #Claude #Mythos #security #infosec
##updated 2026-04-18T00:31:10
1 posts
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-17T09:31:18
1 posts
CVE-2026-4659: Unlimited Elements plugin <=2.0.6 allows any Author to read arbitrary files via path traversal in URLtoRelative(). No patch exists. Fix your own damn code or pull the plugin. #InfoSec #WordPress
##updated 2026-04-16T21:49:17
1 posts
9 repos
https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-
https://github.com/hg0434hongzh0/CVE-2026-34197
https://github.com/dinosn/CVE-2026-34197
https://github.com/keraattin/CVE-2026-34197
https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197
https://github.com/0xBlackash/CVE-2026-34197
https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-08T12:31:36
1 posts
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-06T18:12:57.863000
1 posts
7 repos
https://github.com/0xBlackash/CVE-2026-35616
https://github.com/fevar54/forticlient_ems_cve_2026_35616_poc.py
https://github.com/keraattin/CVE-2026-35616
https://github.com/BishopFox/CVE-2026-35616-check
https://github.com/fevar54/CVE-2026-35616-detector.py
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-03T18:32:15
1 posts
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2026-04-02T15:31:40
1 posts
2 repos
https://github.com/0xBlackash/CVE-2026-2699
https://github.com/watchtowrlabs/watchTowr-vs-Progress-ShareFile-CVE-2026-2699
📈 CVE Published in last 30 days (2026-04-01 - 2026-05-01)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 5807
Severity:
- Critical: 515
- High: 2106
- Medium: 2394
- Low: 573
- None: 219
Status:
- : 86
- Analyzed: 3144
- Awaiting Analysis: 825
- Deferred: 1513
- Modified: 111
- Received: 17
- Rejected: 55
- Undergoing Analysis: 56
Top CNAs:
- GitHub, Inc.: 1234
- VulDB: 776
- VulnCheck: 528
- MITRE: 411
- kernel.org: 380
- Wordfence: 301
- Patchstack: 217
- Microsoft Corporation: 181
- Chrome: 145
- Oracle: 102
Top Affected Products:
- UNKNOWN: 2561
- Linux Kernel: 247
- Openclaw: 156
- Google Chrome: 139
- Microsoft Windows Server 2025: 118
- Microsoft Windows Server 2022 23h2: 116
- Microsoft Windows 11 24h2: 115
- Microsoft Windows 11 25h2: 115
- Microsoft Windows 11 26h1: 114
- Microsoft Windows Server 2022: 111
Top EPSS Score:
- CVE-2026-34197 - 65.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34197)
- CVE-2026-39987 - 55.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39987)
- CVE-2026-35616 - 41.37 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35616)
- CVE-2026-2262 - 29.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2262)
- CVE-2026-2699 - 23.78 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-2699)
- CVE-2026-29014 - 17.07 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-29014)
- CVE-2026-3396 - 16.99 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-3396)
- CVE-2026-35029 - 13.30 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-35029)
- CVE-2026-38834 - 13.21 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-38834)
- CVE-2026-39808 - 11.27 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39808)
updated 2025-12-09T16:53:25
2 posts
100 repos
https://github.com/BeichenDream/CVE-2025-55182-GodzillaMemoryShell
https://github.com/freeqaz/react2shell
https://github.com/techgaun/cve-2025-55182-scanner
https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc
https://github.com/hoosin/CVE-2025-55182
https://github.com/c0rydoras/CVE-2025-55182
https://github.com/kOaDT/poc-cve-2025-55182
https://github.com/ejpir/CVE-2025-55182-bypass
https://github.com/shyambhanushali/React2Shell
https://github.com/ynsmroztas/NextRce
https://github.com/vijay-shirhatti/RSC-Detect-CVE-2025-55182
https://github.com/shamo0/react2shell-PoC
https://github.com/keklick1337/CVE-2025-55182-golang-PoC
https://github.com/Dh4v4l8/CVE-2025-55182-poc-tool
https://github.com/zzhorc/CVE-2025-55182
https://github.com/Cillian-Collins/CVE-2025-55182
https://github.com/dwisiswant0/CVE-2025-55182
https://github.com/Pizz33/CVE-2025-55182-burpscanner
https://github.com/sudo-Yangziran/CVE-2025-55182POC
https://github.com/AliHzSec/CVE-2025-55182
https://github.com/MoLeft/React2Shell-Toolbox
https://github.com/EynaExp/CVE-2025-55182-POC
https://github.com/songsanggggg/CVE-2025-55182
https://github.com/subhdotsol/CVE-2025-55182
https://github.com/kavienanj/CVE-2025-55182
https://github.com/hexsh1dow/CVE-2025-55182
https://github.com/heiheishushu/rsc_detect_CVE-2025-55182
https://github.com/emredavut/CVE-2025-55182
https://github.com/Spritualkb/CVE-2025-55182-exp
https://github.com/pax-k/react2shell-CVE-2025-55182-full-rce-script
https://github.com/kondukto-io/vulnerable-next-js-poc
https://github.com/tobiasGuta/Next.js-RSC-RCE-Scanner-Burp-Suite-Extension
https://github.com/VeilVulp/RscScan-cve-2025-55182
https://github.com/nehkark/CVE-2025-55182
https://github.com/cybertechajju/R2C-CVE-2025-55182-66478
https://github.com/rix4uni/CVE-2025-55182
https://github.com/yanoshercohen/React2Shell_CVE-2025-55182
https://github.com/Updatelap/CVE-2025-55182
https://github.com/xalgord/React2Shell
https://github.com/M4xSec/CVE-2025-55182-React2Shell-RCE-Shell
https://github.com/santihabib/CVE-2025-55182-analysis
https://github.com/whiteov3rflow/CVE-2025-55182-poc
https://github.com/assetnote/react2shell-scanner
https://github.com/alfazhossain/CVE-2025-55182-Exploiter
https://github.com/MemerGamer/CVE-2025-55182
https://github.com/sumanrox/rschunter
https://github.com/zack0x01/vuln-app-CVE-2025-55182
https://github.com/gensecaihq/react2shell-scanner
https://github.com/LemonTeatw1/CVE-2025-55182-exploit
https://github.com/websecuritylabs/React2Shell-Library
https://github.com/Archerkong/CVE-2025-55182
https://github.com/jctommasi/react2shellVulnApp
https://github.com/anuththara2007-W/CVE-2025-55182-Exploit-extension
https://github.com/BankkRoll/Quickcheck-CVE-2025-55182-React-and-CVE-2025-66478-Next.js
https://github.com/RuoJi6/CVE-2025-55182-RCE-shell
https://github.com/Rsatan/Next.js-Exploit-Tool
https://github.com/zr0n/react2shell
https://github.com/vulncheck-oss/cve-2025-55182
https://github.com/jf0x3a/CVE-2025-55182-exploit
https://github.com/sickwell/CVE-2025-55182
https://github.com/Cr4at0r/Next.js-RCE-Scanner-BurpSuite-Extension-
https://github.com/hidden-investigations/react2shell-scanner
https://github.com/hualy13/CVE-2025-55182
https://github.com/MrR0b0t19/CVE-2025-55182-shellinteractive
https://github.com/alsaut1/react2shell-lab
https://github.com/AdityaBhatt3010/React2Shell-CVE-2025-55182
https://github.com/CirqueiraDev/MassExploit-CVE-2025-55182
https://github.com/msanft/CVE-2025-55182
https://github.com/mrknow001/RSC_Detector
https://github.com/ThemeHackers/CVE-2025-55182
https://github.com/fatguru/CVE-2025-55182-scanner
https://github.com/hackersatyamrastogi/react2shell-ultimate
https://github.com/l4rm4nd/CVE-2025-55182
https://github.com/TrixSec/CVE-2025-55182-Scanner
https://github.com/Tiger-Foxx/exploit-react-CVE-2025-55182
https://github.com/zack0x01/CVE-2025-55182-advanced-scanner-
https://github.com/acheong08/CVE-2025-55182-poc
https://github.com/snipevx/React2Shell-POC
https://github.com/RavinduRathnayaka/CVE-2025-55182-PoC
https://github.com/StealthMoud/CVE-2025-55182-Scanner
https://github.com/CymulateResearch/React2Shell-Scanner
https://github.com/theori-io/reactguard
https://github.com/xcanwin/CVE-2025-55182-React-RCE
https://github.com/GelukCrab/React-Server-Components-RCE
https://github.com/logesh-GIT001/CVE-2025-55182
https://github.com/Chocapikk/CVE-2025-55182
https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool
https://github.com/alptexans/RSC-Detect-CVE-2025-55182
https://github.com/momika233/CVE-2025-55182-bypass
https://github.com/aliclub0x00/CVE-2025-55182-POC-NEXTJS
https://github.com/chrahman/react2shell-CVE-2025-55182-full-rce-script
https://github.com/ejpir/CVE-2025-55182-research
https://github.com/xkillbit/cve-2025-55182-scanner
https://github.com/im-ezboy/CVE-2025-55182-zoomeye
https://github.com/surajhacx/react2shellpoc
https://github.com/ZihxS/check-react-rce-cve-2025-55182
updated 2025-10-24T13:42:55.550000
2 posts
14 repos
https://github.com/RevoltSecurities/CVE-2023-4966
https://github.com/dinosn/citrix_cve-2023-4966
https://github.com/akshthejo/CVE-2023-4966-exploit
https://github.com/LucasOneZ/CVE-2023-4966
https://github.com/certat/citrix-logchecker
https://github.com/byte4RR4Y/CVE-2023-4966
https://github.com/morganwdavis/overread
https://github.com/0xKayala/CVE-2023-4966
https://github.com/Chocapikk/CVE-2023-4966
https://github.com/s-bt/CVE-2023-4966
https://github.com/mlynchcogent/CVE-2023-4966-POC
https://github.com/jmussmann/cve-2023-4966-iocs
CVE‑2023‑4966 remains actively exploited in Citrix NetScaler ADC environments. This critical session hijacking vulnerability enables unauthenticated attackers to obtain authenticated access. Our latest Threat Brief outlines risk impact, exploitation context, and required mitigation actions. #CVE
##CVE‑2023‑4966 remains actively exploited in Citrix NetScaler ADC environments. This critical session hijacking vulnerability enables unauthenticated attackers to obtain authenticated access. Our latest Threat Brief outlines risk impact, exploitation context, and required mitigation actions. #CVE
##updated 2025-02-12T10:15:13.573000
1 posts
🔴 CVE-2026-42778 - Critical (9.8)
The fix for CVE-2026-41409 was not applied to the 2.1.X and 2.2.X branches. Here was the original issue description:
The fix for CVE-2024-52046 in Apache MINA AbstractIoBuffer.getObject() was incomplete. The classname allowlist of classes allo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42778/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##1 posts
8 repos
https://github.com/mazofeifaalfaro/check_pack2theroot
https://github.com/dinosn/pack2theroot-lab
https://github.com/Vozec/CVE-2026-41651
https://github.com/baph00met/CVE-2026-41651
https://github.com/aexdyhaxor/CVE-2026-41651
https://github.com/shibaaa204/Pack2TheRoot
What to read this weekend
1 Building a Low- Cost, Private 4G LTE Network https://hackers-arise.com/sdr-signals-intelligence-for-hackers-building-a-low-cost-private-4g-lte-network/
2 Privilege Escalation https://hackers-arise.com/privilege-escalation-getting-started-with-the-pack2theroot-cve-2026-41651-vulnerability-to-escalate-privileges/
3 OSINT in TikTok https://hackers-arise.com/open-source-intelligence-osint-extracting-information-from-tiktok/
#osint #cybersecurity #digitalArt
4 posts
1 repos
https://github.com/Rat5ak/CVE-2026-31413-BPF-Container-Escape
Severe Linux Copy Fail security flaw uncovered using AI scanning help
https://www.theverge.com/tech/922243/linux-cve-2026-3141-copy-fail-exploit
##Severe Linux Copy Fail security flaw uncovered using AI scanning help https://www.theverge.com/tech/922243/linux-cve-2026-3141-copy-fail-exploit
##Severe Linux Copy Fail security flaw uncovered using AI scanning help
https://www.theverge.com/tech/922243/linux-cve-2026-3141-copy-fail-exploit?utm_source=flipboard&utm_medium=activitypub
Posted into Tech News @tech-news-theverge
##"Severe Linux Copy Fail security flaw uncovered using AI scanning help"
"Nearly every Linux distribution released since 2017 is currently vulnerable to a security bug called "Copy Fail" that allows any user to give themselves administrator privileges."
https://www.theverge.com/tech/922243/linux-cve-2026-3141-copy-fail-exploit
##