##
Updated at UTC 2026-05-17T21:38:47.804053
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-43500 | 7.8 | 0.01% | 3 | 13 | 2026-05-17T18:31:33 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also | |
| CVE-2026-8739 | 5.3 | 0.03% | 2 | 0 | 2026-05-17T09:30:29 | A vulnerability was detected in Sanluan PublicCMS 5.202506.d. The affected eleme | |
| CVE-2026-8737 | 5.3 | 0.05% | 2 | 0 | 2026-05-17T09:30:23 | A weakness has been identified in Sanluan PublicCMS 5.202506.d. This issue affec | |
| CVE-2026-8719 | 8.8 | 0.04% | 4 | 0 | 2026-05-17T06:30:32 | The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPre | |
| CVE-2026-8733 | 6.3 | 0.03% | 2 | 0 | 2026-05-17T06:30:32 | A vulnerability was found in Investintech SlimPDFReader up to 2.0.13. Affected b | |
| CVE-2026-8724 | 4.7 | 0.01% | 2 | 0 | 2026-05-17T03:30:25 | A security flaw has been discovered in Dataease 2.10.20. Impacted is the functio | |
| CVE-2026-8725 | 7.3 | 0.04% | 2 | 0 | 2026-05-17T02:16:45.487000 | A weakness has been identified in CoreWorxLab CAAL up to 1.6.0. The affected ele | |
| CVE-2026-46728 | 8.2 | 0.00% | 4 | 0 | 2026-05-17T00:31:39 | Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification by | |
| CVE-2020-17103 | 7.0 | 0.35% | 2 | 2 | 2026-05-16T15:31:13 | , aka 'Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerabili | |
| CVE-2026-46333 | 0 | 0.03% | 16 | 4 | 2026-05-16T13:16:16.810000 | In the Linux kernel, the following vulnerability has been resolved: ptrace: sli | |
| CVE-2026-8657 | 8.2 | 0.05% | 4 | 0 | 2026-05-16T06:30:40 | Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype P | |
| CVE-2026-27886 | 7.5 | 0.11% | 2 | 0 | 2026-05-16T03:16:47.733000 | Strapi is an open source headless content management system. Strapi versions sta | |
| CVE-2026-45369 | 8.3 | 0.04% | 4 | 0 | 2026-05-16T01:16:17.233000 | python-utcp is the python implementation of UTCP. Prior to 1.1.3, the _substitut | |
| CVE-2026-35194 | 8.1 | 0.05% | 2 | 0 | 2026-05-16T00:32:14 | Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and | |
| CVE-2026-45672 | 8.8 | 0.06% | 2 | 1 | 2026-05-15T23:55:55 | ### Summary The `/api/v1/utils/code/execute` endpoint executes arbitrary Python | |
| CVE-2026-45398 | 7.5 | 0.04% | 4 | 0 | 2026-05-15T23:55:25 | # IDOR: Retrieval API Bypasses Knowledge Base Access Controls **Author:** Andre | |
| CVE-2026-45331 | 8.5 | 0.03% | 2 | 0 | 2026-05-15T23:53:50 | # SSRF Bypass via IPv6/IPv4-mapped IPv6/IPv4-reserved-ranges in `validate_url()` | |
| CVE-2026-44552 | 8.7 | 0.03% | 2 | 0 | 2026-05-15T23:52:30 | # Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Ena | |
| CVE-2026-44551 | 9.1 | 0.04% | 2 | 0 | 2026-05-15T23:52:14 | # LDAP Empty Password Authentication Bypass ## Affected Component LDAP authent | |
| CVE-2026-44714 | 7.5 | 0.03% | 2 | 0 | 2026-05-15T23:49:54 | ### Summary `ScriptExecution.correctlySpends()` contains two fast-path verificat | |
| CVE-2026-42155 | None | 0.04% | 2 | 0 | 2026-05-15T23:48:44 | Affected Version: OpenMage LTS ≤ 20.16.0 (confirmed on `20.16.0`) Affected File | |
| CVE-2026-41258 | 9.1 | 0.04% | 4 | 0 | 2026-05-15T23:48:39 | ### Impact The `ConceptReferenceRangeUtility.evaluateCriteria()` method in Open | |
| CVE-2026-44671 | 7.5 | 0.25% | 2 | 0 | 2026-05-15T23:47:19 | ## Summary A vulnerability was discovered in Zitadel's LDAP identity provider i | |
| CVE-2026-45370 | 7.7 | 0.03% | 2 | 0 | 2026-05-15T23:47:03 | ## Summary `_prepare_environment()` in `cli_communication_protocol.py` passes a | |
| CVE-2026-45375 | 9.0 | 0.04% | 2 | 0 | 2026-05-15T23:45:28 | ### Summary SiYuan's Bazaar (community marketplace) renders the `name` and `ver | |
| CVE-2026-44523 | 10.0 | 0.01% | 2 | 0 | 2026-05-15T23:45:08 | #### Summary No minimum length or entropy is enforced on the `JWT_SECRET` confi | |
| CVE-2026-45402 | 8.1 | 0.03% | 2 | 0 | 2026-05-15T23:16:21.470000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45010 | 9.1 | 0.12% | 4 | 0 | 2026-05-15T23:16:20.927000 | phpMyFAQ before 4.1.2 contains an improper restriction of excessive authenticati | |
| CVE-2026-45671 | 8.0 | 0.04% | 2 | 0 | 2026-05-15T22:16:56.327000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45665 | 8.1 | 0.03% | 2 | 0 | 2026-05-15T22:16:55.920000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45400 | 8.5 | 0.03% | 2 | 0 | 2026-05-15T22:16:55.820000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45303 | 7.7 | 0.03% | 2 | 0 | 2026-05-15T22:16:53.977000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45301 | 8.1 | 0.03% | 2 | 0 | 2026-05-15T22:16:53.837000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-44826 | 7.5 | 0.04% | 2 | 0 | 2026-05-15T22:16:53.610000 | Vvveb is a powerful and easy to use CMS with page builder to build websites, blo | |
| CVE-2026-46366 | 7.5 | 0.06% | 2 | 0 | 2026-05-15T21:31:45 | phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the ge | |
| CVE-2026-46367 | 7.6 | 0.01% | 2 | 0 | 2026-05-15T21:31:45 | phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Ut | |
| CVE-2026-46364 | 9.8 | 0.05% | 4 | 0 | 2026-05-15T21:31:44 | phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in | |
| CVE-2026-46359 | 7.5 | 0.03% | 2 | 0 | 2026-05-15T21:31:42 | phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::set | |
| CVE-2026-8696 | 7.5 | 0.23% | 2 | 0 | 2026-05-15T21:16:39.360000 | radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() fu | |
| CVE-2026-8558 | 8.8 | 0.08% | 2 | 0 | 2026-05-15T21:16:39.133000 | Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-45675 | 8.1 | 0.05% | 2 | 0 | 2026-05-15T21:16:38.647000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45401 | 8.5 | 0.03% | 2 | 0 | 2026-05-15T21:16:38.140000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-44555 | 7.6 | 0.04% | 2 | 0 | 2026-05-15T21:16:35.913000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-44553 | 8.1 | 0.03% | 2 | 0 | 2026-05-15T21:16:35.810000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-46408 | 7.6 | 0.03% | 2 | 0 | 2026-05-15T20:16:49.503000 | Vvveb is a powerful and easy to use CMS with page builder to build websites, blo | |
| CVE-2026-44554 | 8.1 | 0.04% | 2 | 0 | 2026-05-15T20:16:46.840000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-42897 | 8.1 | 12.34% | 33 | 1 | 2026-05-15T19:35:52.963000 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2026-41615 | 9.6 | 0.10% | 2 | 0 | 2026-05-15T18:39:39.933000 | Exposure of sensitive information to an unauthorized actor in Microsoft Authenti | |
| CVE-2026-34253 | 8.2 | 0.07% | 2 | 0 | 2026-05-15T18:31:42 | A buffer underflow vulnerability has been identified in the ogg123 utility from | |
| CVE-2026-8695 | 7.5 | 0.26% | 2 | 0 | 2026-05-15T18:16:26.160000 | radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() | |
| CVE-2026-44542 | 9.1 | 0.64% | 2 | 0 | 2026-05-15T18:09:04.607000 | FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3 | |
| CVE-2026-23998 | 7.5 | 0.02% | 2 | 0 | 2026-05-15T18:08:13.130000 | Fleet is open source device management software. Prior to version 4.81.0, a vuln | |
| CVE-2026-44717 | 9.8 | 0.25% | 4 | 0 | 2026-05-15T17:16:48.073000 | MCP Calculate Server is a mathematical calculation service based on MCP protocol | |
| CVE-2026-38728 | 7.5 | 0.10% | 2 | 0 | 2026-05-15T16:16:14.463000 | An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to c | |
| CVE-2026-8585 | 7.5 | 0.09% | 2 | 0 | 2026-05-15T15:31:47 | Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.777 | |
| CVE-2026-8634 | 9.1 | 0.12% | 2 | 0 | 2026-05-15T15:16:56.913000 | Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability | |
| CVE-2026-44673 | 7.5 | 0.05% | 2 | 0 | 2026-05-15T15:16:53.830000 | libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_s | |
| CVE-2026-2652 | 8.6 | 0.09% | 1 | 0 | 2026-05-15T14:56:18.253000 | A vulnerability in mlflow/mlflow versions 3.9.0 and earlier allows unauthenticat | |
| CVE-2026-8398 | 9.8 | 0.03% | 2 | 0 | 2026-05-15T14:56:18.253000 | A supply chain attack compromised the official installation packages of DAEMON T | |
| CVE-2026-44633 | 8.1 | 0.03% | 2 | 0 | 2026-05-15T14:44:49.877000 | Live Helper Chat is an open-source application that enables live support website | |
| CVE-2026-44592 | 9.4 | 0.02% | 2 | 0 | 2026-05-15T14:44:49.877000 | Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_D | |
| CVE-2026-44212 | 9.3 | 0.06% | 2 | 0 | 2026-05-15T14:30:03.170000 | PrestaShop is an open source e-commerce web application. Prior to 8.2.6 and 9.1. | |
| CVE-2026-41702 | 7.8 | 0.01% | 2 | 0 | 2026-05-15T14:11:57.190000 | VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that o | |
| CVE-2026-0481 | 0 | 0.20% | 1 | 0 | 2026-05-15T14:10:17.083000 | Unrestricted IP address binding in the AMD Device Metrics Exporter (ROCm ecosyst | |
| CVE-2026-4094 | 8.1 | 0.04% | 2 | 0 | 2026-05-15T14:09:15.910000 | The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is | |
| CVE-2026-6228 | 8.8 | 0.11% | 1 | 0 | 2026-05-15T14:09:15.910000 | The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege | |
| CVE-2026-41964 | 8.4 | 0.01% | 1 | 0 | 2026-05-15T12:30:37 | Permission control vulnerability in the web. Impact: Successful exploitation of | |
| CVE-2026-6403 | 7.5 | 0.27% | 1 | 0 | 2026-05-15T09:31:43 | The Quick Playground plugin for WordPress is vulnerable to Path Traversal in ver | |
| CVE-2026-5229 | 9.8 | 0.35% | 2 | 0 | 2026-05-15T09:31:43 | The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in v | |
| CVE-2026-28761 | 8.1 | 0.02% | 2 | 0 | 2026-05-15T06:30:40 | Cross-site request forgery vulnerability exists in Musetheque V4 Information Dis | |
| CVE-2026-8526 | 8.8 | 0.07% | 2 | 0 | 2026-05-15T00:31:37 | Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8575 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:37 | Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote a | |
| CVE-2026-8573 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:37 | Integer overflow in Codecs in Google Chrome on Windows prior to 148.0.7778.168 a | |
| CVE-2026-8569 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:37 | Out of bounds write in Codecs in Google Chrome on Mac prior to 148.0.7778.168 al | |
| CVE-2026-8513 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allo | |
| CVE-2026-8510 | 7.5 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 all | |
| CVE-2026-8519 | 8.8 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 al | |
| CVE-2026-8531 | 8.8 | 0.06% | 2 | 0 | 2026-05-15T00:31:36 | Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.16 | |
| CVE-2026-8530 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 al | |
| CVE-2026-8524 | 8.8 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed | |
| CVE-2026-8534 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.77 | |
| CVE-2026-8533 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed | |
| CVE-2026-8548 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8542 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:30:30 | Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allow | |
| CVE-2026-8515 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:30:29 | Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote | |
| CVE-2026-8574 | 8.3 | 0.07% | 2 | 0 | 2026-05-14T22:16:50.903000 | Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allow | |
| CVE-2026-8571 | 8.3 | 0.09% | 2 | 0 | 2026-05-14T22:16:50.597000 | Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148. | |
| CVE-2026-8527 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T22:16:46.997000 | Insufficient validation of untrusted input in Downloads in Google Chrome prior t | |
| CVE-2026-8525 | 8.3 | 0.06% | 2 | 0 | 2026-05-14T22:16:46.700000 | Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 al | |
| CVE-2026-8523 | 8.3 | 0.07% | 2 | 0 | 2026-05-14T22:16:46.400000 | Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote | |
| CVE-2026-8520 | 8.3 | 0.06% | 2 | 0 | 2026-05-14T22:16:46.260000 | Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attac | |
| CVE-2026-8514 | 8.3 | 0.07% | 2 | 0 | 2026-05-14T22:16:45.703000 | Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote | |
| CVE-2026-8512 | 8.3 | 0.07% | 2 | 0 | 2026-05-14T22:16:45.417000 | Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8581 | 8.8 | 0.13% | 2 | 0 | 2026-05-14T21:30:58 | Use after free in GPU in Google Chrome prior to 148.0.7778.168 allowed a remote | |
| CVE-2026-8577 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:58 | Integer overflow in Fonts in Google Chrome prior to 148.0.7778.168 allowed a rem | |
| CVE-2026-8629 | 8.1 | 0.02% | 2 | 0 | 2026-05-14T21:30:58 | Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allo | |
| CVE-2026-8587 | 8.8 | 0.02% | 2 | 0 | 2026-05-14T21:30:58 | Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 all | |
| CVE-2026-8557 | 7.5 | 0.07% | 2 | 0 | 2026-05-14T21:30:55 | Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed | |
| CVE-2026-8522 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:54 | Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allo | |
| CVE-2026-8521 | 7.5 | 0.03% | 2 | 0 | 2026-05-14T21:30:54 | Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8529 | 8.8 | 0.07% | 2 | 0 | 2026-05-14T21:30:54 | Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed | |
| CVE-2026-8540 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:54 | Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote a | |
| CVE-2026-8532 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:54 | Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remot | |
| CVE-2026-8549 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:54 | Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remot | |
| CVE-2026-8544 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:54 | Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remot | |
| CVE-2026-8551 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:54 | Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a r | |
| CVE-2026-8621 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:53 | Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that al | |
| CVE-2026-8511 | 9.6 | 0.07% | 3 | 0 | 2026-05-14T21:30:53 | Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote a | |
| CVE-2026-8517 | 8.8 | 0.07% | 2 | 0 | 2026-05-14T21:30:53 | Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.1 | |
| CVE-2026-44586 | 8.3 | 0.05% | 2 | 0 | 2026-05-14T21:22:56.313000 | SiYuan is an open-source personal knowledge management system. From 2.1.12 to be | |
| CVE-2026-8509 | 8.8 | 0.06% | 2 | 0 | 2026-05-14T21:19:23.923000 | Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8518 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:19:23.923000 | Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remot | |
| CVE-2026-8547 | 7.5 | 0.07% | 2 | 0 | 2026-05-14T21:19:23.923000 | Insufficient policy enforcement in Passwords in Google Chrome on Windows prior t | |
| CVE-2026-8555 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:19:23.923000 | Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowe | |
| CVE-2026-8580 | 9.6 | 0.07% | 3 | 0 | 2026-05-14T21:19:23.923000 | Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote | |
| CVE-2026-45338 | 7.7 | 0.03% | 2 | 0 | 2026-05-14T20:19:57 | ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in `_proce | |
| CVE-2026-45315 | 8.7 | 0.02% | 2 | 0 | 2026-05-14T20:18:01 | ## Summary | |
| CVE-2026-42945 | 8.1 | 0.15% | 21 | 21 | 2026-05-14T20:17:05.413000 | NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo | |
| CVE-2026-43284 | 7.8 | 0.01% | 3 | 25 | 2026-05-14T18:33:53 | In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: | |
| CVE-2026-20182 | 10.0 | 31.70% | 16 | 1 | 2026-05-14T18:33:03 | May 2026: This security advisory provides the details and fix information for a | |
| CVE-2026-6473 | 8.8 | 0.06% | 1 | 0 | 2026-05-14T15:32:05 | Integer wraparound in multiple PostgreSQL server features allows an unprivileged | |
| CVE-2026-8181 | 9.8 | 0.26% | 2 | 5 | 2026-05-14T14:28:41.283000 | The Burst Statistics – Privacy-Friendly WordPress Analytics (Google Analytics Al | |
| CVE-2026-43660 | 7.5 | 0.12% | 1 | 0 | 2026-05-13T21:33:06 | A validation issue was addressed with improved logic. This issue is fixed in iOS | |
| CVE-2026-28883 | 7.5 | 0.05% | 1 | 0 | 2026-05-13T21:33:04 | A use-after-free issue was addressed with improved memory management. This issue | |
| CVE-2026-40003 | 5.1 | 0.03% | 1 | 1 | 2026-05-13T19:19:26.713000 | ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory wri | |
| CVE-2026-0265 | 0 | 0.08% | 2 | 1 | 2026-05-13T18:17:47.830000 | An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en | |
| CVE-2026-45091 | 9.1 | 0.01% | 2 | 1 | 2026-05-13T16:24:39 | In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embe | |
| CVE-2026-40361 | 8.4 | 0.06% | 2 | 0 | 2026-05-13T15:34:52.573000 | Use after free in Microsoft Office Word allows an unauthorized attacker to execu | |
| CVE-2026-4798 | 7.5 | 0.06% | 1 | 0 | 2026-05-13T14:43:46.717000 | The Avada Builder plugin for WordPress is vulnerable to time-based SQL Injection | |
| CVE-2026-28993 | 5.5 | 0.01% | 2 | 0 | 2026-05-13T14:07:29.720000 | This issue was addressed by adding an additional prompt for user consent. This i | |
| CVE-2026-42898 | 9.9 | 0.08% | 1 | 0 | 2026-05-12T18:30:54 | Improper control of generation of code ('code injection') in Microsoft Dynamics | |
| CVE-2026-40369 | 7.8 | 0.02% | 4 | 1 | 2026-05-12T18:30:50 | Untrusted pointer dereference in Windows Kernel allows an authorized attacker to | |
| CVE-2026-8043 | 9.6 | 0.09% | 1 | 0 | 2026-05-12T15:31:49 | External control of a file name in Ivanti Xtraction before version 2026.2 allows | |
| CVE-2026-31431 | 7.8 | 2.57% | 1 | 100 | 2026-05-12T15:31:18 | In the Linux kernel, the following vulnerability has been resolved: crypto: alg | |
| CVE-2026-7411 | 10.0 | 0.13% | 1 | 1 | 2026-05-11T16:22:43 | In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequat | |
| CVE-2026-44570 | 8.3 | 0.04% | 2 | 0 | 2026-05-11T14:25:50 | ### Summary Authorization controls surrounding the memories API were inconsiste | |
| CVE-2026-44565 | 8.1 | 0.06% | 2 | 0 | 2026-05-11T14:03:27 | ** CONFIDENTIAL ** Vulnerability Disclosure Analysis Documentation ------------ | |
| CVE-2026-7412 | 8.6 | 0.03% | 1 | 0 | 2026-05-06T16:16:12.510000 | In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, the Opera | |
| CVE-2026-41940 | 9.8 | 78.29% | 1 | 67 | template | 2026-05-04T18:31:33 | cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0 |
| CVE-2026-4289 | 7.3 | 0.04% | 2 | 1 | 2026-04-29T01:00:01.613000 | A security vulnerability has been detected in Tiandy Easy7 Integrated Management | |
| CVE-2026-40478 | 9.0 | 0.05% | 2 | 1 | 2026-04-24T20:53:27 | ### Impact A security bypass vulnerability exists in the expression execution me | |
| CVE-2026-34197 | 8.8 | 75.81% | 2 | 10 | template | 2026-04-16T21:49:17 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti |
| CVE-2026-32201 | 6.5 | 8.71% | 1 | 1 | 2026-04-14T18:30:55 | Improper input validation in Microsoft Office SharePoint allows an unauthorized | |
| CVE-2026-24154 | 7.6 | 0.03% | 2 | 0 | 2026-04-03T19:04:33.083000 | NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker | |
| CVE-2018-4063 | 8.8 | 1.88% | 2 | 0 | 2025-12-15T15:18:49.987000 | An exploitable remote code execution vulnerability exists in the upload.cgi func | |
| CVE-2023-22518 | 9.8 | 94.38% | 2 | 9 | template | 2025-10-24T13:38:59.063000 | All versions of Confluence Data Center and Server are affected by this unexploit |
| CVE-2017-9841 | 9.8 | 94.21% | 2 | 17 | template | 2025-10-22T17:32:08 | Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as we |
| CVE-2025-6793 | 9.4 | 87.03% | 2 | 0 | 2025-07-07T15:30:41 | Marvell QConvergeConsole QLogicDownloadImpl Directory Traversal Arbitrary File D | |
| CVE-2024-48760 | 9.8 | 66.58% | 2 | 0 | 2025-01-23T18:32:22 | An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code v | |
| CVE-2023-30253 | 8.8 | 90.43% | 2 | 8 | 2025-01-14T17:15:11.487000 | Dolibarr before 17.0.1 allows remote code execution by an authenticated user via | |
| CVE-2024-49767 | 7.5 | 1.09% | 2 | 0 | 2025-01-03T12:15:26.257000 | Werkzeug is a Web Server Gateway Interface web application library. Applications | |
| CVE-2022-21894 | 4.4 | 42.69% | 2 | 6 | 2024-11-21T06:45:39.280000 | Secure Boot Security Feature Bypass Vulnerability | |
| CVE-2023-24932 | 6.7 | 0.58% | 2 | 4 | 2024-08-01T15:32:23 | Secure Boot Security Feature Bypass Vulnerability | |
| CVE-2026-43908 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-43907 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-43906 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-43905 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-43904 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-43903 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-43909 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-46300 | 0 | 0.00% | 5 | 5 | N/A | ||
| CVE-2026-46407 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-8686 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-44699 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-45035 | 0 | 0.05% | 2 | 0 | N/A | ||
| CVE-2026-4782 | 0 | 0.04% | 1 | 0 | N/A |
updated 2026-05-17T18:31:33
3 posts
13 repos
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
https://github.com/vorkampfer/dirty_frag_mitigation
https://github.com/liamromanis101/DirtyFrag-Detector
https://github.com/krisiasty/vcheck
https://github.com/0xlane/pagecache-guard
https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
https://github.com/XRSecCD/202605_dirty_frag
https://github.com/linnemanlabs/dirtyfrag-arm64
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/metalx1993/dirtyfrag-patches
#DirtyFrag #vulnerability: Universal Linux LPE
Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.
##To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
##Ist die Aufregung um die neuen Linux-Fehler berechtigt?
Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:
CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").
Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).
Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher
#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen
##updated 2026-05-17T09:30:29
2 posts
🔒 MEDIUM severity: Sanluan PublicCMS 5.202506.d suffers from a hard-coded cryptographic key (CVE-2026-8739), enabling remote exploitation. No patch yet — restrict access, monitor for updates. Exploit code public. https://radar.offseq.com/threat/cve-2026-8739-use-of-hard-coded-cryptographic-key--58e8ec15 #OffSeq #Vuln #PublicCMS
##🔒 MEDIUM severity: Sanluan PublicCMS 5.202506.d suffers from a hard-coded cryptographic key (CVE-2026-8739), enabling remote exploitation. No patch yet — restrict access, monitor for updates. Exploit code public. https://radar.offseq.com/threat/cve-2026-8739-use-of-hard-coded-cryptographic-key--58e8ec15 #OffSeq #Vuln #PublicCMS
##updated 2026-05-17T09:30:23
2 posts
🔎 MEDIUM severity: CVE-2026-8737 affects Sanluan PublicCMS 5.202506.d — missing authentication in Trade Address Query Handler. Public exploit is out. Restrict access & monitor for abuse. https://radar.offseq.com/threat/cve-2026-8737-missing-authentication-in-sanluan-pu-b0beddb1 #OffSeq #Sanluan #Vulnerability #InfoSec
##🔎 MEDIUM severity: CVE-2026-8737 affects Sanluan PublicCMS 5.202506.d — missing authentication in Trade Address Query Handler. Public exploit is out. Restrict access & monitor for abuse. https://radar.offseq.com/threat/cve-2026-8737-missing-authentication-in-sanluan-pu-b0beddb1 #OffSeq #Sanluan #Vulnerability #InfoSec
##updated 2026-05-17T06:30:32
4 posts
⚠️ CVE-2026-8719 (HIGH, CVSS 8.8): AI Engine for WordPress v3.4.9 lets any OAuth token holder with Subscriber+ escalate to admin via MCP tools. Restrict OAuth, monitor for fixes. https://radar.offseq.com/threat/cve-2026-8719-cwe-269-improper-privilege-managemen-4682432a #OffSeq #WordPress #Vuln #PrivilegeEscalation
##🟠 CVE-2026-8719 - High (8.8)
The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-8719 (HIGH, CVSS 8.8): AI Engine for WordPress v3.4.9 lets any OAuth token holder with Subscriber+ escalate to admin via MCP tools. Restrict OAuth, monitor for fixes. https://radar.offseq.com/threat/cve-2026-8719-cwe-269-improper-privilege-managemen-4682432a #OffSeq #WordPress #Vuln #PrivilegeEscalation
##🟠 CVE-2026-8719 - High (8.8)
The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-17T06:30:32
2 posts
MEDIUM severity: CVE-2026-8733 in Investintech SlimPDFReader v2.0.0 – 2.0.13 allows stack-based buffer overflow. Product is discontinued, no patch available. Public exploit code is out, but not actively exploited. Migrate now. https://radar.offseq.com/threat/cve-2026-8733-stack-based-buffer-overflow-in-inves-b008f4aa #OffSeq #Vulnerability #PDF
##MEDIUM severity: CVE-2026-8733 in Investintech SlimPDFReader v2.0.0 – 2.0.13 allows stack-based buffer overflow. Product is discontinued, no patch available. Public exploit code is out, but not actively exploited. Migrate now. https://radar.offseq.com/threat/cve-2026-8733-stack-based-buffer-overflow-in-inves-b008f4aa #OffSeq #Vulnerability #PDF
##updated 2026-05-17T03:30:25
2 posts
MEDIUM severity: CVE-2026-8724 in Dataease 2.10.20 allows SQL injection via SqlparserUtils.transFilter. Exploit requires high-priv user. No patch yet — restrict access & monitor for suspicious queries. More: https://radar.offseq.com/threat/cve-2026-8724-sql-injection-in-dataease-6c315564 #OffSeq #SQLInjection #InfoSec
##MEDIUM severity: CVE-2026-8724 in Dataease 2.10.20 allows SQL injection via SqlparserUtils.transFilter. Exploit requires high-priv user. No patch yet — restrict access & monitor for suspicious queries. More: https://radar.offseq.com/threat/cve-2026-8724-sql-injection-in-dataease-6c315564 #OffSeq #SQLInjection #InfoSec
##updated 2026-05-17T02:16:45.487000
2 posts
🛡️ CVE-2026-8725: SSRF in CoreWorxLab CAAL v1.0 – 1.6.0 (MEDIUM). Remote, unauthenticated attackers can trigger server requests. No patch; restrict outbound traffic & monitor logs. Exploit is public. https://radar.offseq.com/threat/cve-2026-8725-server-side-request-forgery-in-corew-ac445f41 #OffSeq #SSRF #Vuln #BlueTeam
##🛡️ CVE-2026-8725: SSRF in CoreWorxLab CAAL v1.0 – 1.6.0 (MEDIUM). Remote, unauthenticated attackers can trigger server requests. No patch; restrict outbound traffic & monitor logs. Exploit is public. https://radar.offseq.com/threat/cve-2026-8725-server-side-request-forgery-in-corew-ac445f41 #OffSeq #SSRF #Vuln #BlueTeam
##updated 2026-05-17T00:31:39
4 posts
🔒 CVE-2026-46728 (HIGH, CVSS 8.2) in denx U-Boot <2026.04 lets local privileged attackers bypass FIT signature checks due to hashed-nodes omission. Restrict local access & watch for patches. https://radar.offseq.com/threat/cve-2026-46728-cwe-346-origin-validation-error-in--fd4fda20 #OffSeq #Uboot #Infosec #Firmware
##🟠 CVE-2026-46728 - High (8.2)
Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔒 CVE-2026-46728 (HIGH, CVSS 8.2) in denx U-Boot <2026.04 lets local privileged attackers bypass FIT signature checks due to hashed-nodes omission. Restrict local access & watch for patches. https://radar.offseq.com/threat/cve-2026-46728-cwe-346-origin-validation-error-in--fd4fda20 #OffSeq #Uboot #Infosec #Firmware
##🟠 CVE-2026-46728 - High (8.2)
Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-16T15:31:13
2 posts
2 repos
Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft
##Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft
##updated 2026-05-16T13:16:16.810000
16 posts
4 repos
https://github.com/0xBlackash/CVE-2026-46333
https://github.com/studiogangster/CVE-2026-46333
#Ubuntu still doesn't have a patch or even a security notice for #sshkeysignpwn ...
How is this everyone else has been patched for days!
#Debian had a fix Friday morning...#DomumSocial is running on Debian, but in my day job I'm stuck with Ubuntu.
If you're also stuck with Ubuntu there is a mitigation:
`sudo sysctl -w kernel.yama.ptrace_scope=3`
I've tested this against the know exploit code at https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
This will disable the vulnerable ptrace call until the next reboot
Seeking confirmation of my theory I was able to find:
https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/
you can also set "yama.ptrace_scope" to "2" which will only allow root to use ptrace (and will also allow resetting it w/o reboot). The link above has more explanations and directions for setting it persistently across reboot for now.
This will break `strace` and `gdb`!
##🚨 CVE-2026-46333 (ssh-keysign-pwn)
In the Linux kernel, the following vulnerability has been resolved:
ptrace: slightly saner 'get_dumpable()' logic
The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.
And almost all users do in fact use it only for the case where the task
has a mm pointer.
But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).
It's not what this flag was designed for, but it is what it is.
The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.
Make it all make a bit more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-46333
#nttdata #zen #secdb #infosec
#sshkeysignpwn #cve202646333 #linux #kernel
To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
##Linux Kernel Race Condition 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords
A six-year-old Linux kernel race condition (CVE-2026-46333) allows local attackers to steal SSH private keys and password hashes by hijacking file descriptors during process termination. The flaw affects major distributions including Ubuntu and Debian, and a public exploit is available.
**Apply the latest Linux kernel patches ASAP to all affected systems (Ubuntu 22.04/24.04/26.04, Debian 13, Arch, CentOS 9, Raspberry Pi OS, CloudLinux 8/9/10), and rotate all SSH host keys on systems that allowed shell access to untrusted users. Until patched, restrict local shell access to trusted users only and monitor for suspicious use of pidfd_getfd or SUID binaries like ssh-keysign and chage.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/linux-kernel-race-condition-ssh-keysign-pwn-exposes-ssh-keys-and-shadow-passwords-l-d-6-1-e/gD2P6Ple2L
New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)
- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207
These have been backported all the way down to Alpine Linux 3.16.
Edit: These versions fix ssh-keysign-pwn, not Fragnesia
##Kernel-Updates am Morgen vertreiben Kummer und Sorgen. 😇
##If you are changing sysctl kernel.yama.ptrace_scope because of the ssh-keygen-pwn exploit https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/ on fedora/rhel, be aware that your sysctl will be competing with /usr/lib/sysctl.d/10-default-yama-scope.conf so better change it in that file.
###Debian has released kernel update that fixes the CVE-2026-46333 (ssh-keysign-pwn) vulnerability.
Debian stable (trixie) kernel update: https://lists.debian.org/debian-security-announce/2026/msg00185.html
Debian oldstable (bookworm) kernel update: https://lists.debian.org/debian-security-announce/2026/msg00186.html
##Seven new stable kernels with patches for CVE-2026-46333
##🚨 CVE-2026-46333 (ssh-keysign-pwn)
In the Linux kernel, the following vulnerability has been resolved:
ptrace: slightly saner 'get_dumpable()' logic
The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.
And almost all users do in fact use it only for the case where the task
has a mm pointer.
But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).
It's not what this flag was designed for, but it is what it is.
The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.
Make it all make a bit more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-46333
#nttdata #zen #secdb #infosec
#sshkeysignpwn #cve202646333 #linux #kernel
Linux Kernel Race Condition 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords
A six-year-old Linux kernel race condition (CVE-2026-46333) allows local attackers to steal SSH private keys and password hashes by hijacking file descriptors during process termination. The flaw affects major distributions including Ubuntu and Debian, and a public exploit is available.
**Apply the latest Linux kernel patches ASAP to all affected systems (Ubuntu 22.04/24.04/26.04, Debian 13, Arch, CentOS 9, Raspberry Pi OS, CloudLinux 8/9/10), and rotate all SSH host keys on systems that allowed shell access to untrusted users. Until patched, restrict local shell access to trusted users only and monitor for suspicious use of pidfd_getfd or SUID binaries like ssh-keysign and chage.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/linux-kernel-race-condition-ssh-keysign-pwn-exposes-ssh-keys-and-shadow-passwords-l-d-6-1-e/gD2P6Ple2L
New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)
- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207
These have been backported all the way down to Alpine Linux 3.16.
Edit: These versions fix ssh-keysign-pwn, not Fragnesia
##If you are changing sysctl kernel.yama.ptrace_scope because of the ssh-keygen-pwn exploit https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/ on fedora/rhel, be aware that your sysctl will be competing with /usr/lib/sysctl.d/10-default-yama-scope.conf so better change it in that file.
###Debian has released kernel update that fixes the CVE-2026-46333 (ssh-keysign-pwn) vulnerability.
Debian stable (trixie) kernel update: https://lists.debian.org/debian-security-announce/2026/msg00185.html
Debian oldstable (bookworm) kernel update: https://lists.debian.org/debian-security-announce/2026/msg00186.html
##Seven new stable kernels with patches for CVE-2026-46333
##Local file exposure #vulnerability in linux kernels (CVE-2026-46333):
https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
Apparently this issue was already identified in 2020 but wasn't fixed back then.
Mitigation:
- runtime:
sudo sysctl -w kernel.yama.ptrace_scope=2
- To make the mitigation persistent:
echo "kernel.yama.ptrace_scope=2" | sudo tee /etc/sysctl.d/01-harden-ptrace.conf
WARNING: This mitigation may break existing functionality. Test before deploying.
WARNING 2: While this mitigation does block the currently existing PoC, it may not prevent other attack vectors exploiting this vulnerability.
##updated 2026-05-16T06:30:40
4 posts
⚠️ HIGH severity: CVE-2026-8657 in jsondiffpatch <0.7.6 enables remote prototype pollution via patch APIs. Patch status unconfirmed — avoid untrusted input & monitor vendor updates. Details: https://radar.offseq.com/threat/cve-2026-8657-prototype-pollution-in-jsondiffpatch-73cb7b51 #OffSeq #infosec #NodeJS #vuln
##🟠 CVE-2026-8657 - High (8.2)
Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or J...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8657/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: CVE-2026-8657 in jsondiffpatch <0.7.6 enables remote prototype pollution via patch APIs. Patch status unconfirmed — avoid untrusted input & monitor vendor updates. Details: https://radar.offseq.com/threat/cve-2026-8657-prototype-pollution-in-jsondiffpatch-73cb7b51 #OffSeq #infosec #NodeJS #vuln
##🟠 CVE-2026-8657 - High (8.2)
Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or J...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8657/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-16T03:16:47.733000
2 posts
🟠 CVE-2026-27886 - High (7.5)
Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27886 - High (7.5)
Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-16T01:16:17.233000
4 posts
🟠 CVE-2026-45370 - High (7.7)
python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45370/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45369 - High (8.3)
python-utcp is the python implementation of UTCP. Prior to 1.1.3, the _substitute_utcp_args method in cli_communication_protocol.py inserts user-controlled tool_args values directly into shell command strings without any sanitization or escaping. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45370 - High (7.7)
python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45370/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45369 - High (8.3)
python-utcp is the python implementation of UTCP. Prior to 1.1.3, the _substitute_utcp_args method in cli_communication_protocol.py inserts user-controlled tool_args values directly into shell command strings without any sanitization or escaping. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45369/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-16T00:32:14
2 posts
🟠 CVE-2026-35194 - High (8.1)
Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulner...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35194/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35194 - High (8.1)
Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulner...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35194/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:55:55
2 posts
1 repos
🟠 CVE-2026-45672 - High (8.8)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45672/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45672 - High (8.8)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45672/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:55:25
4 posts
🟠 CVE-2026-45398 - High (7.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45398/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Tenable Research Advisories listed these two items yesterday.
- Microsoft Foundry Toolkit for VS Code: Command Injection via Python Interpreter Path Leading to Arbitrary Code Execution https://www.tenable.com/security/research/tra-2026-40 #Linux #macOS #Microsoft #Python
- CVE-2026-45398 - IDOR: Retrieval API Bypasses Knowledge Base Access Controls https://www.tenable.com/security/research/tra-2026-39 @tenable #infosec #vulnerability #threatresearch
##🟠 CVE-2026-45398 - High (7.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45398/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Tenable Research Advisories listed these two items yesterday.
- Microsoft Foundry Toolkit for VS Code: Command Injection via Python Interpreter Path Leading to Arbitrary Code Execution https://www.tenable.com/security/research/tra-2026-40 #Linux #macOS #Microsoft #Python
- CVE-2026-45398 - IDOR: Retrieval API Bypasses Knowledge Base Access Controls https://www.tenable.com/security/research/tra-2026-39 @tenable #infosec #vulnerability #threatresearch
##updated 2026-05-15T23:53:50
2 posts
🟠 CVE-2026-45331 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45331 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:52:30
2 posts
🟠 CVE-2026-44552 - High (8.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis da...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44552 - High (8.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis da...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:52:14
2 posts
🔴 CVE-2026-44551 - Critical (9.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44551 - Critical (9.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:49:54
2 posts
🟠 CVE-2026-44714 - High (7.5)
The bitcoinj library is a Java implementation of the Bitcoin protocol. Prior to 0.17.1, ScriptExecution.correctlySpends() contains two fast-path verification bugs for standard P2PKH and native P2WPKH spends in core/src/main/java/org/bitcoinj/scrip...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44714 - High (7.5)
The bitcoinj library is a Java implementation of the Bitcoin protocol. Prior to 0.17.1, ScriptExecution.correctlySpends() contains two fast-path verification bugs for standard P2PKH and native P2WPKH spends in core/src/main/java/org/bitcoinj/scrip...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:48:44
2 posts
🚨 CRITICAL: CVE-2026-42155 in OpenMage magento-lts (<20.18.0). Insecure, time-based session ID generation enables API session hijacking via brute-force attacks. Upgrade to 20.18.0+ ASAP! https://radar.offseq.com/threat/cve-2026-42155-cwe-330-use-of-insufficiently-rando-1baedc02 #OffSeq #Magento #Vuln #APIsecurity
##🚨 CRITICAL: CVE-2026-42155 in OpenMage magento-lts (<20.18.0). Insecure, time-based session ID generation enables API session hijacking via brute-force attacks. Upgrade to 20.18.0+ ASAP! https://radar.offseq.com/threat/cve-2026-42155-cwe-330-use-of-insufficiently-rando-1baedc02 #OffSeq #Magento #Vuln #APIsecurity
##updated 2026-05-15T23:48:39
4 posts
🚨 CRITICAL: CVE-2026-41258 impacts OpenMRS Core 2.7.0-2.7.8 & 2.8.0-2.8.5. Privileged users can inject Java via Velocity templates, risking full system compromise. Patch to 2.7.9/2.8.6 now. Details: https://radar.offseq.com/threat/cve-2026-41258-cwe-94-improper-control-of-generati-7a28d9cd #OffSeq #OpenMRS #vuln #healthcare
##🔴 CVE-2026-41258 - Critical (9.1)
OpenMRS is an open source electronic medical record system platform. From 2.7.0 to before 2.7.9 and 2.8.6, the ConceptReferenceRangeUtility.evaluateCriteria() method in OpenMRS Core evaluates database-stored criteria strings as Apache Velocity tem...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41258/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-41258 impacts OpenMRS Core 2.7.0-2.7.8 & 2.8.0-2.8.5. Privileged users can inject Java via Velocity templates, risking full system compromise. Patch to 2.7.9/2.8.6 now. Details: https://radar.offseq.com/threat/cve-2026-41258-cwe-94-improper-control-of-generati-7a28d9cd #OffSeq #OpenMRS #vuln #healthcare
##🔴 CVE-2026-41258 - Critical (9.1)
OpenMRS is an open source electronic medical record system platform. From 2.7.0 to before 2.7.9 and 2.8.6, the ConceptReferenceRangeUtility.evaluateCriteria() method in OpenMRS Core evaluates database-stored criteria strings as Apache Velocity tem...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41258/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:47:19
2 posts
🟠 CVE-2026-44671 - High (7.5)
ZITADEL is an open source identity management platform. From 2.71.11 to before 3.4.10 and 4.15.0, a vulnerability was discovered in Zitadel's LDAP identity provider implementation, which fails to properly escape user-provided usernames before inco...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44671/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44671 - High (7.5)
ZITADEL is an open source identity management platform. From 2.71.11 to before 3.4.10 and 4.15.0, a vulnerability was discovered in Zitadel's LDAP identity provider implementation, which fails to properly escape user-provided usernames before inco...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44671/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:47:03
2 posts
🟠 CVE-2026-45370 - High (7.7)
python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45370/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45370 - High (7.7)
python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45370/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:45:28
2 posts
🔴 CVE-2026-45375 - Critical (9)
SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / ic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45375/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-45375 - Critical (9)
SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / ic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45375/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:45:08
2 posts
🔴 CVE-2026-44523 - Critical (10)
Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as shor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44523 - Critical (10)
Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as shor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:16:21.470000
2 posts
🟠 CVE-2026-45402 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45402/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45402 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45402/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:16:20.927000
4 posts
🔴 CVE-2026-45010 - Critical (9.1)
phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45010/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-45010 (CRITICAL): phpMyFAQ <4.1.2 lets unauthenticated attackers brute-force TOTP codes at /admin/check — no rate limiting or session binding. Full admin access risk. Restrict endpoint & monitor now! https://radar.offseq.com/threat/cve-2026-45010-improper-restriction-of-excessive-a-d0ea2259 #OffSeq #infosec #phpMyFAQ #CVE
##🔴 CVE-2026-45010 - Critical (9.1)
phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45010/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-45010 (CRITICAL): phpMyFAQ <4.1.2 lets unauthenticated attackers brute-force TOTP codes at /admin/check — no rate limiting or session binding. Full admin access risk. Restrict endpoint & monitor now! https://radar.offseq.com/threat/cve-2026-45010-improper-restriction-of-excessive-a-d0ea2259 #OffSeq #infosec #phpMyFAQ #CVE
##updated 2026-05-15T22:16:56.327000
2 posts
🟠 CVE-2026-45671 - High (8)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is refer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45671/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45671 - High (8)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is refer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45671/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T22:16:55.920000
2 posts
🟠 CVE-2026-45665 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45665 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T22:16:55.820000
2 posts
🟠 CVE-2026-45400 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45400/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45400 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45400/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T22:16:53.977000
2 posts
🟠 CVE-2026-45303 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML conten...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45303/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45303 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML conten...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45303/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T22:16:53.837000
2 posts
🟠 CVE-2026-45301 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45301 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T22:16:53.610000
2 posts
🟠 CVE-2026-44826 - High (7.5)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44826/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44826 - High (7.5)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44826/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:31:45
2 posts
🟠 CVE-2026-46366 - High (7.5)
phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46366 - High (7.5)
phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:31:45
2 posts
🟠 CVE-2026-46367 - High (7.6)
phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event han...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46367 - High (7.6)
phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event han...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:31:44
4 posts
🔴 CVE-2026-46364 - Critical (9.8)
phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46364/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-46364 in phpMyFAQ <4.1.2 allows unauthenticated SQL injection via /api/captcha. Attackers can exfiltrate user creds, admin tokens, and SMTP info. Restrict endpoint & use WAF until patch is confirmed. https://radar.offseq.com/threat/cve-2026-46364-improper-neutralization-of-special--9adafcbf #OffSeq #SQLInjection #Infosec
##🔴 CVE-2026-46364 - Critical (9.8)
phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46364/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-46364 in phpMyFAQ <4.1.2 allows unauthenticated SQL injection via /api/captcha. Attackers can exfiltrate user creds, admin tokens, and SMTP info. Restrict endpoint & use WAF until patch is confirmed. https://radar.offseq.com/threat/cve-2026-46364-improper-neutralization-of-special--9adafcbf #OffSeq #SQLInjection #Infosec
##updated 2026-05-15T21:31:42
2 posts
🟠 CVE-2026-46359 - High (7.5)
phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46359 - High (7.5)
phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:16:39.360000
2 posts
🟠 CVE-2026-8696 - High (7.5)
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread informati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8696/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8696 - High (7.5)
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread informati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8696/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:16:39.133000
2 posts
🟠 CVE-2026-8558 - High (8.8)
Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8558/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8558 - High (8.8)
Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8558/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:16:38.647000
2 posts
🟠 CVE-2026-45675 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45675/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45675 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45675/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:16:38.140000
2 posts
🟠 CVE-2026-45401 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45401/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45401 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45401/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:16:35.913000
2 posts
🟠 CVE-2026-44555 - High (7.6)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing ba...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44555/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44555 - High (7.6)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing ba...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44555/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:16:35.810000
2 posts
🟠 CVE-2026-44553 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44553/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44553 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44553/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T20:16:49.503000
2 posts
🟠 CVE-2026-46408 - High (7.6)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownershi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46408/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46408 - High (7.6)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownershi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46408/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T20:16:46.840000
2 posts
🟠 CVE-2026-44554 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44554/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44554 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44554/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T19:35:52.963000
33 posts
1 repos
🟠 CVE-2026-42897 - High (8.1)
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.
##**Global Briefing: May 17, 2026**
Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.
Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.
Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.
##Microsoft Exchange Server Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
##Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).
##Microsoft has released mitigations for a high-severity Microsoft Exchange Server vulnerability that is being actively exploited in attacks.
The flaw enables threat actors to execute arbitrary code through a cross-site scripting (XSS) attack targeting Outlook on the web users.
Tracked as CVE-2026-42897, the vulnerability affects Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE).
##CVE-2026-42897 exploits improper HTML sanitization in OWA, allowing JavaScript execution within the email rendering context. The script inherits authentication tokens, accesses the full DOM, and can read emails, harvest...
##CVE-2026-42897: CISA warnt vor aktiv ausgenutzter XSS-Lücke in Microsoft Exchange Server
##🟠 New security advisory:
CVE-2026-42897 affects Microsoft Exchange Server.
• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-42897-exchange-server-spoofing-via-xss
🚨 [CISA-2026:0515] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0515)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-42897 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- Name: Microsoft Exchange Server Cross-Site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Microsoft
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-42897 ; https://learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-emergency-mitigation-service ; https://nvd.nist.gov/vuln/detail/CVE-2026-42897
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260515 #cisa20260515 #cve_2026_42897 #cve202642897
##📰 Microsoft Exchange Zero-Day Under Active Attack, Mitigations Deployed Automatically
📢 Microsoft confirms a new Exchange Server zero-day (CVE-2026-42897) is actively exploited! The XSS flaw in OWA affects on-prem servers. Mitigations are being deployed automatically via the EM service. Check your systems! 🛡️ #Exchange #Zeroday
🌐 cyber[.]netsecops[.]io
##CVE ID: CVE-2026-42897
Vendor: Microsoft
Product: Microsoft
Date Added: 2026-05-15
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-42897
High critical cross-site scripting (CSS) vuln in Microsoft Exchange Server 2016 being used in the wild
##CISA has updated the KEV catalogue.
- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-42897 #Microsoft #CISA #zeroday #infosec #vulnerability
##Microsoft Warns of Actively Exploited Zero-Day in Exchange Server OWA
Microsoft is warning of an actively exploited spoofing vulnerability (CVE-2026-42897) in on-premises Exchange Server that allows attackers to execute arbitrary JavaScript via Outlook Web Access XSS.
**If you run on-premises Microsoft Exchange Server (2016, 2019, or Subscription Edition), make sure the Exchange Emergency Mitigation Service (EEMS) is enabled so the M2.1.x mitigation for CVE-2026-42897 is active, or run the Exchange on-premises Mitigation Tool manually if your network is air-gapped. Keep the mitigation on even if it breaks OWA Print Calendar or inline images, and check if you can apply the permanent patch once Microsoft releases it.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/microsoft-warns-of-actively-exploited-zero-day-in-exchange-server-owa-5-p-7-i-w/gD2P6Ple2L
Exchange Server – CVE-2026-42897 : cette faille zero-day est déjà exploitée ! https://www.it-connect.fr/exchange-server-cve-2026-42897-cette-faille-zero-day-est-deja-exploitee/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Exchange
##Microsoft posted this new vulnerability yesterday, if you missed it:
Microsoft Exchange Server Spoofing Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
More:
The Hacker News: On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email https://thehackernews.com/2026/05/on-prem-microsoft-exchange-server-cve.html @thehackernews #Microsoft #infosec #vulnerability #zeroday
##Addressing Exchange Server May 2026 vulnerability CVE-2026-42897
#CVE_2026_42897
https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498
🟠 CVE-2026-42897 - High (8.1)
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.
##**Global Briefing: May 17, 2026**
Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.
Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.
Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.
##Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).
##🚨 [CISA-2026:0515] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0515)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-42897 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- Name: Microsoft Exchange Server Cross-Site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Microsoft
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-42897 ; https://learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-emergency-mitigation-service ; https://nvd.nist.gov/vuln/detail/CVE-2026-42897
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260515 #cisa20260515 #cve_2026_42897 #cve202642897
##CVE ID: CVE-2026-42897
Vendor: Microsoft
Product: Microsoft
Date Added: 2026-05-15
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-42897
High critical cross-site scripting (CSS) vuln in Microsoft Exchange Server 2016 being used in the wild
##CISA has updated the KEV catalogue.
- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-42897 #Microsoft #CISA #zeroday #infosec #vulnerability
##Microsoft Warns of Actively Exploited Zero-Day in Exchange Server OWA
Microsoft is warning of an actively exploited spoofing vulnerability (CVE-2026-42897) in on-premises Exchange Server that allows attackers to execute arbitrary JavaScript via Outlook Web Access XSS.
**If you run on-premises Microsoft Exchange Server (2016, 2019, or Subscription Edition), make sure the Exchange Emergency Mitigation Service (EEMS) is enabled so the M2.1.x mitigation for CVE-2026-42897 is active, or run the Exchange on-premises Mitigation Tool manually if your network is air-gapped. Keep the mitigation on even if it breaks OWA Print Calendar or inline images, and check if you can apply the permanent patch once Microsoft releases it.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/microsoft-warns-of-actively-exploited-zero-day-in-exchange-server-owa-5-p-7-i-w/gD2P6Ple2L
Exchange Server – CVE-2026-42897 : cette faille zero-day est déjà exploitée ! https://www.it-connect.fr/exchange-server-cve-2026-42897-cette-faille-zero-day-est-deja-exploitee/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Exchange
##Microsoft posted this new vulnerability yesterday, if you missed it:
Microsoft Exchange Server Spoofing Vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
More:
The Hacker News: On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email https://thehackernews.com/2026/05/on-prem-microsoft-exchange-server-cve.html @thehackernews #Microsoft #infosec #vulnerability #zeroday
##Addressing Exchange Server May 2026 vulnerability CVE-2026-42897
#CVE_2026_42897
https://techcommunity.microsoft.com/blog/exchange/addressing-exchange-server-may-2026-vulnerability-cve-2026-42897/4518498
Microsoft describes this security flaw (CVE-2026-42897) as a spoofing vulnerability affecting up-to-date Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE) software. https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attacks/
##⚠️Alerte CERT-FR⚠️
La vulnérabilité CVE-2026-42897 affecte Microsoft Exchange et permet une injection de code indirecte à distance (XSS) ainsi qu'un contournement de la politique de sécurité.
Elle est activement exploitée.
##updated 2026-05-15T18:39:39.933000
2 posts
🔴 CVE-2026-41615 - Critical (9.6)
Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41615 - Critical (9.6)
Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T18:31:42
2 posts
🟠 CVE-2026-34253 - High (8.2)
A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, lea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34253/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34253 - High (8.2)
A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, lea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34253/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T18:16:26.160000
2 posts
🟠 CVE-2026-8695 - High (7.5)
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8695/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8695 - High (7.5)
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8695/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T18:09:04.607000
2 posts
🔴 CVE-2026-44542 - Critical (9.1)
FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44542 - Critical (9.1)
FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T18:08:13.130000
2 posts
🟠 CVE-2026-23998 - High (7.5)
Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23998 - High (7.5)
Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T17:16:48.073000
4 posts
🛡️ CRITICAL RCE: CVE-2026-44717 impacts 611711Dark mcp_calculate_server <0.1.1. Unsanitized eval() use enables remote code execution. Upgrade to 0.1.1 immediately to mitigate. Details: https://radar.offseq.com/threat/cve-2026-44717-cwe-94-improper-control-of-generati-2fa37fa7 #OffSeq #CVE #infosec #security
##🔴 CVE-2026-44717 - Critical (9.8)
MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🛡️ CRITICAL RCE: CVE-2026-44717 impacts 611711Dark mcp_calculate_server <0.1.1. Unsanitized eval() use enables remote code execution. Upgrade to 0.1.1 immediately to mitigate. Details: https://radar.offseq.com/threat/cve-2026-44717-cwe-94-improper-control-of-generati-2fa37fa7 #OffSeq #CVE #infosec #security
##🔴 CVE-2026-44717 - Critical (9.8)
MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T16:16:14.463000
2 posts
🟠 CVE-2026-38728 - High (7.5)
An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to cause a denial of service via the SMTPStream._write, lib/smtp-stream.js components
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-38728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-38728 - High (7.5)
An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to cause a denial of service via the SMTPStream._write, lib/smtp-stream.js components
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-38728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T15:31:47
2 posts
🟠 CVE-2026-8585 - High (7.5)
Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8585/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8585 - High (7.5)
Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8585/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T15:16:56.913000
2 posts
🔴 CVE-2026-8634 - Critical (9.1)
Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability that allows attackers with access to a malicious or compromised repository to forward local secrets such as API tokens, cloud credentials, and broker tokens into the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-8634 - Critical (9.1)
Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability that allows attackers with access to a malicious or compromised repository to forward local secrets such as API tokens, cloud credentials, and broker tokens into the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8634/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T15:16:53.830000
2 posts
🟠 CVE-2026-44673 - High (7.5)
libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_string() in src/parser_lyb.c contains an integer overflow that results in a heap buffer overflow when parsing a maliciously crafted LYB binary blob. An attacker who can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44673/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44673 - High (7.5)
libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_string() in src/parser_lyb.c contains an integer overflow that results in a heap buffer overflow when parsing a maliciously crafted LYB binary blob. An attacker who can...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44673/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T14:56:18.253000
1 posts
🟠 CVE-2026-2652 - High (8.6)
A vulnerability in mlflow/mlflow versions 3.9.0 and earlier allows unauthenticated access to certain FastAPI routes when the server is started with authentication enabled (`--app-name basic-auth`) and served via uvicorn (ASGI). The FastAPI permiss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2652/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T14:56:18.253000
2 posts
🔴 CVE-2026-8398 - Critical (9.8)
A supply chain attack compromised the official installation packages of DAEMON Tools Lite (Windows versions 12.5.0.2421 through 12.5.0.2434), distributed from the legitimate website daemon-tools.cc between approximately April 8, 2026, and May 5, 2...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8398/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-8398 in DAEMON Tools Lite (Windows 12.5.0.2421 – 12.5.0.2434). Installers from April 8 – May 5, 2026, were trojanized with signed malicious code. Avoid affected versions, check vendor updates. Details: https://radar.offseq.com/threat/cve-2026-8398-cwe-506-embedded-malicious-code-in-a-5c5e8722 #OffSeq #SupplyChain #InfoSec
##updated 2026-05-15T14:44:49.877000
2 posts
🟠 CVE-2026-44633 - High (8.1)
Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44633 - High (8.1)
Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T14:44:49.877000
2 posts
🔴 CVE-2026-44592 - Critical (9.4)
Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44592 - Critical (9.4)
Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T14:30:03.170000
2 posts
🔴 CVE-2026-44212 - Critical (9.3)
PrestaShop is an open source e-commerce web application. Prior to 8.2.6 and 9.1.1, there is a stored Cross-Site Scripting (XSS) vulnerability in the PrestaShop back-office Customer Service view. An unauthenticated attacker can submit the public Co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44212/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44212 - Critical (9.3)
PrestaShop is an open source e-commerce web application. Prior to 8.2.6 and 9.1.1, there is a stored Cross-Site Scripting (XSS) vulnerability in the PrestaShop back-office Customer Service view. An unauthenticated attacker can submit the public Co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44212/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T14:11:57.190000
2 posts
VMware Fusion: Schwachstelle CVE-2026-41702 ermöglicht Root-Eskalation auf macOS
##🟠 CVE-2026-41702 - High (7.8)
VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during an operation performed by a SETUID binary. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate pr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41702/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T14:10:17.083000
1 posts
⚠️ CRITICAL: CVE-2026-0481 in AMD Instinct™ MI210 (ROCm). Unrestricted IP binding allows remote attackers to modify GPU configs — could cause availability loss. Awaiting mitigation. Details: https://radar.offseq.com/threat/cve-2026-0481-cwe-1327-binding-to-an-unrestricted--12062e2f #OffSeq #AMD #Vuln #ROCm #GPUsecurity
##updated 2026-05-15T14:09:15.910000
2 posts
🟠 CVE-2026-4094 - High (8.1)
The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the 'admin_head' function in all versions up to, and including, 1.4.5. This makes it possi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4094/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 HIGH severity: FOX – Currency Switcher Professional for WooCommerce ≤1.4.5 has a missing auth check (CVE-2026-4094). Authenticated users can wipe multi-currency configs; CSRF risk too! Restrict wp-admin, block 'woocs_reset'. More: https://radar.offseq.com/threat/cve-2026-4094-cwe-862-missing-authorization-in-rea-bcecd332 #OffSeq #WooCommerce #infosec
##updated 2026-05-15T14:09:15.910000
1 posts
🟠 CVE-2026-6228 - High (8.8)
The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 3.28.36. This is due to insufficient authorization checks in the role field update mechanism combined with overly permissiv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6228/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T12:30:37
1 posts
🟠 CVE-2026-41964 - High (8.4)
Permission control vulnerability in the web. Impact: Successful exploitation of this vulnerability may affect availability.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41964/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T09:31:43
1 posts
🟠 CVE-2026-6403 - High (7.5)
The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6403/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T09:31:43
2 posts
🔴 CVE-2026-5229 - Critical (9.8)
The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.1.10. This is due to the plugin trusting user-controlled cookie data to determine which WordPress account to authenticate after a LINE OA...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5229/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: Form Notify for WordPress (≤1.1.10) lets attackers bypass auth via malicious cookies in LINE OAuth — any account, even admin, at risk. CVE-2026-5229. Update or disable now! https://radar.offseq.com/threat/cve-2026-5229-cwe-287-improper-authentication-in-m-73809aa0 #OffSeq #WordPress #CVE20265229 #Infosec
##updated 2026-05-15T06:30:40
2 posts
🟠 CVE-2026-28761 - High (8.1)
Cross-site request forgery vulnerability exists in Musetheque V4 Information Disclosure for IPKNOWLEDGE V4L1 rev2203.0 and earlier. If a user views a malicious page while logged-in to the affected product, unexpected operations may be done.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28761/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: CVE-2026-28761 impacts Fujitsu Musetheque V4 for IPKNOWLEDGE (≤V4L1 rev2203.0). CSRF flaw allows unwanted actions if logged-in users visit malicious pages. Patch status unknown. https://radar.offseq.com/threat/cve-2026-28761-cross-site-request-forgery-csrf-in--3c8966ad #OffSeq #CSRF #Fujitsu #Vuln
##updated 2026-05-15T00:31:37
2 posts
🟠 CVE-2026-8526 - High (8.8)
Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8526/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8526 - High (8.8)
Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8526/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:37
2 posts
🟠 CVE-2026-8575 - High (8.3)
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8575/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8575 - High (8.3)
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8575/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:37
2 posts
🟠 CVE-2026-8573 - High (8.3)
Integer overflow in Codecs in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8573/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8573 - High (8.3)
Integer overflow in Codecs in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8573/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:37
2 posts
🟠 CVE-2026-8569 - High (8.3)
Out of bounds write in Codecs in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8569 - High (8.3)
Out of bounds write in Codecs in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8569/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8513 - High (8.3)
Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8513 - High (8.3)
Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8510 - High (7.5)
Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8510 - High (7.5)
Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8519 - High (8.8)
Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8519 - High (8.8)
Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8531 - High (8.8)
Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8531 - High (8.8)
Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8530 - High (8.3)
Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8530 - High (8.3)
Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8524 - High (8.8)
Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8524 - High (8.8)
Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8534 - High (8.3)
Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity:...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8534/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8534 - High (8.3)
Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity:...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8534/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8533 - High (8.3)
Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8533/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8533 - High (8.3)
Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8533/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8548 - High (8.3)
Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8548 - High (8.3)
Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:30:30
2 posts
🟠 CVE-2026-8542 - High (8.3)
Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8542 - High (8.3)
Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:30:29
2 posts
🟠 CVE-2026-8515 - High (8.3)
Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8515 - High (8.3)
Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:50.903000
2 posts
🟠 CVE-2026-8574 - High (8.3)
Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8574/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8574 - High (8.3)
Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8574/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:50.597000
2 posts
🟠 CVE-2026-8571 - High (8.3)
Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security sever...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8571/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8571 - High (8.3)
Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security sever...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8571/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:46.997000
2 posts
🟠 CVE-2026-8527 - High (8.8)
Insufficient validation of untrusted input in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8527/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8527 - High (8.8)
Insufficient validation of untrusted input in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8527/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:46.700000
2 posts
🟠 CVE-2026-8525 - High (8.3)
Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8525 - High (8.3)
Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:46.400000
2 posts
🟠 CVE-2026-8523 - High (8.3)
Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8523 - High (8.3)
Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:46.260000
2 posts
🟠 CVE-2026-8520 - High (8.3)
Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8520 - High (8.3)
Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:45.703000
2 posts
🟠 CVE-2026-8514 - High (8.3)
Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8514 - High (8.3)
Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:45.417000
2 posts
🟠 CVE-2026-8512 - High (8.3)
Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8512 - High (8.3)
Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:58
2 posts
🟠 CVE-2026-8581 - High (8.8)
Use after free in GPU in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8581/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8581 - High (8.8)
Use after free in GPU in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8581/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:58
2 posts
🟠 CVE-2026-8577 - High (8.8)
Integer overflow in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8577/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8577 - High (8.8)
Integer overflow in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8577/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:58
2 posts
🟠 CVE-2026-8629 - High (8.1)
Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insuff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8629/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8629 - High (8.1)
Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insuff...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8629/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:58
2 posts
🟠 CVE-2026-8587 - High (8.8)
Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8587/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8587 - High (8.8)
Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8587/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:55
2 posts
🟠 CVE-2026-8557 - High (7.5)
Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8557/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8557 - High (7.5)
Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8557/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8522 - High (8.8)
Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8522/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8522 - High (8.8)
Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8522/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8521 - High (7.5)
Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8521/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8521 - High (7.5)
Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8521/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8529 - High (8.8)
Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted video file. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8529/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8529 - High (8.8)
Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted video file. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8529/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8540 - High (8.8)
Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8540/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8540 - High (8.8)
Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8540/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8532 - High (8.8)
Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8532/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8532 - High (8.8)
Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8532/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8549 - High (8.8)
Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8549/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8549 - High (8.8)
Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8549/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8544 - High (8.8)
Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8544 - High (8.8)
Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8551 - High (8.8)
Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8551 - High (8.8)
Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:53
2 posts
🟠 CVE-2026-8621 - High (8.8)
Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Cra...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8621/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8621 - High (8.8)
Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Cra...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8621/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:53
3 posts
🔴 CVE-2026-8511 - Critical (9.6)
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-8511 - Critical (9.6)
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL vuln: CVE-2026-8511 in Google Chrome (pre-148.0.7778.168) — use-after-free in UI may enable remote sandbox escape via crafted HTML. Patch status unclear. Update ASAP once confirmed! https://radar.offseq.com/threat/cve-2026-8511-use-after-free-in-google-chrome-d050ec47 #OffSeq #Chrome #Infosec #Vuln
##updated 2026-05-14T21:30:53
2 posts
🟠 CVE-2026-8517 - High (8.8)
Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Cri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8517/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8517 - High (8.8)
Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Cri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8517/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:22:56.313000
2 posts
🟠 CVE-2026-44586 - High (8.3)
SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44586/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44586 - High (8.3)
SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44586/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
2 posts
🟠 CVE-2026-8509 - High (8.8)
Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8509 - High (8.8)
Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
2 posts
🟠 CVE-2026-8518 - High (8.8)
Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8518/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8518 - High (8.8)
Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8518/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
2 posts
🟠 CVE-2026-8547 - High (7.5)
Insufficient policy enforcement in Passwords in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8547 - High (7.5)
Insufficient policy enforcement in Passwords in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
2 posts
🟠 CVE-2026-8555 - High (8.8)
Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8555/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8555 - High (8.8)
Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8555/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
3 posts
🔴 CVE-2026-8580 - Critical (9.6)
Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8580/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-8580 - Critical (9.6)
Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8580/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##CRITICAL: CVE-2026-8580 (CVSS 9.6) — Use after free in Chrome Mojo could enable sandbox escape via HTML. Patch to 148.0.7778.168+ now. No active exploits yet. https://radar.offseq.com/threat/cve-2026-8580-use-after-free-in-google-chrome-1dc444d7 #OffSeq #Chrome #Vuln #PatchTuesday
##updated 2026-05-14T20:19:57
2 posts
🟠 CVE-2026-45338 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45338/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45338 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45338/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T20:18:01
2 posts
🟠 CVE-2026-45315 - High (8.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45315/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45315 - High (8.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45315/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T20:17:05.413000
21 posts
21 repos
https://github.com/ChamsBouzaiene/ai-vuln-rediscovery-nginx-cve-2026-42945
https://github.com/iammerrida-source/nginx-rift-detect
https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC
https://github.com/rheodev/CVE-2026-42945
https://github.com/DepthFirstDisclosures/Nginx-Rift
https://github.com/cipherspy/CVE-2026-42945-POC
https://github.com/chenqin231/CVE-2026-42945
https://github.com/0xBlackash/CVE-2026-42945
https://github.com/Renison-Gohel/CVE-2026-42945-NGINX-Rift
https://github.com/dinosn/cve-2026-42945-nginx32-lab
https://github.com/friparia/NGINX_RIFT_SCAN_CVE_2026_42945
https://github.com/soksofos/wazuh-nginx-cve-2026-42945-sca-lab
https://github.com/MateusVerass/nGixshell
https://github.com/sibersan/web-server-audit_CVE-2026-42945
https://github.com/tal7aouy/nginx-cve-2026-42945
https://github.com/byezero/nginx-cve-2026-42945-check
https://github.com/forxiucn/nginx-cve-2026-42945-poc
https://github.com/jelasin/CVE-2026-42945
https://github.com/oseasfr/Scanner_CVE_2026-42945
📢 NGINX Rift : RCE critique via un heap overflow vieux de 18 ans (CVE-2026-42945)
📝 ## 🔍 Contexte
Publié le 13 mai 2026 par Zhenpeng (Leo) Lin, chercheur chez DepthFirst AI, cet article prése...
📖 cyberveille : https://cyberveille.ch/posts/2026-05-15-nginx-rift-rce-critique-via-un-heap-overflow-vieux-de-18-ans-cve-2026-42945/
🌐 source : https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability
#CVE_2026_40701 #CVE_2026_42934 #Cyberveille
NGINX Flaw CVE-2026-42945 Actively Exploited, Threatens Worker Crashes and RCE
A newly discovered NGINX flaw, CVE-2026-42945, is being actively exploited, posing a significant threat of worker crashes and remote code execution (RCE) through specially crafted HTTP requests. This high-severity vulnerability, with a CVSS score of 9.2, has been lurking in NGINX versions since 2008,…
#Nginx #Cve202642945 #RemoteCodeExecution #HeapBufferOverflow #VulnerabilityExploitation
##🚨 CVE-2026-42945 (NGINX Rift)
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-42945
#nttdata #zen #secdb #infosec
#nginxrift #cve202642945 #nginx
Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.
##🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. https://radar.offseq.com/threat/poc-code-published-for-critical-nginx-vulnerabilit-3d78edaa #OffSeq #NGINX #Vuln #InfoSec
##And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??
https://discourse.ifin.network/t/cve-2026-42945-heap-buffer-overflow-in-nginx/441
##@beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: https://security-tracker.debian.org/tracker/CVE-2026-42945
@securestep9 @beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: https://security-tracker.debian.org/tracker/CVE-2026-42945
New.
Picus: NGINX Rift: CVE-2026-42945 Critical Heap Buffer Overflow Vulnerability Explained https://www.picussecurity.com/resource/blog/nginx-rift-cve-2026-42945-critical-heap-buffer-overflow-vulnerability-explained #infosec #vulnerability #threatresearch #opensource
##NGINX Flaw CVE-2026-42945 Actively Exploited, Threatens Worker Crashes and RCE
A newly discovered NGINX flaw, CVE-2026-42945, is being actively exploited, posing a significant threat of worker crashes and remote code execution (RCE) through specially crafted HTTP requests. This high-severity vulnerability, with a CVSS score of 9.2, has been lurking in NGINX versions since 2008,…
#Nginx #Cve202642945 #RemoteCodeExecution #HeapBufferOverflow #VulnerabilityExploitation
##🚨 CVE-2026-42945 (NGINX Rift)
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-42945
#nttdata #zen #secdb #infosec
#nginxrift #cve202642945 #nginx
Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.
##🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. https://radar.offseq.com/threat/poc-code-published-for-critical-nginx-vulnerabilit-3d78edaa #OffSeq #NGINX #Vuln #InfoSec
##And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??
https://discourse.ifin.network/t/cve-2026-42945-heap-buffer-overflow-in-nginx/441
##@beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: https://security-tracker.debian.org/tracker/CVE-2026-42945
New.
Picus: NGINX Rift: CVE-2026-42945 Critical Heap Buffer Overflow Vulnerability Explained https://www.picussecurity.com/resource/blog/nginx-rift-cve-2026-42945-critical-heap-buffer-overflow-vulnerability-explained #infosec #vulnerability #threatresearch #opensource
##Regarding CVE-2026-42945 in nginx - no modern (or even old) Linux distribution runs nginx without ASLR.
The way the PoC exploit works is they spawn nginx like this:
> exec setarch x86_64 -R /nginx-src/build/nginx -p /app -c /app/nginx.conf
Setarch -R disables ASLR. I've had a look through Github and I can't find any other software which actually does this for nginx either.
So, cool, sweet technical vuln - it's valid - but the RCE apocalypse ain't coming.
##🚨 Nouvelle faille critique sur NGINX : CVE-2026-42945 (Z)
Une vulnérabilité dans ngx_http_rewrite_module peut provoquer un crash des workers NGINX, voire une exécution de code si l’ASLR est désactivé.
👉 https://security-tracker.debian.org/tracker/CVE-2026-42945
##Une faille vieille de 18 ans dans Nginx, un PoC public, beaucoup de bruit… mais qui est vraiment concerné ?
##Nginx RCE PoC (CVE-2026-42945) https://github.com/DepthFirstDisclosures/Nginx-Rift
##updated 2026-05-14T18:33:53
3 posts
25 repos
https://github.com/whosfault/CVE-2026-43284
https://github.com/grabesec/XCP_ng_CVE-2026-43284_tester
https://github.com/XRSecCD/202605_dirty_frag
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://github.com/metalx1993/dirtyfrag-patches
https://github.com/AK777177/Dirty-Frag-Analysis
https://github.com/0xlane/pagecache-guard
https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
https://github.com/Percivalll/Dirty-Frag-Kubernetes-PoC
https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
https://github.com/haydenjames/dirty-frag-check
https://github.com/dixyes/dirtypatch
https://github.com/ChernStepanov/DirtyFrag-for-dummies
https://github.com/liamromanis101/DirtyFrag-Detector
https://github.com/scriptzteam/Paranoid-Dirty-Frag-CVE-2026-43284
https://github.com/linnemanlabs/dirtyfrag-arm64
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/ryan2929/CVE-2026-43284-
https://github.com/0xBlackash/CVE-2026-43284
https://github.com/6abc/Copy-Fail-CVE-2026-31431-dirty-frag-CVE-2026-43284
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/suominen/CVE-2026-43284
https://github.com/FrosterDL/CVE-2026-43284
#DirtyFrag #vulnerability: Universal Linux LPE
Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.
##To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
##Ist die Aufregung um die neuen Linux-Fehler berechtigt?
Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:
CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").
Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).
Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher
#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen
##updated 2026-05-14T18:33:03
16 posts
1 repos
This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.
##Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks
Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-...
🔗️ [Bleepingcomputer] https://link.is.it/iXcd6x
##Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):
Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.
Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.
Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.
##Cisco SD-WAN Zero-Day Exploited for Admin Access
A critical zero-day vulnerability, CVE-2026-20182, has been exploited in Cisco SD-WAN, allowing hackers to gain unrestricted administrative control with a severity score of 10 on the CVSS scale. This flaw enables unauthenticated attackers to manipulate network configurations and take control of Cisco Catalyst SD-WAN Controller with ease.
##Cisco Zero-Day Exploited in Ongoing Attacks by Persistent Threat Group
A newly discovered Cisco zero-day vulnerability, CVE-2026-20182, is being exploited in ongoing attacks, allowing threat actors to gain the highest administrative access to a network controller, essentially handing them a master key to wreak havoc. This max-severity flaw has sparked a race against time for Cisco customers and national cyber…
##📰 Cisco Scrambles to Patch Critical 10.0 CVSS Zero-Day in SD-WAN Under Active Attack
🚨 CRITICAL ZERO-DAY: Cisco warns of active exploitation of a 10.0 CVSS auth bypass flaw (CVE-2026-20182) in Catalyst SD-WAN. Attackers can gain full admin access. CISA has issued a directive to patch immediately! ⚠️ #CyberSecurity #ZeroDay #Cisco
🌐 cyber[.]netsecops[.]io
##Interesting. This was posted yesterday.
Tenable: Frequently asked questions about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182) https://www.tenable.com/blog/faq-about-the-continued-exploitation-of-cisco-catalyst-sd-wan-vulnerabilities-uat-8616 @tenable #infosec #Cisco #vulnerability
##The Record: CISA orders all federal agencies to patch exploited bug in Cisco SD-WAN systems by Sunday https://therecord.media/cisa-orders-all-federal-agencies-to-patch-cisco-sd-wan-bug @therecord_media @jgreig
CISA, posted yesterday: CVE-2026-20182
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-20182 #infosec #CISA #Cisco #vulnerability
This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.
##Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks
Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-...
🔗️ [Bleepingcomputer] https://link.is.it/iXcd6x
##Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):
Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.
Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.
Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.
##Interesting. This was posted yesterday.
Tenable: Frequently asked questions about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182) https://www.tenable.com/blog/faq-about-the-continued-exploitation-of-cisco-catalyst-sd-wan-vulnerabilities-uat-8616 @tenable #infosec #Cisco #vulnerability
##The Record: CISA orders all federal agencies to patch exploited bug in Cisco SD-WAN systems by Sunday https://therecord.media/cisa-orders-all-federal-agencies-to-patch-cisco-sd-wan-bug @therecord_media @jgreig
CISA, posted yesterday: CVE-2026-20182
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-20182 #infosec #CISA #Cisco #vulnerability
The zero-day, tracked as CVE-2026-20182, has been exploited in targeted attacks by a sophisticated threat actor identified as UAT-8616. https://www.securityweek.com/cisco-patches-another-sd-wan-zero-day-the-sixth-exploited-in-2026/
##Cisco Catalyst SD-WAN Controller Authentication Bypass Actively Exploited
Cisco patched a critical authentication bypass (CVE-2026-20182, CVSS 10.0) in Catalyst SD-WAN components that allows remote attackers to gain administrative control and manipulate network fabric configurations. The flaw is being exploited in the wild and follows a similar critical vulnerability used by threat actors since 2023.
**Make sure all Cisco Catalyst SD-WAN Controller and Manager components are isolated publick access and only accessible from expected peer systems and networks, especially UDP port 12346 and TCP port 830. Then do a very qick upgrade to a fixed version and check logs for unauthorized peering, suspicious SSH keys in the vmanage-admin account, and signs of log tampering.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/cisco-catalyst-sd-wan-controller-authentication-bypass-actively-exploited-w-m-d-d-r/gD2P6Ple2L
Why are we even bothering, again, if the "giants" of cyber aren't bothering? https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed/
##updated 2026-05-14T15:32:05
1 posts
CVE-2026-6473.
- **AI in Legal and Ethical Contexts**: Debates on AI-generated content, legal definitions of "data," and AI's impact on professions like journalism and academia.
- **Data Centers and Energy Consumption**: Environmental impact, energy demands, and local resource strain from AI data centers.
- **Cybersecurity Vulnerabilities**: Reports on security issues like Microsoft BitLocker backdoor, Grafana Labs source code theft, and Linux kernel vulnerabilities.
- [2/3]
updated 2026-05-14T14:28:41.283000
2 posts
5 repos
https://github.com/Jenderal92/CVE-2026-8181
https://github.com/zycoder0day/CVE-2026-8181
https://github.com/whattheslime/CVE-2026-8181
Bitdefender: Burst Statistics flaw, CVE-2026-8181, opens WordPress sites to admin takeover https://www.bitdefender.com/en-us/blog/hotforsecurity/burst-statistics-flaw-wordpress-admin-takeover #WordPress #infosec #vulnerability
##Bitdefender: Burst Statistics flaw, CVE-2026-8181, opens WordPress sites to admin takeover https://www.bitdefender.com/en-us/blog/hotforsecurity/burst-statistics-flaw-wordpress-admin-takeover #WordPress #infosec #vulnerability
##updated 2026-05-13T21:33:06
1 posts
Apple's May 11th update addressed 84 vulnerabilities spanning iOS, macOS, Safari, tvOS, watchOS, and visionOS. WebKit alone accounts for 13+ CVEs including CVE-2026-28883 and CVE-2026-43660. Kernel-level privilege escalation...
##updated 2026-05-13T21:33:04
1 posts
Apple's May 11th update addressed 84 vulnerabilities spanning iOS, macOS, Safari, tvOS, watchOS, and visionOS. WebKit alone accounts for 13+ CVEs including CVE-2026-28883 and CVE-2026-43660. Kernel-level privilege escalation...
##updated 2026-05-13T19:19:26.713000
1 posts
1 repos
nice, someone found a bootrom exploit (warning: ai)
##updated 2026-05-13T18:17:47.830000
2 posts
1 repos
https://github.com/tstephens1080/palo-alto-cve-2026-0265-checker
Authentication Bypass Flaw in Palo Alto Networks PAN-OS Sparks Severity Dispute
Palo Alto Networks disclosed a high-severity authentication bypass vulnerability (CVE-2026-0265) in PAN-OS affecting firewalls and Panorama appliances using Cloud Authentication Service. The flaw allows unauthenticated attackers to bypass security controls on management interfaces and GlobalProtect portals.
**Make sure all PAN-OS firewall and Panorama management interfaces are isolated from the internet and accessible only from trusted internal networks. If you use Cloud Authentication Service (CAS), upgrade PAN-OS to a fixed version ASAP, or as a temporary fix switch the authentication profile to SAML or RADIUS until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/authentication-bypass-flaw-in-palo-alto-networks-pan-os-sparks-severity-dispute-j-o-p-a-n/gD2P6Ple2L
Authentication Bypass Flaw in Palo Alto Networks PAN-OS Sparks Severity Dispute
Palo Alto Networks disclosed a high-severity authentication bypass vulnerability (CVE-2026-0265) in PAN-OS affecting firewalls and Panorama appliances using Cloud Authentication Service. The flaw allows unauthenticated attackers to bypass security controls on management interfaces and GlobalProtect portals.
**Make sure all PAN-OS firewall and Panorama management interfaces are isolated from the internet and accessible only from trusted internal networks. If you use Cloud Authentication Service (CAS), upgrade PAN-OS to a fixed version ASAP, or as a temporary fix switch the authentication profile to SAML or RADIUS until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/authentication-bypass-flaw-in-palo-alto-networks-pan-os-sparks-severity-dispute-j-o-p-a-n/gD2P6Ple2L
updated 2026-05-13T16:24:39
2 posts
1 repos
Critical TOTP Secret Leak Discovered in sealed-env Enterprise Mode
The sealed-env npm package patched a critical vulnerability (CVE-2026-45091) that leaked plaintext TOTP secrets in unseal tokens, allowing attackers to bypass two-factor authentication.
**If you use the sealed-env npm package (versions 0.1.0-alpha.1 through 0.1.0-alpha.3), upgrade ASAP to 0.1.0-alpha.4 or later, as your TOTP secrets may be exposed in token logs, CI/CD build logs, container dumps, or third-party tools like Sentry. After upgrading you must rotate all TOTP secrets, re-seal any environment files protected by the vulnerable versions since the upgrade is a breaking change. Then review historical logs to purge any captured tokens.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-totp-secret-leak-discovered-in-sealed-env-enterprise-mode-g-7-y-w-n/gD2P6Ple2L
Critical TOTP Secret Leak Discovered in sealed-env Enterprise Mode
The sealed-env npm package patched a critical vulnerability (CVE-2026-45091) that leaked plaintext TOTP secrets in unseal tokens, allowing attackers to bypass two-factor authentication.
**If you use the sealed-env npm package (versions 0.1.0-alpha.1 through 0.1.0-alpha.3), upgrade ASAP to 0.1.0-alpha.4 or later, as your TOTP secrets may be exposed in token logs, CI/CD build logs, container dumps, or third-party tools like Sentry. After upgrading you must rotate all TOTP secrets, re-seal any environment files protected by the vulnerable versions since the upgrade is a breaking change. Then review historical logs to purge any captured tokens.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-totp-secret-leak-discovered-in-sealed-env-enterprise-mode-g-7-y-w-n/gD2P6Ple2L
updated 2026-05-13T15:34:52.573000
2 posts
Outlook – CVE-2026-40361 : cette faille zero-click menace les entreprises, patchez ! https://www.it-connect.fr/outlook-cve-2026-40361-cette-faille-zero-click-menace-les-entreprises-patchez/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Outlook
##Outlook – CVE-2026-40361 : cette faille zero-click menace les entreprises, patchez ! https://www.it-connect.fr/outlook-cve-2026-40361-cette-faille-zero-click-menace-les-entreprises-patchez/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Outlook
##updated 2026-05-13T14:43:46.717000
1 posts
Avada Builder Flaws Expose WordPress Sites to Credential Theft
A critical vulnerability in the Avada Builder WordPress plugin, used by an estimated one million active installations, leaves sites exposed to credential theft and data breaches. Two flaws, CVE-2026-4782 and CVE-2026-4798, allow attackers to read sensitive files and extract database information, putting your site at risk.
#Wordpress #AvadaBuilder #CredentialTheft #ArbitraryFileRead #SqlInjection
##updated 2026-05-13T14:07:29.720000
2 posts
NOTICE: Shortcuts broke its x-callback-url implementation.
Seems to be part of the security fix for CVE-2026-28993 included in iOS 26.5/18.7.9, macOS 26.5/15.7.7/14.8.7. On these OSes, it’s no longer possible to get a result from a Shortcut call via `x-success` callback, you will *always* get an x-error.
In theory, per the CVE, Shortcuts should offer a permissions prompt, not just fail.
Apple Folks: FB22785648
##NOTICE: Shortcuts broke its x-callback-url implementation.
Seems to be part of the security fix for CVE-2026-28993 included in iOS 26.5/18.7.9, macOS 26.5/15.7.7/14.8.7. On these OSes, it’s no longer possible to get a result from a Shortcut call via `x-success` callback, you will *always* get an x-error.
In theory, per the CVE, Shortcuts should offer a permissions prompt, not just fail.
Apple Folks: FB22785648
##updated 2026-05-12T18:30:54
1 posts
Oh cool. A 9.9 score on the new critical code injection vulnerability for Microsoft Dynamics 365 on-prem servers. RCE with a scope change.🥳
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42898
##updated 2026-05-12T18:30:50
4 posts
1 repos
debates, LLM-generated code in projects, and controversies around AI policies in open-source.
- **Cybersecurity and Vulnerabilities**: Updates on vulnerabilities (e.g., CVE-2026-40369, BitLocker bypass), exploits, and security practices.
- **Linux and Open-Source Software**: Updates on Linux distributions (Debian 13.5, Arch Linux), open-source projects, and discussions about migrating from proprietary systems.
- **Eurovision Song Contest (ESC)**: Live discussions, technical [2/3]
energy consumption, and the strain on local resources.
- **Cybersecurity and Vulnerabilities**: Updates on vulnerabilities (e.g., CVE-2026-40369, BitLocker bypass), exploits, and security practices in open-source projects and enterprise systems.
- **Linux and Open-Source Software**: Updates on Linux distributions (e.g., Debian 13.5, Arch Linux), open-source projects, and discussions about migrating from proprietary systems.
- **Tech Industry Shifts**: Reorganizations at [2/3]
CVE-2026-40369: Arbitrary Kernel Address Increment via NtQuerySystemInformation https://lobste.rs/s/lwtmzl #security #windows
https://github.com/orinimron123/CVE-2026-40369-EXPLOIT
CVE-2026-40369: Arbitrary Kernel Address Increment via NtQuerySystemInformation https://lobste.rs/s/lwtmzl #security #windows
https://github.com/orinimron123/CVE-2026-40369-EXPLOIT
updated 2026-05-12T15:31:49
1 posts
Critical Path Traversal Vulnerability in Ivanti Xtraction
Ivanti released a critical security update for Xtraction to patch a path traversal vulnerability CVE-2026-8043) that allows authenticated attackers to read sensitive files and write malicious HTML content.
**Patch your Xtraction instances to version 2026.2 immediately and verify that Multi-Factor Authentication is active for all users. Even though this requires authentication, assume attackers can easily find low-level credentials.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-path-traversal-vulnerability-in-ivanti-xtraction-c-c-m-t-2/gD2P6Ple2L
updated 2026-05-12T15:31:18
1 posts
100 repos
https://github.com/sec17br/CVE-2026-31431-Copy-Fail
https://github.com/darioomatos/cve-2026-31431-copyfail
https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe
https://github.com/badsectorlabs/copyfail-go
https://github.com/professional-slacker/alg_check
https://github.com/desultory/CVE-2026-31431
https://github.com/Koshmare-Blossom/Copyfail-sh
https://github.com/wesmar/CVE-2026-31431
https://github.com/xn0kkx/CVE-2026-31431_CopyFail_LinuxKernel_LPE
https://github.com/Smarttfoxx/copyfail
https://github.com/rvizx/CVE-2026-31431
https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431
https://github.com/qi4L/CVE-2026-31431-Container-Escape
https://github.com/ben-slates/CVE-2026-31431-Exploit
https://github.com/ExploitEoom/CVE-2026-31431
https://github.com/SilverRuler/copy-fail-CVE-2026-31431
https://github.com/XsanFlip/CVE-2026-31431-Patch
https://github.com/adysec/cve-2026-31431
https://github.com/0xShe/CVE-2026-31431
https://github.com/SeanRickerd/cve-2026-31431
https://github.com/xeloxa/copyfail-exploit
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC
https://github.com/malwarekid/CVE-2026-31431
https://github.com/cyber-joker/copy-fail-python
https://github.com/JuanBindez/CVE-2026-31431
https://github.com/Alfredooe/CVE-2026-31431
https://github.com/b5null/CVE-2026-31431-C
https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection
https://github.com/wgnet/wg.copyfail.patch
https://github.com/ZephrFish/CopyFail-CVE-2026-31431
https://github.com/bigwario/copy-fail-CVE-2026-31431-C
https://github.com/Xerxes-2/CVE-2026-31431-rs
https://github.com/sgkdev/page_inject
https://github.com/diemoeve/copyfail-rs
https://github.com/Dabbleam/CVE-2026-31431-mitigation
https://github.com/EynaExp/Copy-Fail-CVE-2026-31431-modernized
https://github.com/abdullaabdullazade/CVE-2026-31431
https://github.com/RoflSecurity/copy_fail
https://github.com/philfry/cve-2026-31431-ftrace
https://github.com/atgreen/block-copyfail
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC
https://github.com/wuwu001/CVE-2026-31431-exploit
https://github.com/cozystack/copy-fail-blocker
https://github.com/Qengineering/RK35xx-CopyFail-Hotfix
https://github.com/tgies/copy-fail-c
https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431
https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431
https://github.com/sudoytang/copyfail-arm64
https://github.com/povzayd/CVE-2026-31431
https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431
https://github.com/ErdemOzgen/copy-fail-cve-2026-31431
https://github.com/mCub3/CVE-2026-31431
https://github.com/suominen/CVE-2026-31431
https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit
https://github.com/Boos4721/copyfail-rs
https://github.com/Huchangzhi/autorootlinux
https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431
https://github.com/bootsareme/copyfail-deconstructed
https://github.com/Dullpurple-sloop726/CVE-2026-31431-Linux-Copy-Fail
https://github.com/ncmprbll/copy-fail-rs
https://github.com/0xBlackash/CVE-2026-31431
https://github.com/rootsecdev/cve_2026_31431
https://github.com/theori-io/copy-fail-CVE-2026-31431
https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite
https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431
https://github.com/lonelyor/CVE-2026-31431-exp
https://github.com/pedromizz/copy-fail
https://github.com/H1d3r/copy-fail_LPE_Interactive
https://github.com/samanzamani/copy-fail-checker
https://github.com/rfxn/copyfail
https://github.com/gagaltotal/cve-2026-31431-copy-fail
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/krisiasty/vcheck
https://github.com/AdityaBhatt3010/CVE-2026-31431
https://github.com/pascal-gujer/CVE-2026-31431
https://github.com/yxdm02/CVE-2026-31431
https://github.com/gbonacini/CVE-2026-31431
https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://github.com/rippsec/CVE-2026-31431-Copy-Fail
https://github.com/jbnetwork-git/copy-fail-check
https://github.com/toxy4ny/copy-fail-exploit-on-c-redteam
https://github.com/MrAriaNet/cPanel-Fix
https://github.com/mrunalp/block-copyfail
https://github.com/kadir/copy-fail-CVE-2026-31431-IOC
https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit
https://github.com/polyakovavv/copyfail
https://github.com/ctzisme/copyfail-guard
https://github.com/sammwyy/copyfail-rs
https://github.com/wvverez/CVE-2026-31431-Copy-Fail
https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431
https://github.com/AliHzSec/CVE-2026-31431
https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script
https://github.com/MartinPham/copy-fail-CVE-2026-31431-php
https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail
https://github.com/aestechno/cve-2026-31431-ansible
https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE
https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs
copy.fail (CVE-2026-31431): a small Linux kernel bug with an unusually big blast radius https://jorijn.com/en/blog/copy-fail-cve-2026-31431-linux-kernel-bug-explained/
##updated 2026-05-11T16:22:43
1 posts
1 repos
Vulnerability Cve-2026-7411
Eclipse BaSyx Java Server SDK 버전 2.0.0-milestone-10 이전에서 Submodel HTTP API의 부적절한 경로 정규화 취약점(CVE-2026-7411)이 발견되었습니다. 인증되지 않은 원격 공격자가 악의적으로 조작된 fileName 파라미터를 이용해 경로 탐색 공격을 수행, 임의의 파일을 서버 파일 시스템에 쓸 수 있어 원격 코드 실행(RCE) 및 시스템 완전 장악이 가능합니다. 이 취약점은 네트워크 공격 벡터, 낮은 공격 복잡도, 권한 요구 없음으로 CVSS 10점의 치명적 위험도를 가집니다. 해당 SDK를 사용하는 AI 인프라 및 서비스 개발자는 즉시 버전 업데이트 및 보안 패치를 적용해야 합니다.
##updated 2026-05-11T14:25:50
2 posts
🟠 CVE-2026-44570 - High (8.3)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, resto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44570/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44570 - High (8.3)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, resto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44570/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T14:03:27
2 posts
🟠 CVE-2026-44565 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitiz...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44565/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44565 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitiz...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44565/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-06T16:16:12.510000
1 posts
Vulnerability Cve-2026-7412
Eclipse BaSyx Java Server SDK 버전 2.0.0-milestone-10 이전에서 Operation Delegation 기능이 위임 요청의 대상 URI를 검증하지 않아 인증되지 않은 원격 공격자가 임의의 내부 또는 외부 대상에 대해 블라인드 HTTP POST 요청을 실행할 수 있는 SSRF 취약점(CVE-2026-7412)이 발견되었습니다. 이 취약점은 네트워크 분할을 우회하고 내부 IT/OT 인프라 또는 클라우드 메타데이터 서비스(IMDS)를 공격하는 데 악용될 수 있습니다. CVSS 점수는 8.6으로 높은 심각도를 가집니다.
##updated 2026-05-04T18:31:33
1 posts
67 repos
https://github.com/Wesuiliye/CVE-2026-41940
https://github.com/tahaXafous/CVE_2026_41940_scan_exploit
https://github.com/devtint/CVE-2026-41940
https://github.com/mahfuzreham/cpanel-cve-2026-41940
https://github.com/shahidmallaofficial/cpanel-cve-2026-41940-fix
https://github.com/Ap0dexMe0/CVE-2026-41940
https://github.com/habibkaratas/sorry-ransomware-analysis
https://github.com/thekawix/CVE-2026-41940
https://github.com/realawaisakbar/CVE-2026-41940-Exploit-PoC
https://github.com/Kagantua/cPanelWHM-AuthBypass
https://github.com/murrez/CVE-2026-41940
https://github.com/tc4dy/CVE-2026-41940-POC-Exploit
https://github.com/sebinxavi/cve-checker-2026
https://github.com/Underh0st/CPanel-Audit-Remediation-Tool
https://github.com/MrOplus/CVE-2026-41940
https://github.com/AmirrezaMarzban/portscan-CVE-2026-41940
https://github.com/44pie/cpsniper
https://github.com/ynsmroztas/cPanelSniper
https://github.com/senyx122/CVE-2026-41940
https://github.com/kmaruthisrikar/CVE-2026-41940-cPanel-Auth-Bypass-Exploit
https://github.com/linko-iheb/cve-2026-41940-scanner
https://github.com/Andrei-Dr/cpanel-cve-2026-41940-ioc
https://github.com/ngksiva/cpanel-forensics
https://github.com/MrAriaNet/cPanel-Fix
https://github.com/merdw/cPanel-CVE-2026-41940-Scanner
https://github.com/0xF55/cve-2026-41940-exploit
https://github.com/0xabdoulaye/CPANEL-CVE-2026-41940
https://github.com/Christian93111/CVE-2026-41940
https://github.com/imbas007/POC_CVE-2026-41940
https://github.com/Richflexpix/cpanel-pwn
https://github.com/branixsolutions/Security-CVE-2026-41940-cPanel-WHM-WP2
https://github.com/unteikyou/CVE-2026-41940-AuthBypass-Detector
https://github.com/Sachinart/CVE-2026-41940-cpanel-0day
https://github.com/3tternp/CVE-2026-41940---cPanel-WHM-check
https://github.com/nickpaulsec/2026-41940-poc
https://github.com/ZildanZ/CVE-2026-41940
https://github.com/rdyprtmx/poc-cve-2026-41940
https://github.com/assetnote/cpanel2shell-scanner
https://github.com/iSee857/cPanel-WHM-CVE-2026-41940-AuthBypass
https://github.com/Defacto-ridgepole254/CVE-2026-41940-Exploit-PoC
https://github.com/anach-ai/CVE-2026-41940
https://github.com/YudaSamuel/cpanel-vuln-scanner
https://github.com/itsismarcos/CVE-2026-41940
https://github.com/tfawnies/CVE-2026-41940-next
https://github.com/acuciureanu/cpanel2shell-honeypot
https://github.com/SreejaPuthan/cpanel-control-plane-exposure-check
https://github.com/0dev1337/cpanelscanner
https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker
https://github.com/zycoder0day/CVE-2026-41940
https://github.com/Jenderal92/CVE-2026-41940
https://github.com/george1-adel/CVE-2026-41940_exploit
https://github.com/zedxod/CVE-2026-41940-POC
https://github.com/dennisec/CVE-2026-41940
https://github.com/ilmndwntr/CVE-2026-41940-MASS-EXPLOIT
https://github.com/Unfold-Security/CVE-2026-41940-Detection
https://github.com/Ishanoshada/CVE-2026-41940-Exploit-PoC
https://github.com/sercanokur/CVE-2026-41940-cPanel-WHM-Verification-Tool
https://github.com/XsanFlip/poc-cpanel-cve-2026-41940
https://github.com/cy3erm/CVE-2026-41940-POC
https://github.com/Lutfifakee-Project/CVE-2026-41940
https://github.com/OhmGun/whmxploit---CVE-2026-41940
https://github.com/rfxn/cpanel-sessionscribe
https://github.com/vineet7800/cpanel-malware-cleaner-cve-2026
https://github.com/adriyansyah-mf/cve-2026-41940-poc
https://github.com/NULL200OK/cve-2026-41940-tool
Last week I was staring at my EnduraCoach dashboard, watching it yell at me for sneaking in an extra sprint session that my body wasn’t ready for. The AI caught the overtraining pattern across heart-rate, sleep, and power data and shut it down before I wrecked my Ironman build. That same evening the April ransomware numbers landed. SMBs got hammered again. And I thought: if only every founder had an always-on coach like this for their security stack.
Here’s the uncomfortable truth from April 2026: ransomware didn’t slow down—it accelerated. A new player called JanaWare quietly encrypted files for hundreds of Turkish home users and small businesses through targeted phishing campaigns. Low-dollar demands ($200–$400) but high volume. Attackers are learning that SMBs are softer targets and faster payers.
The broader picture is uglier.
Verizon’s 2025 DBIR (still the gold standard) showed 88% of ransomware breaches hit SMBs versus just 39% for enterprises. Unpatched vulnerabilities caused 29% of incidents; stolen credentials another 30%.
Sophos and Black Kite reports confirm SMBs in the $4M–$8M revenue band are now the sweet spot for attackers.
Most of us simply don’t have a 24/7 SOC or the headcount to patch, triage, and remediate at machine speed.
You already know the drill—I wrote about it two weeks ago. You’ve got EDR, a SIEM that spits 800 alerts a day, cloud config tools, backup solutions, and a compliance spreadsheet that lives in Google Docs. Your one-person IT “team” (probably you or your CTO wearing three hats) can’t keep up. Alerts become noise. Drift happens. A single phishing email or unpatched server becomes a full-blown encryption party.
Meanwhile, attackers have upgraded. Remember my Claude Mythos experiment in April? One air-gapped model autonomously built an exploit chain and phoned home. Offensive AI agents are now table stakes for ransomware groups. Defensive point tools can’t match that speed.
This is exactly why we built Espresso Labs: one unified AI-powered platform that replaces the dozen disconnected tools and the missing SOC. At the center is Barista—our continuous AI agent that doesn’t just alert. It acts.
Barista watches endpoints, cloud configs, identities, and backups 24/7. It triages, quarantines, remediates, and collects audit-ready evidence in real time. Human experts back it up when needed. For CMMC, SOC 2, or HIPAA it enforces controls continuously instead of chasing checkboxes. Founders tell us it cuts compliance cost and timeline by up to 80% while actually stopping breaches.
Think of it as EnduraCoach for your entire tech stack: always connected, always enforcing the plan, and stepping in before you even notice the problem.
Example 1: A Dental Clinic (12 employees, California)
Late April 2026 the practice got hit via the fresh cPanel vulnerability (CVE-2026-41940). One unpatched server, no continuous scanning, and “Sorry” ransomware encrypted patient records and scheduling systems in under 40 minutes.
Downtime cost them $18k in lost appointments plus a $45k ransom negotiation.
They paid.
Data was partially recovered.
With Espresso Labs this never happens.
Barista’s agents would have auto-detected the cPanel drift during its nightly vuln sweep, patched it automatically, and isolated the server the moment anomalous encryption behavior started.
Immutable backups would have let them restore in minutes with zero ransom paid. The clinic keeps seeing patients instead of calling their MSP in panic.
Example 2: A Marketing Agency (8 employees, remote-first)
A senior designer clicked a sophisticated phishing link dressed as a client creative brief.
Stolen credentials gave attackers initial access. Within hours they deployed ransomware across the shared drive and exfiltrated client campaigns. The agency lost three days of billable work and faced a $32k demand.
Classic stolen-credential playbook—exactly the 30% bucket from the Verizon report.
Barista would have caught and blocked the malware download, and rolled back from the last clean backup automatically. The designer gets a gentle “hey, that link looked sketchy—let’s run a quick training module.” No encryption, no exfil, no headlines.
These aren’t hypotheticals.
These patterns played out in April for dozens of SMBs just like yours.
Your startup isn’t a marathon—it’s brutal sprints.
Security in 2026 is the same.
One missed sprint and the whole race ends. Continuous AI agents turn defense into a sprint you can actually win.
The tech exists today. We’re running it for our own early customers and it feels exactly like the relief EnduraCoach gives me mid-training: someone (or something) smarter has your back.
If your April numbers looked anything like the industry’s, drop a comment: what’s your biggest security headache right now?
Or head to espressolabs.com and book a 15-minute Barista demo.
No slide deck, no hard sell—just a live look at what continuous actually feels like.
Stay safe out there.
Train hard, ship secure, and let the AI do the heavy lifting.
updated 2026-04-29T01:00:01.613000
2 posts
1 repos
CISA has updated the KEV catalogue.
- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-42897 #Microsoft #CISA #zeroday #infosec #vulnerability
##CISA has updated the KEV catalogue.
- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-42897 #Microsoft #CISA #zeroday #infosec #vulnerability
##updated 2026-04-24T20:53:27
2 posts
1 repos
The Thymeleaf vulnerability with a CVSS score of 9.1 grabs your attention, as it should. But before you call the cavalry and claim this as the new Log4shell, read this first. CVE-2026-40478 is a server-side template injection vulnerability in Thymeleaf discovered by pentester Dawid Bakaj. Thymeleaf is a templating engine in Java that is used for server-side webpage…...
##The Thymeleaf vulnerability with a CVSS score of 9.1 grabs your attention, as it should. But before you call the cavalry and claim this as the new Log4shell, read this first. CVE-2026-40478 is a server-side template injection vulnerability in Thymeleaf discovered by pentester Dawid Bakaj. Thymeleaf is a templating engine in Java that is used for server-side webpage…...
##updated 2026-04-16T21:49:17
2 posts
10 repos
https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197
https://github.com/0xBlackash/CVE-2026-34197
https://github.com/DEVSECURITYSPRO/CVE-2026-34197
https://github.com/dinosn/CVE-2026-34197
https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE
https://github.com/Catherines77/ActiveMQ-EXPtools
https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-
https://github.com/rootdirective-sec/CVE-2026-34197-Lab
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
updated 2026-04-14T18:30:55
1 posts
1 repos
Neue Windows Zero-Day Sicherheitslücken
Inzwischen ist der Zoo der neu veröffentlichten Zero-Day Sicherheitslücken in Microsoft (MS) Windows auf 5 Exemplare angewachsen. Ein anonymer Entwickler, der unter den Pseudonymen Nightmare-Eclipse oder Chaotic Eclipse auftritt, hat gerade zwei weitere bis dato unbekannte Sicherheitslücken in Windows publik gemacht. Die nennt er GreenPlasma und YellowKey. Im April hatte er bereits drei andere Lücken veröffentlicht: BlueHammer, RedSun und UnDefend. Von denen hat als einziger BlueHammer eine CVE-Nummer bekommen (CVE-2026-32201) und wurde von MS mit den Updates im April
https://www.pc-fluesterer.info/wordpress/2026/05/16/neue-windows-zero-day-sicherheitsluecken/
#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #Microsoft #sicherheit #unplugMicrosoft #UnplugTrump #windows #wissen
##updated 2026-04-03T19:04:33.083000
2 posts
sigh...
https://github.com/CVEProject/cve-schema/blob/main/schema/CVE_Record_Format.json#L818 - supporting media in CVE descriptions have the optional field base64 which should indicate if the value field is base64 encoded.
Except one CNA (Nvidia) appears to get this consistently wrong...
Example: https://github.com/CVEProject/cvelistV5/blob/main/cves/2026/24xxx/CVE-2026-24154.json#L93
##sigh...
https://github.com/CVEProject/cve-schema/blob/main/schema/CVE_Record_Format.json#L818 - supporting media in CVE descriptions have the optional field base64 which should indicate if the value field is base64 encoded.
Except one CNA (Nvidia) appears to get this consistently wrong...
Example: https://github.com/CVEProject/cvelistV5/blob/main/cves/2026/24xxx/CVE-2026-24154.json#L93
##updated 2025-12-15T15:18:49.987000
2 posts
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
updated 2025-10-24T13:38:59.063000
2 posts
9 repos
https://github.com/ductink98lhp/analyze-Exploit-CVE-2023-22518-Confluence
https://github.com/ForceFledgling/CVE-2023-22518
https://github.com/bibo318/CVE-2023-22518
https://github.com/RevoltSecurities/CVE-2023-22518
https://github.com/davidfortytwo/CVE-2023-22518
https://github.com/C1ph3rX13/CVE-2023-22518
https://github.com/0x0d3ad/CVE-2023-22518
CVE‑2023‑22518 is a critical broken authentication flaw in Atlassian Confluence that allows unauthenticated attackers to reset the instance and create a new admin account. Active exploitation confirms the urgency for immediate patching and external access restriction.
##CVE‑2023‑22518 is a critical broken authentication flaw in Atlassian Confluence that allows unauthenticated attackers to reset the instance and create a new admin account. Active exploitation confirms the urgency for immediate patching and external access restriction.
##updated 2025-10-22T17:32:08
2 posts
17 repos
https://github.com/MrG3P5/CVE-2017-9841
https://github.com/mbrasile/CVE-2017-9841
https://github.com/p1ckzi/CVE-2017-9841
https://github.com/ludy-dev/PHPUnit_eval-stdin_RCE
https://github.com/incogbyte/laravel-phpunit-rce-masscaner
https://github.com/K3ysTr0K3R/CVE-2017-9841-EXPLOIT
https://github.com/drcrypterdotru/PHPUnit-GoScan
https://github.com/dream434/CVE-2017-9841
https://github.com/MR-LeonardoGomes/CVE-2017-9841
https://github.com/cyberharsh/Php-unit-CVE-2017-9841
https://github.com/Chocapikk/CVE-2017-9841
https://github.com/joelindra/CVE-2017-9841
https://github.com/RandomRobbieBF/phpunit-brute
https://github.com/MadExploits/PHPunit-Exploit
https://github.com/akr3ch/CVE-2017-9841
New.
VulnCheck: Nine Years and Still Swinging: CVE-2017-9841 Remains One of the Most Actively Targeted Vulnerabilities in Canaries https://www.vulncheck.com/blog/cve-2017-9841 @vulncheck #infosec #vulnerability
##New.
VulnCheck: Nine Years and Still Swinging: CVE-2017-9841 Remains One of the Most Actively Targeted Vulnerabilities in Canaries https://www.vulncheck.com/blog/cve-2017-9841 @vulncheck #infosec #vulnerability
##updated 2025-07-07T15:30:41
2 posts
The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##updated 2025-01-23T18:32:22
2 posts
The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##updated 2025-01-14T17:15:11.487000
2 posts
8 repos
https://github.com/Rubikcuv5/cve-2023-30253
https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253
https://github.com/04Shivam/CVE-2023-30253-Exploit
https://github.com/1lkla/POC-exploit-for-Dolibarr
https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253
https://github.com/andria-dev/DolibabyPhp
The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##updated 2025-01-03T12:15:26.257000
2 posts
How not to handle reported security issues: https://defnull.de/2024/CVE-2024-49767_flask/#timeline
##How not to handle reported security issues: https://defnull.de/2024/CVE-2024-49767_flask/#timeline
##updated 2024-11-21T06:45:39.280000
2 posts
6 repos
https://github.com/ASkyeye/CVE-2022-21894-Payload
https://github.com/Wack0/batondrop_armv7
https://github.com/qjawls2003/BlackLotus-Detection
https://github.com/Wack0/CVE-2022-21894
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
updated 2024-08-01T15:32:23
2 posts
4 repos
https://github.com/ajf8729/BlackLotus
https://github.com/helleflo1312/Orchestrated-Powershell-for-CVE-2023-24932
https://github.com/Wack0/CVE-2022-21894
https://github.com/v1ckxy/Orchestrated-Powershell-for-CVE-2023-24932-en
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
🟠 CVE-2026-43908 - High (8.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside Conv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43908/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43908 - High (8.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside Conv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43908/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43907 - High (8.3)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp le...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43907/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43907 - High (8.3)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp le...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43907/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43906 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a heap-based buffer overflow in the HEIF decoder of OpenImageIO allows out-of-bounds ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43906 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a heap-based buffer overflow in the HEIF decoder of OpenImageIO allows out-of-bounds ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43905 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43905 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43904 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43904 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43903 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, sgiinput.cpp:265,274 use OIIO_DASSERT for bounds checking in the RLE decode loop. In ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43903 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, sgiinput.cpp:265,274 use OIIO_DASSERT for bounds checking in the RLE decode loop. In ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43909 - High (8.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABy...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43909/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43909 - High (8.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABy...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43909/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##5 posts
5 repos
https://github.com/ExploitEoom/CVE-2026-46300
https://github.com/Sentebale/CVE-2026-46300
https://github.com/HORKimhab/CVE-2026-46300
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
##Ist die Aufregung um die neuen Linux-Fehler berechtigt?
Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:
CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").
Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).
Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher
#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen
##Fragnesia: una nuova vulnerabilità di escalation dei privilegi nel kernel Linux
Scoperta una nuova falla di sicurezza nel kernel Linux, chiamata Fragnesia (CVE-2026-46300), che consente a un utente locale non privilegiato di ottenere i privilegi di amministratore (root) su una distribuzione GNU/Linux.
@linux #UnoLinux #gnulinux #linux
##Fragnesia: una nuova vulnerabilità di escalation dei privilegi nel kernel Linux
Scoperta una nuova falla di sicurezza nel kernel Linux, chiamata Fragnesia (CVE-2026-46300), che consente a un utente locale non privilegiato di ottenere i privilegi di amministratore (root) su una distribuzione GNU/Linux.
@linux #UnoLinux #gnulinux #linux
##Oh and while we are here, Linux fans, please tell me you have updated your machine for "Fragnesia (CVE-2026-46300)", right… right!?
##🟠 CVE-2026-46407 - High (8.1)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token li...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46407/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46407 - High (8.1)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token li...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46407/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8686 - High (7.5)
Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet.
To remediate this issue, users should upgrade to v5.0.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8686 - High (7.5)
Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet.
To remediate this issue, users should upgrade to v5.0.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: CVE-2026-44699 in libjwt (3.0.0 – 3.3.2) lets attackers forge JWTs by exploiting HMAC verification with a zero-length key if RSA JWKs lack the alg parameter. Patch to 3.3.3 or confirm vendor remediation! https://radar.offseq.com/threat/cve-2026-44699-cwe-327-use-of-a-broken-or-risky-cr-78313648 #OffSeq #JWT #Infosec
##⚠️ CRITICAL: CVE-2026-44699 in libjwt (3.0.0 – 3.3.2) lets attackers forge JWTs by exploiting HMAC verification with a zero-length key if RSA JWKs lack the alg parameter. Patch to 3.3.3 or confirm vendor remediation! https://radar.offseq.com/threat/cve-2026-44699-cwe-327-use-of-a-broken-or-risky-cr-78313648 #OffSeq #JWT #Infosec
##🚨 CVE-2026-45035 (CRITICAL, CVSS 9.4): Tabby < 1.0.233 exposes users to RCE via tabby:// links. Any click can run OS commands with user privileges. Patch to 1.0.233+ ASAP! https://radar.offseq.com/threat/cve-2026-45035-cwe-78-improper-neutralization-of-s-e1b4240b #OffSeq #RCE #Tabby #Vuln
##🚨 CVE-2026-45035 (CRITICAL, CVSS 9.4): Tabby < 1.0.233 exposes users to RCE via tabby:// links. Any click can run OS commands with user privileges. Patch to 1.0.233+ ASAP! https://radar.offseq.com/threat/cve-2026-45035-cwe-78-improper-neutralization-of-s-e1b4240b #OffSeq #RCE #Tabby #Vuln
##Avada Builder Flaws Expose WordPress Sites to Credential Theft
A critical vulnerability in the Avada Builder WordPress plugin, used by an estimated one million active installations, leaves sites exposed to credential theft and data breaches. Two flaws, CVE-2026-4782 and CVE-2026-4798, allow attackers to read sensitive files and extract database information, putting your site at risk.
#Wordpress #AvadaBuilder #CredentialTheft #ArbitraryFileRead #SqlInjection
##