## Updated at UTC 2026-05-23T04:55:01.123721

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-9011 7.5 0.08% 1 0 2026-05-22T09:31:35 The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is
CVE-2026-9018 8.8 0.03% 1 0 2026-05-22T05:16:28.067000 The Easy Elements for Elementor – Addons & Website Templates plugin for WordPres
CVE-2026-4834 7.5 0.06% 1 0 2026-05-22T04:16:26.647000 The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'sear
CVE-2026-41054 7.8 0.01% 1 0 2026-05-22T04:16:24.770000 In `src/havegecmd.c`, the `socket_handler` function performs a credential check
CVE-2026-34911 7.7 0.01% 1 0 2026-05-22T03:30:34 A malicious actor with access to the network and low privileges could exploit a
CVE-2026-33000 9.1 0.06% 2 0 2026-05-22T03:30:33 A malicious actor with access to the network and high privileges could exploit a
CVE-2026-9264 None 0.04% 1 0 2026-05-22T03:30:33 A cross-site scripting (XSS) vulnerability in SketchUp 2026's Dynamic Components
CVE-2026-45250 7.8 0.01% 3 1 2026-05-22T02:16:34.810000 The setcred(2) system call is only available to privileged users. However, befo
CVE-2026-34910 10.0 0.10% 2 0 2026-05-22T02:16:34.527000 A malicious actor with access to the network could exploit an Improper Input Val
CVE-2026-34909 10.0 0.02% 2 0 2026-05-22T02:16:34.390000 A malicious actor with access to the network could exploit a Path Traversal vuln
CVE-2026-34908 10.0 0.02% 2 0 2026-05-22T02:16:34.240000 A malicious actor with access to the network could exploit an Improper Access Co
CVE-2026-6960 9.8 0.15% 2 1 2026-05-21T22:16:48.643000 The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file upload
CVE-2026-46473 7.5 0.01% 2 0 2026-05-21T22:16:48.157000 Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand. Secret
CVE-2026-47102 8.8 0.05% 1 0 2026-05-21T21:16:32.557000 LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /us
CVE-2026-47101 8.8 0.05% 1 0 2026-05-21T21:16:32.413000 LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API key
CVE-2026-47114 8.8 0.16% 1 0 2026-05-21T21:03:56.320000 IINA before 1.4.3 contains a user-assisted command execution vulnerability that
CVE-2026-34926 6.7 0.25% 8 1 2026-05-21T20:16:14.027000 A directory traversal vulnerability in the Apex One (on-premise) server could al
CVE-2025-34291 8.8 31.20% 4 2 template 2026-05-21T20:16:13.520000 Langflow versions up to and including 1.6.9 contain a chained vulnerability that
CVE-2026-24216 7.8 0.06% 1 0 2026-05-21T20:08:32.900000 NVIDIA BioNemo for Linux contains a vulnerability where a user could cause a des
CVE-2026-24217 8.8 0.08% 2 0 2026-05-21T20:08:20.257000 NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause
CVE-2026-4858 8.0 0.04% 1 0 2026-05-21T19:43:31.373000 Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.
CVE-2026-20239 7.5 0.01% 1 0 2026-05-21T19:42:21.353000 In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform
CVE-2026-48207 9.8 0.04% 2 0 2026-05-21T19:16:53.700000 Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializ
CVE-2026-42945 8.1 1.00% 1 29 2026-05-21T19:16:53.100000 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo
CVE-2026-28764 7.8 0.01% 1 0 2026-05-21T19:16:52.123000 MediaArea MediaInfoLib LXF element parsing heap-based buffer overflow vulnerabil
CVE-2026-39531 9.3 0.03% 1 0 2026-05-21T19:10:36.607000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-9089 8.8 0.00% 1 0 2026-05-21T19:10:21.527000 The ConnectWise Automate™ Agent does not fully verify the authenticity of compon
CVE-2026-48241 8.1 0.05% 2 0 2026-05-21T19:10:12.323000 Open ISES Tickets before 3.44.2 contains hardcoded MySQL database credentials in
CVE-2026-48235 8.2 0.03% 1 0 2026-05-21T19:10:12.323000 Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/r
CVE-2026-48242 8.1 0.04% 1 0 2026-05-21T19:10:12.323000 Open ISES Tickets before 3.44.2 contains hardcoded MySQL database connection cre
CVE-2026-45251 7.8 0.01% 1 0 2026-05-21T19:01:22.710000 A file descriptor can be closed while a thread is blocked in a poll(2) or select
CVE-2026-45253 8.4 0.01% 1 0 2026-05-21T19:01:01.833000 ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) a
CVE-2026-45255 7.5 0.01% 1 0 2026-05-21T19:00:34.217000 When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, the
CVE-2026-8632 7.8 0.01% 2 0 2026-05-21T18:58:59.447000 A potential security vulnerability has been identified in the HP Linux Imaging a
CVE-2026-8631 9.8 0.02% 3 0 2026-05-21T18:58:41.297000 A potential security vulnerability has been identified in the HP Linux Imaging a
CVE-2026-47783 8.1 0.07% 1 0 2026-05-21T17:06:40.670000 In memcached before 1.6.42, username data for SASL password database authenticat
CVE-2026-47784 8.1 0.07% 1 0 2026-05-21T17:06:33.240000 In memcached before 1.6.42, password data for SASL password database authenticat
CVE-2026-44925 8.8 0.00% 2 0 2026-05-21T16:57:27.350000 Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations
CVE-2026-9111 8.8 0.03% 1 0 2026-05-21T16:56:46.883000 Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allow
CVE-2026-9112 8.8 0.03% 1 0 2026-05-21T16:56:43.173000 Use after free in GPU in Google Chrome on Windows prior to 148.0.7778.179 allowe
CVE-2026-9114 8.8 0.03% 1 0 2026-05-21T16:56:26.853000 Use after free in QUIC in Google Chrome on prior to 148.0.7778.179 allowed a rem
CVE-2026-9117 7.5 0.03% 1 0 2026-05-21T16:45:44.400000 Type Confusion in GFX in Google Chrome on Linux, ChromeOS prior to 148.0.7778.17
CVE-2026-9118 8.8 0.03% 1 0 2026-05-21T16:45:19.020000 Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed
CVE-2026-9119 8.8 0.02% 1 0 2026-05-21T16:44:34.153000 Heap buffer overflow in WebRTC in Google Chrome on prior to 148.0.7778.179 allow
CVE-2026-9120 8.8 0.03% 1 0 2026-05-21T16:41:34.767000 Use after free in WebRTC in Google Chrome prior to 148.0.7778.179 allowed a remo
CVE-2026-9121 8.8 0.03% 1 0 2026-05-21T16:35:19.957000 Out of bounds read in GPU in Google Chrome on prior to 148.0.7778.179 allowed a
CVE-2026-9123 7.5 0.00% 1 0 2026-05-21T16:31:56.420000 Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS
CVE-2026-9126 8.8 0.03% 1 0 2026-05-21T16:23:01.260000 Use after free in DOM in Google Chrome on prior to 148.0.7778.179 allowed a remo
CVE-2026-43494 0 0.03% 2 2 2026-05-21T16:16:23.157000 In the Linux kernel, the following vulnerability has been resolved: net/rds: re
CVE-2026-47373 7.5 0.03% 2 0 2026-05-21T16:04:53.813000 Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attack
CVE-2026-23734 0 0.04% 1 0 2026-05-21T16:04:53.813000 XWiki Platform is a generic wiki platform. Versions prior to 18.1.0-rc-1, 17.10.
CVE-2026-33137 0 0.04% 1 0 2026-05-21T16:04:53.813000 XWiki Platform is a generic wiki platform offering runtime services for applicat
CVE-2026-40092 7.5 0.02% 1 0 2026-05-21T16:04:53.813000 nimiq-blockchain provides persistent block storage for Nimiq's Rust implementati
CVE-2026-0393 0 0.05% 1 0 2026-05-21T16:04:33.830000 The affected product may expose credentials remotely between low privileged visu
CVE-2025-71213 7.8 0.01% 1 0 2026-05-21T15:34:18 An origin validation error vulnerability in Trend Micro Apex One could allow a l
CVE-2026-5118 9.8 0.03% 3 4 2026-05-21T15:34:17 The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation
CVE-2025-71210 9.8 0.42% 2 0 2026-05-21T15:34:17 A vulnerability in the Trend Micro Apex One management console could allow a rem
CVE-2025-71211 9.8 0.43% 1 0 2026-05-21T15:34:17 A vulnerability in the Trend Micro Apex One management console could allow a rem
CVE-2025-13479 7.5 0.03% 1 0 2026-05-21T15:34:17 Authorization bypass through User-Controlled key vulnerability in PosCube Hardwa
CVE-2026-47372 9.1 0.01% 1 0 2026-05-21T15:34:07 Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values
CVE-2026-42001 7.5 0.02% 1 0 2026-05-21T15:27:51.530000 Insufficient Validation of Autoprimary SOA Queries
CVE-2026-24218 8.1 0.02% 2 0 2026-05-21T15:26:35.653000 NVIDIA DGX OS contains a vulnerability in the factory provisioning process, wher
CVE-2026-5433 9.1 0.26% 1 0 2026-05-21T15:26:35.653000 Honeywell Control Network Module (CNM) contains command injection vulnerability
CVE-2026-2740 8.4 1.25% 1 0 2026-05-21T15:26:35.653000 Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus
CVE-2026-24188 8.2 0.04% 1 0 2026-05-21T15:26:35.653000 NVIDIA TensorRT contains a vulnerability where an attacker could cause an out-of
CVE-2026-9082 6.5 0.02% 17 6 template 2026-05-21T15:24:25.330000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-9157 8.4 0.02% 1 0 2026-05-21T15:24:25.330000 Improper input validation, Unrestricted upload of file with dangerous type vulne
CVE-2026-39405 0 0.05% 1 0 2026-05-21T15:24:25.330000 Frappe Learning Management System (LMS) is a learning system that helps users st
CVE-2026-39310 8.6 0.06% 1 0 2026-05-21T15:24:25.330000 Trilium Notes is a cross-platform, hierarchical note taking application focused
CVE-2026-40165 8.7 0.02% 1 0 2026-05-21T15:24:25.330000 authentik is an open-source identity provider. Versions 2025.12.4 and prior, and
CVE-2026-9133 7.7 0.02% 1 0 2026-05-21T15:24:25.330000 Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before ve
CVE-2026-44052 7.5 0.03% 1 0 2026-05-21T15:20:19.040000 Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output
CVE-2026-44050 9.9 0.14% 1 0 2026-05-21T15:20:19.040000 A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk
CVE-2026-44049 7.5 0.07% 1 0 2026-05-21T15:20:19.040000 An out-of-bounds write due to improper null termination in convert_charset() in
CVE-2026-44048 8.8 0.14% 1 0 2026-05-21T15:20:19.040000 A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in N
CVE-2026-44047 8.8 0.03% 1 0 2026-05-21T15:20:19.040000 An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 throu
CVE-2026-44062 7.5 0.19% 1 0 2026-05-21T15:20:19.040000 A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 t
CVE-2026-44060 7.5 0.08% 1 0 2026-05-21T15:20:19.040000 An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a
CVE-2026-44055 7.5 0.23% 1 0 2026-05-21T15:20:19.040000 A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 al
CVE-2026-44068 7.6 0.15% 1 0 2026-05-21T15:20:19.040000 Incomplete sanitization of extended attribute (EA) path components in Netatalk 2
CVE-2026-6279 9.8 0.10% 2 0 2026-05-21T15:19:30.540000 The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthe
CVE-2026-45444 10.0 0.04% 1 0 2026-05-21T15:19:30.540000 Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift
CVE-2026-9139 9.8 0.13% 2 0 2026-05-21T15:17:59.850000 Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded crede
CVE-2026-9141 9.8 0.22% 2 0 2026-05-21T15:17:59.850000 Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication
CVE-2026-9144 7.6 0.04% 1 0 2026-05-21T15:17:59.850000 Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-sit
CVE-2025-71217 7.8 0.01% 1 0 2026-05-21T15:16:22.223000 An origin validation error vulnerability in the Trend Micro Apex One (mac) agent
CVE-2025-71216 7.8 0.01% 1 0 2026-05-21T15:16:22.037000 A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agen
CVE-2025-71214 7.8 0.01% 1 0 2026-05-21T15:16:21.100000 An origin validation error vulnerability in the Trend Micro Apex One (mac) agent
CVE-2025-71212 7.8 0.03% 1 0 2026-05-21T15:05:28.023000 A link following vulnerability in the Trend Micro Apex One scan engine could all
CVE-2026-34930 7.8 0.01% 1 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-34927 7.8 0.01% 4 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-34929 7.8 0.01% 1 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-34928 7.8 0.01% 1 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-45206 7.8 0.01% 2 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-45207 7.8 0.01% 2 0 2026-05-21T15:05:28.023000 An origin validation vulnerability in the Apex One/SEP agent could allow a local
CVE-2026-45208 7.8 0.01% 1 0 2026-05-21T15:05:28.023000 A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow
CVE-2008-4250 9.8 92.53% 1 4 2026-05-21T12:57:17.353000 The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP
CVE-2009-1537 8.8 55.49% 1 0 2026-05-21T12:57:12.850000 Unspecified vulnerability in the QuickTime Movie Parser Filter in quartz.dll in
CVE-2010-0806 8.8 87.25% 1 0 2026-05-21T12:57:10.303000 Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in
CVE-2010-0249 8.8 88.68% 1 0 2026-05-21T12:57:01.463000 Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 o
CVE-2009-3459 8.8 91.02% 1 0 2026-05-21T12:56:49.133000 Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x bef
CVE-2026-44051 8.1 0.02% 1 0 2026-05-21T09:32:16 An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows
CVE-2026-42960 10.0 0.02% 2 0 2026-05-20T22:51:43.680000 NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning
CVE-2026-41292 7.5 0.06% 2 0 2026-05-20T22:49:46.850000 NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degrada
CVE-2026-46333 5.5 0.01% 9 4 2026-05-20T21:31:29 In the Linux kernel, the following vulnerability has been resolved: ptrace: sli
CVE-2026-44926 8.8 0.01% 2 0 2026-05-20T20:16:40.517000 InfoScale CmdServer before 7.4.2 mishandles access control.
CVE-2026-41091 7.8 6.55% 5 2 2026-05-20T19:06:36.850000 Improper link resolution before file access ('link following') in Microsoft Defe
CVE-2026-45498 4.0 2.77% 3 1 2026-05-20T19:05:46.837000 Microsoft Defender Denial of Service Vulnerability
CVE-2026-45584 8.1 0.04% 3 1 2026-05-20T18:56:32.350000 Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker
CVE-2026-24207 9.8 0.10% 1 0 2026-05-20T17:30:43.320000 NVIDIA Triton Inference Server contains a vulnerability where an attacker could
CVE-2026-20223 10.0 0.06% 3 1 2026-05-20T17:30:40.450000 A vulnerability in the&nbsp;access validation of internal REST APIs of Cisco Sec
CVE-2026-45585 6.8 0.11% 2 2 2026-05-20T16:42:42.177000 Microsoft is aware of a security feature bypass vulnerability in Windows publicl
CVE-2026-6068 6.5 0.05% 1 0 2026-05-20T14:17:02.973000 NASM contains a heap use after free vulnerability in response file (-@) processi
CVE-2026-9064 7.5 0.08% 1 0 2026-05-20T14:02:12.280000 A flaw was found in 389-ds-base. The get_ldapmessage_controls_ext() function in
CVE-2026-44933 7.8 0.01% 1 0 2026-05-20T14:01:24.027000 `PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this ro
CVE-2026-5200 8.8 0.04% 1 0 2026-05-20T13:54:54.890000 The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution
CVE-2026-2031 0 0.43% 1 0 2026-05-18T19:32:38.777000 An Improper Access Control vulnerability in several internal API endpoints for G
CVE-2026-6473 8.8 0.07% 1 0 2026-05-18T14:59:59.747000 Integer wraparound in multiple PostgreSQL server features allows an unprivileged
CVE-2026-42897 8.1 6.29% 1 1 2026-05-15T19:35:52.963000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-44578 8.6 5.04% 1 7 template 2026-05-14T18:34:38.530000 Next.js is a React framework for building full-stack web applications. From 13.4
CVE-2026-43284 7.8 1.47% 1 31 2026-05-14T18:33:53 In the Linux kernel, the following vulnerability has been resolved: xfrm: esp:
CVE-2026-40369 7.8 0.02% 2 3 2026-05-14T17:52:50.143000 Untrusted pointer dereference in Windows Kernel allows an authorized attacker to
CVE-2026-0265 0 0.03% 1 2 2026-05-13T18:17:47.830000 An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en
CVE-2026-28910 3.3 0.01% 2 0 2026-05-13T14:02:20.380000 This issue was addressed with improved permissions checking. This issue is fixed
CVE-2026-26980 9.4 63.49% 3 3 template 2026-05-12T13:31:01 ### Impact A SQL injection vulnerability existed in Ghost's Content API that al
CVE-2026-1502 0 0.02% 2 0 2026-05-10T21:16:28.247000 CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.
CVE-2026-34474 7.5 0.05% 1 1 2026-05-07T15:15:06.770000 Sensitive data exposure leading to admin/WLAN credential leak in ZTE ZXHN H298A
CVE-2026-5140 8.8 0.06% 2 0 2026-05-04T14:16:35.190000 Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TU
CVE-2026-4115 3.7 0.01% 2 0 2026-04-30T18:33:16.693000 A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verif
CVE-2026-3102 6.3 0.08% 2 2 2026-04-29T01:00:01.613000 A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affe
CVE-2013-0422 9.8 93.61% 1 0 2026-04-21T19:02:35.430000 Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attacker
CVE-2025-23256 8.7 0.02% 2 0 2026-04-15T00:35:42.020000 NVIDIA BlueField contains a vulnerability in the management interface, where an
CVE-2025-32711 9.3 8.76% 1 2 2026-02-20T17:25:10.630000 Ai command injection in M365 Copilot allows an unauthorized attacker to disclose
CVE-2025-48913 None 0.21% 1 0 2026-01-23T15:14:26 If untrusted users are allowed to configure JMS for Apache CXF, previously they
CVE-2019-15107 9.8 94.46% 2 44 template 2025-11-06T16:50:47.130000 An issue was discovered in Webmin <=1.920. The parameter old in password_change.
CVE-2018-0802 7.8 93.89% 3 7 2025-10-22T00:31:30 Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic
CVE-2024-9643 9.8 19.09% 1 0 template 2025-09-19T19:33:43.980000 The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authenticatio
CVE-2024-12802 9.1 0.07% 3 0 2025-01-09T15:32:58 SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the s
CVE-2021-25740 3.1 0.51% 1 0 2024-11-21T05:55:19.590000 A security issue was discovered with Kubernetes that could enable users to send
CVE-2021-35036 6.5 0.15% 2 1 2023-01-29T05:02:05 A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH
CVE-2026-33843 0 0.00% 2 0 N/A
CVE-2026-41104 0 0.00% 2 0 N/A
CVE-2026-42901 0 0.00% 2 0 N/A
CVE-2026-9256 0 0.00% 6 0 N/A
CVE-2026-46529 0 0.00% 3 1 N/A
CVE-2026-8992 0 0.00% 2 0 N/A
CVE-2026-46300 0 0.00% 2 8 N/A
CVE-2026-25606 0 0.03% 1 0 N/A
CVE-2026-8679 0 0.13% 2 0 N/A
CVE-2026-47243 0 0.00% 1 0 N/A
CVE-2026-0001 0 0.00% 1 2 N/A
CVE-2026-46712 0 0.00% 1 0 N/A
CVE-2026-48115 0 0.00% 1 0 N/A
CVE-2026-46714 0 0.00% 1 0 N/A
CVE-2026-46713 0 0.00% 1 0 N/A
CVE-2026-47746 0 0.00% 1 0 N/A

CVE-2026-9011
(7.5 HIGH)

EPSS: 0.08%

updated 2026-05-22T09:31:35

1 posts

The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.1.65. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for unauthenticated attackers to retrieve the full item content of non-public Dittys — including drafts, pending, sched

thehackerwire@mastodon.social at 2026-05-22T09:59:51.000Z ##

🟠 CVE-2026-9011 - High (7.5)

The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.1.65. This is due to the plugin not properly verifying that a user is authorized to perfor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9018
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-22T05:16:28.067000

1 posts

The Easy Elements for Elementor – Addons & Website Templates plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.4.5 via the `easyel_handle_register()` function. This is due to the `wp_ajax_nopriv_eel_register` AJAX handler iterating the attacker-controlled `custom_meta` POST array and writing every supplied key-value pair to the newly created user's

thehackerwire@mastodon.social at 2026-05-22T06:01:01.000Z ##

🟠 CVE-2026-9018 - High (8.8)

The Easy Elements for Elementor – Addons & Website Templates plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.4.5 via the `easyel_handle_register()` function. This is due to the `wp_ajax_nopriv_e...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4834
(7.5 HIGH)

EPSS: 0.06%

updated 2026-05-22T04:16:26.647000

1 posts

The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'search_key' parameter in all versions up to, and including, 1.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be

thehackerwire@mastodon.social at 2026-05-22T04:59:48.000Z ##

🟠 CVE-2026-4834 - High (7.5)

The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'search_key' parameter in all versions up to, and including, 1.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41054
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-22T04:16:24.770000

1 posts

In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowledgement (`ASCII_NAK`), it **fails to stop execution**. The code proceeds to the `switch` statement, allowing any local unprivileged user to execute privi

thehackerwire@mastodon.social at 2026-05-20T19:01:24.000Z ##

🟠 CVE-2026-41054 - High (7.8)

In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowle...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34911
(7.7 HIGH)

EPSS: 0.01%

updated 2026-05-22T03:30:34

1 posts

A malicious actor with access to the network and low privileges could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to obtain sensitive information.

thehackerwire@mastodon.social at 2026-05-22T04:00:28.000Z ##

🟠 CVE-2026-34911 - High (7.7)

A malicious actor with access to the network and low privileges could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to obtain sensitive information.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33000
(9.1 CRITICAL)

EPSS: 0.06%

updated 2026-05-22T03:30:33

2 posts

A malicious actor with access to the network and high privileges could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

thehackerwire@mastodon.social at 2026-05-22T04:00:38.000Z ##

🔴 CVE-2026-33000 - Critical (9.1)

A malicious actor with access to the network and high privileges could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-22T01:30:31.000Z ##

🚨 CVE-2026-33000 (CVSS 9.1): Ubiquiti UniFi OS Server has a critical improper input validation flaw. High-privileged attackers on the network can execute command injection. Mitigation steps not published yet. Stay tuned: radar.offseq.com/threat/cve-20 #OffSeq #Infosec #UniFiOS

##

CVE-2026-9264(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-05-22T03:30:33

1 posts

A cross-site scripting (XSS) vulnerability in SketchUp 2026's Dynamic Components feature allows remote code execution and local file exfiltration through maliciously crafted SKP files. The vulnerability stems from improper input sanitization in the component options window, enabling attackers to execute arbitrary system commands and read local files without user interaction by exploiting an embedd

offseq@infosec.exchange at 2026-05-22T03:00:23.000Z ##

⚠️ CRITICAL: CVE-2026-9264 in Trimble SketchUp 2026 allows RCE & file exfiltration via malicious SKP files (Dynamic Components, IE11 browser). No patch yet. Avoid untrusted SKP files. More: radar.offseq.com/threat/cve-20 #OffSeq #SketchUp #Vuln #InfoSec

##

CVE-2026-45250
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-22T02:16:34.810000

3 posts

The setcred(2) system call is only available to privileged users. However, before the privilege level of the caller is checked, the user-supplied list of supplementary groups is copied into a fixed-size kernel stack buffer without first validating its length. If the supplied list exceeds the capacity of that buffer, a stack buffer overflow occurs. Because the bounds check on the supplementary g

1 repos

https://github.com/venglin/setcred

thehackerwire@mastodon.social at 2026-05-22T05:00:30.000Z ##

🟠 CVE-2026-45250 - High (7.8)

The setcred(2) system call is only available to privileged users. However, before the privilege level of the caller is checked, the user-supplied list of supplementary groups is copied into a fixed-size kernel stack buffer without first validatin...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

xeiaso.net@bsky.brid.gy at 2026-05-21T15:37:30.627Z ##

"No way to prevent this" say users of only language where this regularly happens https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45250/

"No way to prevent this" say u...

##

cadey@pony.social at 2026-05-21T15:37:30.000Z ##

"No way to prevent this" say users of only language where this regularly happens

xeiaso.net/shitposts/no-way-to

##

CVE-2026-34910
(10.0 CRITICAL)

EPSS: 0.10%

updated 2026-05-22T02:16:34.527000

2 posts

A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

offseq@infosec.exchange at 2026-05-22T04:30:26.000Z ##

🚨 CVE-2026-34910: CRITICAL improper input validation in Ubiquiti UniFi OS Server allows unauthenticated command injection (CVSS 10.0). No patch yet. Restrict network access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #Ubiquiti #Infosec

##

thehackerwire@mastodon.social at 2026-05-22T03:00:30.000Z ##

🔴 CVE-2026-34910 - Critical (10)

A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34909
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-05-22T02:16:34.390000

2 posts

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to access an underlying account.

offseq@infosec.exchange at 2026-05-22T07:30:26.000Z ##

🔒 CRITICAL: CVE-2026-34909 - Path Traversal in Ubiquiti UniFi OS Server (CVSS 10). Allows arbitrary file access & manipulation. No patch yet — restrict access & monitor! Details: radar.offseq.com/threat/cve-20 #OffSeq #UniFi #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-05-22T03:00:20.000Z ##

🔴 CVE-2026-34909 - Critical (10)

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to access an underlying account.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34908
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-05-22T02:16:34.240000

2 posts

A malicious actor with access to the network could exploit an Improper Access Control vulnerability found in UniFi OS devices to make unauthorized changes to the system.

offseq@infosec.exchange at 2026-05-22T06:00:27.000Z ##

🚨 CVE-2026-34908 (CVSS 10.0): Ubiquiti UniFi OS Server has a critical improper access control flaw, allowing unauthenticated remote compromise. No patch yet — restrict network access & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #UniFi #Vuln #BlueTeam

##

thehackerwire@mastodon.social at 2026-05-22T03:00:10.000Z ##

🔴 CVE-2026-34908 - Critical (10)

A malicious actor with access to the network could exploit an Improper Access Control vulnerability found in UniFi OS devices to make unauthorized changes to the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6960
(9.8 CRITICAL)

EPSS: 0.15%

updated 2026-05-21T22:16:48.643000

2 posts

The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'bookingpress_validate_submitted_booking_form_func' function in all versions up to, and including, 5.6. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The vulne

1 repos

https://github.com/xxconi/CVE-2026-6960

thehackerwire@mastodon.social at 2026-05-21T23:00:05.000Z ##

🔴 CVE-2026-6960 - Critical (9.8)

The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'bookingpress_validate_submitted_booking_form_func' function in all versions up to, and including, 5.6. This makes it poss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-21T22:30:12.000Z ##

🔴 CRITICAL: CVE-2026-6960 in BookingPress Appointment Booking Pro (≤5.6) allows unauthenticated file uploads — risk of RCE! Remove signature fields & monitor uploads. No patch yet — stay vigilant. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vulnerability #CyberAlert

##

CVE-2026-46473
(7.5 HIGH)

EPSS: 0.01%

updated 2026-05-21T22:16:48.157000

2 posts

Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand. Secrets were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.

offseq@infosec.exchange at 2026-05-22T00:00:37.000Z ##

🚩 HIGH severity: CVE-2026-46473 in Authen::TOTP (<0.1.1, Perl) — secrets generated with rand are predictable, weakening TOTP security. Upgrade to 0.1.1+ when possible. More: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Perl #MFA #CVE202646473

##

thehackerwire@mastodon.social at 2026-05-21T21:00:43.000Z ##

🟠 CVE-2026-46473 - High (7.5)

Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand.

Secrets were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47102
(8.8 HIGH)

EPSS: 0.05%

updated 2026-05-21T21:16:32.557000

1 posts

LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /user/update endpoint. While the endpoint correctly restricts users to updating only their own account, it does not restrict which fields may be changed. A user who can reach this endpoint can set their role to proxy_admin, gaining full administrative access to LiteLLM including all users, teams, keys, models, and prompt

thehackerwire@mastodon.social at 2026-05-21T22:00:58.000Z ##

🟠 CVE-2026-47102 - High (8.8)

LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /user/update endpoint. While the endpoint correctly restricts users to updating only their own account, it does not restrict which fields may be changed. A user who can r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47101
(8.8 HIGH)

EPSS: 0.05%

updated 2026-05-21T21:16:32.413000

1 posts

LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When generating a key, the allowed_routes field is stored without verifying that the specified routes fall within the user's own permissions. A key created with access to admin-only routes can then be used to reach those routes successfully, bypassing the role-ba

thehackerwire@mastodon.social at 2026-05-21T22:00:45.000Z ##

🟠 CVE-2026-47101 - High (8.8)

LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When generating a key, the allowed_routes field is stored without verifying that the specified routes fall wit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47114
(8.8 HIGH)

EPSS: 0.16%

updated 2026-05-21T21:03:56.320000

1 posts

IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attackers can deliver a crafted URL via a browser that passes unvalidated mpv_options/input-commands parameters into the mpv runtime, causing arbitrary command e

thehackerwire@mastodon.social at 2026-05-21T21:00:33.000Z ##

🟠 CVE-2026-47114 - High (8.8)

IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attacker...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34926
(6.7 MEDIUM)

EPSS: 0.25%

updated 2026-05-21T20:16:14.027000

8 posts

A directory traversal vulnerability in the Apex One (on-premise) server could allow a pre-authenticated local attacker to modify a key table on the server to inject malicious code to deploy to agents on affected installations. This vulnerability is only exploitable on the on-premise version of Apex One and a potential attacker must have access to the Apex One Server and already obtained adminis

1 repos

https://github.com/HORKimhab/CVE-2026-34926

netsecio@mastodon.social at 2026-05-22T19:11:09.000Z ##

📰 CISA KEV Catalog Updated: Actively Exploited Langflow and Trend Micro Flaws Demand Urgent Patching

📢 CISA KEV UPDATE: Two new vulnerabilities affecting Langflow (CVE-2025-34291) & Trend Micro Apex One (CVE-2026-34926) are being actively exploited. Federal agencies mandated to patch. All orgs urged to patch NOW! #CyberSecurity #Vulnerability #Patc...

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/ci

##

AAKL at 2026-05-22T14:58:11.669Z ##

CVE-2026-34926.

Security Week: TrendAI Patches Apex One Zero-Day Exploited in the Wild securityweek.com/trendai-patch @SecurityWeek

##

Analyst207@mastodon.social at 2026-05-22T13:46:24.000Z ##

Trend Micro Discloses Apex One Zero-Day Exploited in Attacks

A critical zero-day vulnerability, CVE-2026-34926, has been discovered in Trend Micro's Apex One on-premises server, allowing pre-authenticated local attackers to inject malicious code - and it's being actively exploited in attacks. Federal agencies have been ordered to patch affected systems ASAP, with a deadline of June 4, 2026.

osintsights.com/trend-micro-di

#ZeroDay #ApexOne #Cve202634926 #TrendMicro #DirectoryTraversal

##

AAKL@infosec.exchange at 2026-05-22T14:58:11.000Z ##

CVE-2026-34926.

Security Week: TrendAI Patches Apex One Zero-Day Exploited in the Wild securityweek.com/trendai-patch @SecurityWeek #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-05-22T09:01:07.000Z ##

Trend Micro Patches Actively Exploited Directory Traversal in Apex One

Trend Micro patched eight vulnerabilities in Apex One and Vision One, including a directory traversal flaw (CVE-2026-34926) that is exploited in the wild to inject malicious code into security agents.

**If you're using Trend Micro Apex One (on-premise) or Vision One, you are under attack. Immediately update to the patched versions (SP1 CP Build 18012 / SP1 Build 17079 for on-premise, or agent build 14.0.20731+ for cloud) since one of its flaws is actively exploited to push malware through your own security tools. Even if the exploited flaw requires authentication, obviously that is not difficult to obtain for hackers.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-05-21T22:00:19.000Z ##

🚨 [CISA-2026:0521] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-34291 (secdb.nttzen.cloud/cve/detail/)
- Name: Langflow Origin Validation Error Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/langflow-ai/langflow ; github.com/langflow-ai/langflo; github.com/langflow-ai/langflo ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34926 (secdb.nttzen.cloud/cve/detail/)
- Name: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Trend Micro
- Product: Apex One
- Notes: success.trendmicro.com/en-US/s ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260521 #cisa20260521 #cve_2025_34291 #cve_2026_34926 #cve202534291 #cve202634926

##

cisakevtracker@mastodon.social at 2026-05-21T20:01:09.000Z ##

CVE ID: CVE-2026-34926
Vendor: Trend Micro
Product: Apex One
Date Added: 2026-05-21
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

cR0w@infosec.exchange at 2026-05-21T18:58:09.000Z ##

EITW ../ in Trend Micro Apex One. :brdAlert:

success.trendmicro.com/en-US/s

CVE-2026-34926

TrendAI has released updates to Apex One (on-premise), Apex One as a Service and Vision One - Standard Endpoint Protection (SEP) to resolve multiple vulnerabilities.

##

CVE-2025-34291
(8.8 HIGH)

EPSS: 31.20%

updated 2026-05-21T20:16:13.520000

4 posts

Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the ref

Nuclei template

2 repos

https://github.com/ridhinva/CVE-2025-34291-Langflow-Scanner

https://github.com/amnnrth/CVE-2025-34291_cors_security_scanner

netsecio@mastodon.social at 2026-05-22T19:11:09.000Z ##

📰 CISA KEV Catalog Updated: Actively Exploited Langflow and Trend Micro Flaws Demand Urgent Patching

📢 CISA KEV UPDATE: Two new vulnerabilities affecting Langflow (CVE-2025-34291) & Trend Micro Apex One (CVE-2026-34926) are being actively exploited. Federal agencies mandated to patch. All orgs urged to patch NOW! #CyberSecurity #Vulnerability #Patc...

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/ci

##

Matchbook3469@mastodon.social at 2026-05-22T17:52:32.000Z ##

🔵 THREAT INTELLIGENCE

CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV

Vulnerability | CRITICAL
CVEs: CVE-2025-34291

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to...

Full analysis:
yazoul.net/news/article/cisa-a

#ThreatIntel #SecurityNews #CyberNews

##

secdb@infosec.exchange at 2026-05-21T22:00:19.000Z ##

🚨 [CISA-2026:0521] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2025-34291 (secdb.nttzen.cloud/cve/detail/)
- Name: Langflow Origin Validation Error Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: github.com/langflow-ai/langflow ; github.com/langflow-ai/langflo; github.com/langflow-ai/langflo ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-34926 (secdb.nttzen.cloud/cve/detail/)
- Name: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Trend Micro
- Product: Apex One
- Notes: success.trendmicro.com/en-US/s ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260521 #cisa20260521 #cve_2025_34291 #cve_2026_34926 #cve202534291 #cve202634926

##

cisakevtracker@mastodon.social at 2026-05-21T20:00:52.000Z ##

CVE ID: CVE-2025-34291
Vendor: Langflow
Product: Langflow
Date Added: 2026-05-21
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2026-24216
(7.8 HIGH)

EPSS: 0.06%

updated 2026-05-21T20:08:32.900000

1 posts

NVIDIA BioNemo for Linux contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-05-21T04:00:22.000Z ##

🟠 CVE-2026-24216 - High (7.8)

NVIDIA BioNemo for Linux contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24217
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-21T20:08:20.257000

2 posts

NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause a path traversal by loading a malicious file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.

thehackerwire@mastodon.social at 2026-05-23T02:00:03.000Z ##

🟠 CVE-2026-24217 - High (8.8)

NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause a path traversal by loading a malicious file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-23T02:00:03.000Z ##

🟠 CVE-2026-24217 - High (8.8)

NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause a path traversal by loading a malicious file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and d...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-4858
(8.0 HIGH)

EPSS: 0.04%

updated 2026-05-21T19:43:31.373000

1 posts

Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.x <= 10.11.14 fail to check integration URL for path traversal which allows an malicious authenticated user to call an arbitrary API via system admin Mattermost auth token using via path traversal in integration action URL.. Mattermost Advisory ID: MMSA-2026-00640

thehackerwire@mastodon.social at 2026-05-21T12:00:29.000Z ##

🟠 CVE-2026-4858 - High (8)

Mattermost versions 11.6.x &lt;= 11.6.0, 11.5.x &lt;= 11.5.3, 11.4.x &lt;= 11.4.4, 10.11.x &lt;= 10.11.14 fail to check integration URL for path traversal which allows an malicious authenticated user to call an arbitrary API via system admin Matt...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-20239
(7.5 HIGH)

EPSS: 0.01%

updated 2026-05-21T19:42:21.353000

1 posts

In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a role that has access to the `_internal` index could view session cookies and response bodies that contain sensitive data.

thehackerwire@mastodon.social at 2026-05-20T19:00:24.000Z ##

🟠 CVE-2026-20239 - High (7.5)

In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a role that has access to the `_internal` index could view session cookies and r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-48207
(9.8 CRITICAL)

EPSS: 0.04%

updated 2026-05-21T19:16:53.700000

2 posts

Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deserializes attacker-controlled data using PyFory Python-native mode with strict mode disabled and relies on DeserializationPolicy to restrict unsafe classes,

offseq@infosec.exchange at 2026-05-21T21:00:11.000Z ##

🚨 CRITICAL: CVE-2026-48207 in Apache Fory <1.0.0 — Deserialization flaw in PyFory ReduceSerializer bypasses DeserializationPolicy, risking RCE if strict mode is off. Upgrade to 1.0.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #CVE202648207 #Vulnerability #ApacheFory

##

thehackerwire@mastodon.social at 2026-05-21T20:00:29.000Z ##

🔴 CVE-2026-48207 - Critical (9.8)

Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deseri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42945
(8.1 HIGH)

EPSS: 1.00%

updated 2026-05-21T19:16:53.100000

1 posts

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond it

29 repos

https://github.com/realityone/cve-2026-42945-scan

https://github.com/imSre9/CVE-2026-42945

https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC

https://github.com/MateusVerass/nGixshell

https://github.com/soksofos/wazuh-nginx-cve-2026-42945-sca-lab

https://github.com/byezero/nginx-cve-2026-42945-check

https://github.com/0xBlackash/CVE-2026-42945

https://github.com/RedCrazyGhost/CVE-2026-42945

https://github.com/friparia/NGINX_RIFT_SCAN_CVE_2026_42945

https://github.com/hnytgl/cve-2026-42945

https://github.com/fkj-src/fix_nginx_cve_2026_42945

https://github.com/forxiucn/nginx-cve-2026-42945-poc

https://github.com/iammerrida-source/nginx-rift-detect

https://github.com/chenqin231/CVE-2026-42945

https://github.com/tal7aouy/nginx-cve-2026-42945

https://github.com/gagaltotal/CVE-2026-42945-NGINX-Rift-Toolkit

https://github.com/oseasfr/Scanner_CVE_2026-42945

https://github.com/dinosn/cve-2026-42945-nginx32-lab

https://github.com/cipherspy/CVE-2026-42945-POC

https://github.com/Renison-Gohel/CVE-2026-42945-NGINX-Rift

https://github.com/DepthFirstDisclosures/Nginx-Rift

https://github.com/BarAppTeam/nginx-cve-fix

https://github.com/yusufdalbudak/CVE-2026-42945

https://github.com/sibersan/web-server-audit_CVE-2026-42945

https://github.com/ChamsBouzaiene/ai-vuln-rediscovery-nginx-cve-2026-42945

https://github.com/jelasin/CVE-2026-42945

https://github.com/nanwinata/nginxrift-CVE-2026-42945

https://github.com/F2u0a0d3/CVE-2026-42945-nginx-rift-poc

https://github.com/rheodev/CVE-2026-42945

cedric@fosstodon.org at 2026-05-21T13:18:21.000Z ##

@gzobra @adulau @firstdotorg

Thank you for these kind words!

If you are interested we started to deploy in production the algorithms presented during FIRST CTI in Munich. An example here:

vulnerability.circl.lu/vuln/cv

Click on the "Forecast" tab.

Have a nice day!

##

CVE-2026-28764
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T19:16:52.123000

1 posts

MediaArea MediaInfoLib LXF element parsing heap-based buffer overflow vulnerability

thehackerwire@mastodon.social at 2026-05-21T12:00:07.000Z ##

🟠 CVE-2026-28764 - High (7.8)

MediaArea MediaInfoLib LXF element parsing heap-based buffer overflow vulnerability

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39531
(9.3 CRITICAL)

EPSS: 0.03%

updated 2026-05-21T19:10:36.607000

1 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wp Directory Kit WP Directory Kit allows Blind SQL Injection. This issue affects WP Directory Kit: from n/a through 1.5.0.

thehackerwire@mastodon.social at 2026-05-21T17:00:10.000Z ##

🔴 CVE-2026-39531 - Critical (9.3)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wp Directory Kit WP Directory Kit allows Blind SQL Injection.

This issue affects WP Directory Kit: from n/a through 1.5.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9089
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T19:10:21.527000

1 posts

The ConnectWise Automate™ Agent does not fully verify the authenticity of components obtained during plugin loading and self-update operations. This issue is addressed in Automate 2026.5.

thehackerwire@mastodon.social at 2026-05-21T17:00:20.000Z ##

🟠 CVE-2026-9089 - High (8.8)

The ConnectWise Automate™ Agent does not fully verify the authenticity of components obtained during plugin loading and self-update operations. This issue is addressed in Automate 2026.5.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-48241
(8.1 HIGH)

EPSS: 0.05%

updated 2026-05-21T19:10:12.323000

2 posts

Open ISES Tickets before 3.44.2 contains hardcoded MySQL database credentials in loader.php (a public-facing database utility) that are committed to the source repository. Any actor with access to the public source tree (or an unauthenticated attacker with read access to the file on a deployed installation) can read the username, password, and database name and use them to connect to the database

offseq@infosec.exchange at 2026-05-21T19:30:18.000Z ##

🚨 CRITICAL: Open ISES Tickets <3.44.2 has hardcoded MySQL creds in loader.php (CVE-2026-48241), exposing DBs to attack if reachable. Restrict file & DB access, rotate creds now. No official fix yet. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #MySQL #AppSec

##

thehackerwire@mastodon.social at 2026-05-21T18:59:49.000Z ##

🟠 CVE-2026-48241 - High (8.1)

Open ISES Tickets before 3.44.2 contains hardcoded MySQL database credentials in loader.php (a public-facing database utility) that are committed to the source repository. Any actor with access to the public source tree (or an unauthenticated atta...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-48235
(8.2 HIGH)

EPSS: 0.03%

updated 2026-05-21T19:10:12.323000

1 posts

Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/remotes.inc.php where latitude, longitude, callsign, mph, altitude, and timestamp values parsed from external GPS tracking service XML/JSON responses (InstaMapper and Google Latitude integration) are concatenated into UPDATE and INSERT statements without sanitization. An attacker able to compromise or impersonate the re

thehackerwire@mastodon.social at 2026-05-21T19:00:04.000Z ##

🟠 CVE-2026-48235 - High (8.2)

Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/remotes.inc.php where latitude, longitude, callsign, mph, altitude, and timestamp values parsed from external GPS tracking service XML/JSON responses (InstaMapper and G...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-48242
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-21T19:10:12.323000

1 posts

Open ISES Tickets before 3.44.2 contains hardcoded MySQL database connection credentials (host, username, password, database name) in import_mdb.php. The credentials are embedded in source code committed to the public repository, allowing any reader of the source to obtain valid configuration values that may match deployed installations.

offseq@infosec.exchange at 2026-05-21T18:00:10.000Z ##

🚨 CRITICAL: CVE-2026-48242 in Open ISES Tickets <3.44.2 — Hardcoded MySQL creds in public code could enable unauthorized DB access. No patch yet. Rotate creds & review deployments immediately. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #InfoSec #CVE202648242

##

CVE-2026-45251
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T19:01:22.710000

1 posts

A file descriptor can be closed while a thread is blocked in a poll(2) or select(2) call waiting for that descriptor. Because the blocked thread does not hold a reference to the underlying object, this closure may result in the object being freed while the thread remains blocked. In this situation, the kernel must remove the blocked thread from the per-object wait queue prior to freeing the obje

thehackerwire@mastodon.social at 2026-05-22T04:01:16.000Z ##

🟠 CVE-2026-45251 - High (7.8)

A file descriptor can be closed while a thread is blocked in a poll(2) or select(2) call waiting for that descriptor. Because the blocked thread does not hold a reference to the underlying object, this closure may result in the object being freed...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45253
(8.4 HIGH)

EPSS: 0.01%

updated 2026-05-21T19:01:01.833000

1 posts

ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target process has no special privileges. The missing validation allows an unprivileged local user to escalate privileges, potentially gaining full control of the

thehackerwire@mastodon.social at 2026-05-22T04:01:26.000Z ##

🟠 CVE-2026-45253 - High (8.4)

ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target proc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45255
(7.5 HIGH)

EPSS: 0.01%

updated 2026-05-21T19:00:34.217000

1 posts

When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, they build up a list of network names and use bsddialog(1) to prompt the user to select a network. This is implemented using a shell script, and the code which handled network names was not careful to prevent expansion by the shell. As a result, a suitably crafted network name can be used to execute commands via a subsh

thehackerwire@mastodon.social at 2026-05-22T04:01:35.000Z ##

🟠 CVE-2026-45255 - High (7.5)

When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, they build up a list of network names and use bsddialog(1) to prompt the user to select a network. This is implemented using a shell script, and the code which handled n...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8632
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T18:58:59.447000

2 posts

A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via operating system command injection.

thehackerwire@mastodon.social at 2026-05-22T22:00:12.000Z ##

🟠 CVE-2026-8632 - High (7.8)

A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via operating system command injection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T22:00:12.000Z ##

🟠 CVE-2026-8632 - High (7.8)

A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via operating system command injection.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8631
(9.8 CRITICAL)

EPSS: 0.02%

updated 2026-05-21T18:58:41.297000

3 posts

A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via an integer overflow in the hpcups processing path when handling crafted print data.

thehackerwire@mastodon.social at 2026-05-22T22:00:02.000Z ##

🔴 CVE-2026-8631 - Critical (9.8)

A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via an integer overflow in the hpcups processing ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T22:00:02.000Z ##

🔴 CVE-2026-8631 - Critical (9.8)

A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via an integer overflow in the hpcups processing ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-21T00:00:34.000Z ##

🚨 CVE-2026-8631: Critical heap buffer overflow in HP Linux Imaging & Printing Software (CVSS 9.3). Remote, unauthenticated code execution possible. No patch yet — restrict print service access & monitor jobs. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #HP

##

CVE-2026-47783
(8.1 HIGH)

EPSS: 0.07%

updated 2026-05-21T17:06:40.670000

1 posts

In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.

thehackerwire@mastodon.social at 2026-05-20T20:00:17.000Z ##

🟠 CVE-2026-47783 - High (8.1)

In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47784
(8.1 HIGH)

EPSS: 0.07%

updated 2026-05-21T17:06:33.240000

1 posts

In memcached before 1.6.42, password data for SASL password database authentication has a timing side channel because memcmp is used by sasl_server_userdb_checkpass.

thehackerwire@mastodon.social at 2026-05-20T20:00:28.000Z ##

🟠 CVE-2026-47784 - High (8.1)

In memcached before 1.6.42, password data for SASL password database authentication has a timing side channel because memcmp is used by sasl_server_userdb_checkpass.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44925
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-21T16:57:27.350000

2 posts

Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations Manager (VIOM) allows an attacker to force the user with an active session into clicking a malicious HTML link, which triggers unintended modifications on VIOM web application without the user's knowledge.

thehackerwire@mastodon.social at 2026-05-23T02:00:26.000Z ##

🟠 CVE-2026-44925 - High (8.8)

Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations Manager (VIOM) allows an attacker to force the user with an active session into clicking a malicious HTML link, which triggers unintended modifications on VIOM web app...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-23T02:00:26.000Z ##

🟠 CVE-2026-44925 - High (8.8)

Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations Manager (VIOM) allows an attacker to force the user with an active session into clicking a malicious HTML link, which triggers unintended modifications on VIOM web app...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9111
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:56:46.883000

1 posts

Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-21T03:00:21.000Z ##

🟠 CVE-2026-9111 - High (8.8)

Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9112
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:56:43.173000

1 posts

Use after free in GPU in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-21T02:01:00.000Z ##

🟠 CVE-2026-9112 - High (8.8)

Use after free in GPU in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9114
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:56:26.853000

1 posts

Use after free in QUIC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-21T03:00:11.000Z ##

🟠 CVE-2026-9114 - High (8.8)

Use after free in QUIC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9117
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:45:44.400000

1 posts

Type Confusion in GFX in Google Chrome on Linux, ChromeOS prior to 148.0.7778.179 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-20T22:01:22.000Z ##

🟠 CVE-2026-9117 - High (7.5)

Type Confusion in GFX in Google Chrome on Linux, ChromeOS prior to 148.0.7778.179 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9118
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:45:19.020000

1 posts

Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-20T22:01:33.000Z ##

🟠 CVE-2026-9118 - High (8.8)

Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9119
(8.8 HIGH)

EPSS: 0.02%

updated 2026-05-21T16:44:34.153000

1 posts

Heap buffer overflow in WebRTC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-21T02:00:39.000Z ##

🟠 CVE-2026-9119 - High (8.8)

Heap buffer overflow in WebRTC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9120
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:41:34.767000

1 posts

Use after free in WebRTC in Google Chrome prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-21T02:00:49.000Z ##

🟠 CVE-2026-9120 - High (8.8)

Use after free in WebRTC in Google Chrome prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9121
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:35:19.957000

1 posts

Out of bounds read in GPU in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-20T22:01:12.000Z ##

🟠 CVE-2026-9121 - High (8.8)

Out of bounds read in GPU in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9123
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-21T16:31:56.420000

1 posts

Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS prior to 148.0.7778.179 allowed a local attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-20T22:00:01.000Z ##

🟠 CVE-2026-9123 - High (7.5)

Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS prior to 148.0.7778.179 allowed a local attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9126
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:23:01.260000

1 posts

Use after free in DOM in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-20T22:00:11.000Z ##

🟠 CVE-2026-9126 - High (8.8)

Use after free in DOM in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43494
(0 None)

EPSS: 0.03%

updated 2026-05-21T16:16:23.157000

2 posts

In the Linux kernel, the following vulnerability has been resolved: net/rds: reset op_nents when zerocopy page pin fails When iov_iter_get_pages2() fails in rds_message_zcopy_from_user(), the pinned pages are released with put_page(), and rm->data.op_mmp_znotifier is cleared. But we fail to properly clear rm->data.op_nents. Later when rds_message_purge() is called from rds_sendmsg() the cleanu

2 repos

https://github.com/Koshmare-Blossom/PinTheft-go

https://github.com/0xBlackash/CVE-2026-43494

linux@activitypub.awakari.com at 2026-05-20T14:27:32.000Z ## Daniel Baumann: Debian: Linux Vulnerability Mitigation (PinTheft) Following the series of various Linux exploits of the last three weeks, the bug of today is PinTheft [ CVE-2026-43494 ] which is lo...


Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-20T14:27:32.000Z ## Daniel Baumann: Debian: Linux Vulnerability Mitigation (PinTheft) Following the series of various Linux exploits of the last three weeks, the bug of today is PinTheft [ CVE-2026-43494 ] which is lo...


Origin | Interest | Match ##

CVE-2026-47373
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-21T16:04:53.813000

2 posts

Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks. These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.

thehackerwire@mastodon.social at 2026-05-22T22:00:24.000Z ##

🟠 CVE-2026-47373 - High (7.5)

Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks.

These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T22:00:24.000Z ##

🟠 CVE-2026-47373 - High (7.5)

Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks.

These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23734
(0 None)

EPSS: 0.04%

updated 2026-05-21T16:04:53.813000

1 posts

XWiki Platform is a generic wiki platform. Versions prior to 18.1.0-rc-1, 17.10.3, 17.4.9, and 16.10.17 allow access to read configuration files by using URLs such as http://localhost:8080/bin/ssx/Main/WebHome?resource=/../../WEB-INF/xwiki.cfg&minify=false, leading to Path Traversal. The vulnerability is can be exploited via resources parameter the ssx and jsx endpoints by using leading slashes. T

offseq@infosec.exchange at 2026-05-21T10:30:28.000Z ##

⚠️ CRITICAL: CVE-2026-23734 in XWiki Platform (xwiki-commons) allows unauthenticated path traversal — attackers can read config files via crafted 'resource' parameters. Patch to 18.1.0-rc-1, 17.10.3, 17.4.9, or 16.10.17+ now! radar.offseq.com/threat/cve-20 #OffSeq #xwiki #vuln

##

CVE-2026-33137
(0 None)

EPSS: 0.04%

updated 2026-05-21T16:04:53.813000

1 posts

XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. XWiki Platform is a generic wiki platform. In versions prior to 18.1.0-rc-1, 17.10.3, 17.4.9, and 16.10.17, the POST /wikis/{wikiName} API executes a XAR import without performing any authentication or authorization checks, allowing an unauthenticated attacker to create or update documents in t

offseq@infosec.exchange at 2026-05-21T09:00:29.000Z ##

🚨 CRITICAL: CVE-2026-33137 impacts XWiki Platform (<16.10.17, <17.4.9, <17.10.3, <18.1.0-rc-1). Unauthenticated users can create/modify documents via missing auth on POST /wikis/{wikiName}. Patch now! radar.offseq.com/threat/cve-20 #OffSeq #XWiki #CVE #Infosec

##

CVE-2026-40092
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-21T16:04:53.813000

1 posts

nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation. In versions 1.3.0 and below, a malicious network peer can crash any Nimiq full node by publishing a crafted Kademlia DHT record. The maliciously crafted record would contain a TaggedSigned<ValidatorRecord, KeyPair> with a signature field whose byte length is not exactly 64 in order to cause a crash. When the victim

thehackerwire@mastodon.social at 2026-05-20T22:59:49.000Z ##

🟠 CVE-2026-40092 - High (7.5)

nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation. In versions 1.3.0 and below, a malicious network peer can crash any Nimiq full node by publishing a crafted Kademlia DHT record. The maliciously crafted record wou...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0393
(0 None)

EPSS: 0.05%

updated 2026-05-21T16:04:33.830000

1 posts

The affected product may expose credentials remotely between low privileged visualization users during concurrent login operations due to insufficient isolation of authentication data. The vulnerability affects only login operations within an active visualization session.

certvde@infosec.exchange at 2026-05-21T08:04:33.000Z ##

#OT #Advisory VDE-2026-052
CODESYS Visualization - Insufficiently Protected Credentials

A vulnerability in the CODESYS Visualization login dialog has been identified. During logins within the CODESYS Visualization, authentication data may not be sufficiently isolated when multiple users perform login operations concurrently.
#CVE CVE-2026-0393

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2025-71213
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:34:18

1 posts

An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-22T02:00:14.000Z ##

🟠 CVE-2025-71213 - High (7.8)

An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5118
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-05-21T15:34:17

3 posts

The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without validating it against the form's configured default_user_role setting. This makes it possible for unauthenticated attackers to create administrator accounts by

4 repos

https://github.com/puj790201-lab/CVE-2026-5118

https://github.com/Jenderal92/CVE-2026-5118

https://github.com/zycoder0day/CVE-2026-5118

https://github.com/Yucaerin/CVE-2026-5118

thehackerwire@mastodon.social at 2026-05-22T02:00:24.000Z ##

🔴 CVE-2026-5118 - Critical (9.8)

The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without valida...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-21T16:30:10.000Z ##

🔥 CRITICAL vuln in Divi Form Builder (≤5.1.2) — improper privilege management lets attackers create admin accounts via role parameter abuse. Restrict registration & watch for patches! CVE-2026-5118 radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20265118 #Infosec

##

offseq@infosec.exchange at 2026-05-21T14:30:11.000Z ##

🚨 CRITICAL: CVE-2026-5118 in Divi Form Builder (≤5.1.2) lets unauth'd users gain admin privileges via unvalidated 'role' parameter. Disable registration & monitor for patches! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #PrivilegeEscalation #Vuln

##

CVE-2025-71210
(9.8 CRITICAL)

EPSS: 0.42%

updated 2026-05-21T15:34:17

2 posts

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. Please note: although this vulnerability carries a technical critical CVSS rating, this was reported via responsible disclosure via a researcher through the Zero Day Initiative. The SaaS versions of the product have already been miti

thehackerwire@mastodon.social at 2026-05-22T01:00:29.000Z ##

🔴 CVE-2025-71211 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-22T01:00:18.000Z ##

🔴 CVE-2025-71210 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations.

Please note: although this vulnerability carries a technical critical CVSS rat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71211
(9.8 CRITICAL)

EPSS: 0.43%

updated 2026-05-21T15:34:17

1 posts

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different executable. Please note: although this vulnerability carries a technical critical CVSS rating, this was reported via responsible disclosure via a resea

thehackerwire@mastodon.social at 2026-05-22T01:00:29.000Z ##

🔴 CVE-2025-71211 - Critical (9.8)

A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-13479
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-21T15:34:17

1 posts

Authorization bypass through User-Controlled key vulnerability in PosCube Hardware Software and Consulting Ltd. QR Menu allows Exploitation of Trusted Identifiers. This issue affects QR Menu: through 21052026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

thehackerwire@mastodon.social at 2026-05-22T01:00:07.000Z ##

🟠 CVE-2025-13479 - High (7.5)

Authorization bypass through User-Controlled key vulnerability in PosCube Hardware Software and Consulting Ltd. QR Menu allows Exploitation of Trusted Identifiers.

This issue affects QR Menu: through 21052026. NOTE: The vendor was contacted earl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-47372
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-05-21T15:34:07

1 posts

Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts. These versions use the built-in rand function, which is predictable and unsuitable for cryptography.

thehackerwire@mastodon.social at 2026-05-22T09:00:15.000Z ##

🔴 CVE-2026-47372 - Critical (9.1)

Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts.

These versions use the built-in rand function, which is predictable and unsuitable for cryptography.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42001
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:27:51.530000

1 posts

Insufficient Validation of Autoprimary SOA Queries

CVE-2026-24218
(8.1 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:26:35.653000

2 posts

NVIDIA DGX OS contains a vulnerability in the factory provisioning process, where the cloning of a base image causes identical SSH host keys to be deployed across multiple systems. The sharing of cryptographic identifiers across all similarly provisioned systems enables host impersonation or attacker-in-the-middle attacks. A successful exploit of this vulnerability might lead to code execution, d

thehackerwire@mastodon.social at 2026-05-23T02:00:14.000Z ##

🟠 CVE-2026-24218 - High (8.1)

NVIDIA DGX OS contains a vulnerability in the factory provisioning process, where the cloning of a base image causes identical SSH host keys to be deployed across multiple systems. The sharing of cryptographic identifiers across all similarly pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-23T02:00:14.000Z ##

🟠 CVE-2026-24218 - High (8.1)

NVIDIA DGX OS contains a vulnerability in the factory provisioning process, where the cloning of a base image causes identical SSH host keys to be deployed across multiple systems. The sharing of cryptographic identifiers across all similarly pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5433
(9.1 CRITICAL)

EPSS: 0.26%

updated 2026-05-21T15:26:35.653000

1 posts

Honeywell Control Network Module (CNM) contains command injection vulnerability in the web interface. An attacker could exploit this vulnerability via command delimiters, potentially resulting in Remote Code Execution (RCE).

thehackerwire@mastodon.social at 2026-05-22T05:00:38.000Z ##

🔴 CVE-2026-5433 - Critical (9.1)

Honeywell Control
Network Module (CNM) contains command injection vulnerability
in the web interface. An attacker could exploit this vulnerability via command
delimiters, potentially resulting in Remote Code Execution (RCE).

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2740
(8.4 HIGH)

EPSS: 1.25%

updated 2026-05-21T15:26:35.653000

1 posts

Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.

thehackerwire@mastodon.social at 2026-05-22T00:00:30.000Z ##

🟠 CVE-2026-2740 - High (8.4)

Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-24188
(8.2 HIGH)

EPSS: 0.04%

updated 2026-05-21T15:26:35.653000

1 posts

NVIDIA TensorRT contains a vulnerability where an attacker could cause an out-of-bounds write. A successful exploit of this vulnerability might lead to data tampering.

thehackerwire@mastodon.social at 2026-05-21T04:00:12.000Z ##

🟠 CVE-2026-24188 - High (8.2)

NVIDIA TensorRT contains a vulnerability where an attacker could cause an out-of-bounds write. A successful exploit of this vulnerability might lead to data tampering.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9082
(6.5 MEDIUM)

EPSS: 0.02%

updated 2026-05-21T15:24:25.330000

17 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Drupal Drupal core allows SQL Injection. This issue affects Drupal core: from 8.9.0 before 10.4.10, from 10.5.0 before 10.5.10, from 10.6.0 before 10.6.9, from 11.0.0 before 11.1.10, from 11.2.0 before 11.2.12, from 11.3.0 before 11.3.10.

Nuclei template

6 repos

https://github.com/HORKimhab/CVE-2026-9082

https://github.com/7h30th3r0n3/CVE-2026-9082-Drupal-PoC

https://github.com/0xBlackash/CVE-2026-9082

https://github.com/ridhinva/CVE-2026-9082

https://github.com/lysophavin18/cve-2026-9082

https://github.com/ywh-jfellus/CVE-2026-9082

Matchbook3469@mastodon.social at 2026-05-22T23:43:28.000Z ##

🟡 New security advisory:

CVE-2026-9082 affects multiple systems.

• Impact: Security weakness that could be exploited
• Risk: Potential for targeted attacks
• Mitigation: Schedule patching in your next maintenance window

Full breakdown:
yazoul.net/advisory/cve/cve-20

#Cybersecurity #PatchNow #InfoSecCommunity

##

bugxhunter at 2026-05-22T22:00:45.363Z ##

🔍 Drupal Core SQL Injection Vulnerability Added to KEV Catalog

📝 Drupal Core CVE-2026-9082 exploited, poses significant risk to federal networks.

cisa.gov/news-events/alerts/20

📰 Alerts

##

secdb at 2026-05-22T20:00:14.543Z ##

🚨 [CISA-2026:0522] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-9082 (secdb.nttzen.cloud/cve/detail/)
- Name: Drupal Core SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Drupal
- Product: Core
- Notes: drupal.org/sa-core-2026-004 ; nvd.nist.gov/vuln/detail/CVE-2

##

cisakevtracker@mastodon.social at 2026-05-22T19:00:55.000Z ##

CVE ID: CVE-2026-9082
Vendor: Drupal
Product: Core
Date Added: 2026-05-22
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

_r_netsec at 2026-05-22T14:28:05.147Z ##

Keys to the Kingdom: Anonymous SQL Injection in Drupal Core (CVE-2026-9082) slcyber.io/research-center/key

##

Analyst207@mastodon.social at 2026-05-22T13:16:29.000Z ##

Drupal Sites Targeted in SQL Injection Attacks

Drupal sites are under attack as SQL injection exploits are now being detected in the wild, taking advantage of a vulnerability that can be triggered without authentication. This critical flaw, CVE-2026-9082, allows attackers to execute arbitrary SQL and potentially run remote code, putting sites that use PostgreSQL at risk.

osintsights.com/drupal-sites-t

#SqlInjection #Drupal #Cve20269082 #EmergingThreats #ArbitraryCodeExecution

##

bearstech@mamot.fr at 2026-05-22T12:57:49.000Z ##

Faille Drupal critique : injection SQL via PostgreSQL (CVE-2026-9082)

👉 cert.ssi.gouv.fr/avis/CERTFR-2

##

bugxhunter@infosec.exchange at 2026-05-22T22:00:45.000Z ##

🔍 Drupal Core SQL Injection Vulnerability Added to KEV Catalog

📝 Drupal Core CVE-2026-9082 exploited, poses significant risk to federal networks.

cisa.gov/news-events/alerts/20

📰 Alerts

#CVE #ZeroDay

##

secdb@infosec.exchange at 2026-05-22T20:00:14.000Z ##

🚨 [CISA-2026:0522] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-9082 (secdb.nttzen.cloud/cve/detail/)
- Name: Drupal Core SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Drupal
- Product: Core
- Notes: drupal.org/sa-core-2026-004 ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260522 #cisa20260522 #cve_2026_9082 #cve20269082

##

cisakevtracker@mastodon.social at 2026-05-22T19:00:55.000Z ##

CVE ID: CVE-2026-9082
Vendor: Drupal
Product: Core
Date Added: 2026-05-22
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

_r_netsec@infosec.exchange at 2026-05-22T14:28:05.000Z ##

Keys to the Kingdom: Anonymous SQL Injection in Drupal Core (CVE-2026-9082) slcyber.io/research-center/key

##

Analyst207@mastodon.social at 2026-05-22T13:16:29.000Z ##

Drupal Sites Targeted in SQL Injection Attacks

Drupal sites are under attack as SQL injection exploits are now being detected in the wild, taking advantage of a vulnerability that can be triggered without authentication. This critical flaw, CVE-2026-9082, allows attackers to execute arbitrary SQL and potentially run remote code, putting sites that use PostgreSQL at risk.

osintsights.com/drupal-sites-t

#SqlInjection #Drupal #Cve20269082 #EmergingThreats #ArbitraryCodeExecution

##

bearstech@mamot.fr at 2026-05-22T12:57:49.000Z ##

Faille Drupal critique : injection SQL via PostgreSQL (CVE-2026-9082)

👉 cert.ssi.gouv.fr/avis/CERTFR-2

##

tomshw@mastodon.social at 2026-05-21T14:10:10.000Z ##

🛡️ Drupal corregge una falla SQL: aggiornare subito è la miglior difesa, perché gli exploit potrebbero arrivare a breve. #Drupal #CyberSecurity

🔗 tomshw.it/hardware/drupal-cve-

##

offseq@infosec.exchange at 2026-05-21T11:30:26.000Z ##

🚨 Drupal sites using PostgreSQL face a highly critical SQL injection vuln (CVE-2026-9082), risking RCE & data exposure. Patch versions 11.3, 11.2, 10.6, 10.5.x ASAP. Update Symfony & Twig too. No active exploitation yet. radar.offseq.com/threat/drupal #OffSeq #Drupal #SQLInjection #Infosec

##

benzogaga33@mamot.fr at 2026-05-21T09:40:02.000Z ##

Drupal – CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web it-connect.fr/drupal-cve-2026- #ActuCybersécurité #Cybersécurité #Vulnérabilité #Web

##

decio@infosec.exchange at 2026-05-21T06:38:35.000Z ##

Si votre CMS est un #Drupal, ou si vous connaissez quelqu’un qui administre un site Drupal : c’est le moment de vérifier la version.

La faille CVE-2026-9082 touche Drupal Core avec base PostgreSQL : injection SQL critique, exploitable sans compte, pouvant mener à fuite de données, élévation de privilèges voire RCE selon le contexte.

À corriger en priorité :
Drupal 10.5 → 10.5.10
Drupal 10.6 → 10.6.9
Drupal 11.2 → 11.2.12
Drupal 11.3 → 11.3.10

MySQL/MariaDB ne semblent pas concernés par cette SQLi, mais les mises à jour incluent aussi Symfony/Twig : patch recommandé pour tout le monde.
👇
drupal.org/sa-core-2026-004

"Drupal – CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web"
👇
it-connect.fr/drupal-cve-2026-

🔍 (à noter la diff entre estimation LLM VLAI et attribution CVSS officielle en Medium)
👇
vulnerability.circl.lu/vuln/CV

💬
⬇️
infosec.pub/

#CyberVeille #CVE_2026_9082

##

CVE-2026-9157
(8.4 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:24:25.330000

1 posts

Improper input validation, Unrestricted upload of file with dangerous type vulnerability in Gmission Web Fax allows Remote Code Inclusion. This issue affects Web Fax: from 3.0 before 3.1.

thehackerwire@mastodon.social at 2026-05-22T05:00:49.000Z ##

🟠 CVE-2026-9157 - High (8.4)

Improper input validation, Unrestricted upload of file with dangerous type vulnerability in Gmission Web Fax allows Remote Code Inclusion.

This issue affects Web Fax: from 3.0 before 3.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39405
(0 None)

EPSS: 0.05%

updated 2026-05-21T15:24:25.330000

1 posts

Frappe Learning Management System (LMS) is a learning system that helps users structure their content. In versions 2.50.0 and below, a user with course editing role could upload a SCORM ZIP package to write files outside the intended directory. This issue has been resolved in version 2.50.1.

offseq@infosec.exchange at 2026-05-21T04:30:25.000Z ##

⚠️ CRITICAL: Frappe LMS <2.50.1 is vulnerable (CVE-2026-39405, CVSS 9.4). Path traversal lets course editors write files outside restricted dirs via SCORM ZIP upload. Upgrade to 2.50.1 ASAP! radar.offseq.com/threat/cve-20 #OffSeq #infosec #vuln #FrappeLMS

##

CVE-2026-39310
(8.6 HIGH)

EPSS: 0.06%

updated 2026-05-21T15:24:25.330000

1 posts

Trilium Notes is a cross-platform, hierarchical note taking application focused on building large personal knowledge bases. In versions 0.102.1 and prior, the Clipper API in Trilium Desktop (v0.101.3) allows full authentication bypass when running in an Electron environment. When Trilium detects an Electron environment, it explicitly disables authentication middleware for the Clipper API, exposing

thehackerwire@mastodon.social at 2026-05-21T04:00:01.000Z ##

🟠 CVE-2026-39310 - High (8.6)

Trilium Notes is a cross-platform, hierarchical note taking application focused on building large personal knowledge bases. In versions 0.102.1 and prior, the Clipper API in Trilium Desktop (v0.101.3) allows full authentication bypass when running...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-40165
(8.7 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:24:25.330000

1 posts

authentik is an open-source identity provider. Versions 2025.12.4 and prior, and versions 2026.2.0-rc1 through 2026.2.2 were vulnerable to Authentication Bypass through SAML NameID XML Comment Injection. Due to how authentik extracted the NameID value from a SAML assertion, it was possible for an attacker to trick authentik into only seeing a part of the NameID value, potentially allowing an attac

thehackerwire@mastodon.social at 2026-05-21T02:00:11.000Z ##

🟠 CVE-2026-40165 - High (8.7)

authentik is an open-source identity provider. Versions 2025.12.4 and prior, and versions 2026.2.0-rc1 through 2026.2.2 were vulnerable to Authentication Bypass through SAML NameID XML Comment Injection. Due to how authentik extracted the NameID v...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9133
(7.7 HIGH)

EPSS: 0.02%

updated 2026-05-21T15:24:25.330000

1 posts

Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws

thehackerwire@mastodon.social at 2026-05-20T22:00:22.000Z ##

🟠 CVE-2026-9133 - High (7.7)

Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform ar...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44052
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-21T15:20:19.040000

1 posts

Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output in cleartext, which allows an attacker with access to the log files to obtain LDAP credentials.

thehackerwire@mastodon.social at 2026-05-22T09:00:05.000Z ##

🟠 CVE-2026-44052 - High (7.5)

Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output in cleartext, which allows an attacker with access to the log files to obtain LDAP credentials.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44050
(9.9 CRITICAL)

EPSS: 0.14%

updated 2026-05-21T15:20:19.040000

1 posts

A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk 2.0.0 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code with escalated privileges or cause a denial of service.

thehackerwire@mastodon.social at 2026-05-22T08:00:12.000Z ##

🔴 CVE-2026-44050 - Critical (9.9)

A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk 2.0.0 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code with escalated privileges or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44049
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-21T15:20:19.040000

1 posts

An out-of-bounds write due to improper null termination in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character data.

thehackerwire@mastodon.social at 2026-05-22T08:00:03.000Z ##

🟠 CVE-2026-44049 - High (7.5)

An out-of-bounds write due to improper null termination in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44048
(8.8 HIGH)

EPSS: 0.14%

updated 2026-05-21T15:20:19.040000

1 posts

A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service.

thehackerwire@mastodon.social at 2026-05-22T07:59:53.000Z ##

🟠 CVE-2026-44048 - High (8.8)

A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44047
(8.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T15:20:19.040000

1 posts

An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 through 4.4.2 allows a remote authenticated attacker to obtain unauthorized access to data, modify data, or cause a denial of service.

thehackerwire@mastodon.social at 2026-05-22T07:00:14.000Z ##

🟠 CVE-2026-44047 - High (8.8)

An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 through 4.4.2 allows a remote authenticated attacker to obtain unauthorized access to data, modify data, or cause a denial of service.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44062
(7.5 HIGH)

EPSS: 0.19%

updated 2026-05-21T15:20:19.040000

1 posts

A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character set data.

thehackerwire@mastodon.social at 2026-05-22T07:00:03.000Z ##

🟠 CVE-2026-44062 - High (7.5)

A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character set data.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44060
(7.5 HIGH)

EPSS: 0.08%

updated 2026-05-21T15:20:19.040000

1 posts

An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a remote unauthenticated attacker to cause a denial of service via a crafted DSI write request.

thehackerwire@mastodon.social at 2026-05-22T06:59:53.000Z ##

🟠 CVE-2026-44060 - High (7.5)

An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a remote unauthenticated attacker to cause a denial of service via a crafted DSI write request.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44055
(7.5 HIGH)

EPSS: 0.23%

updated 2026-05-21T15:20:19.040000

1 posts

A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 allows a remote authenticated attacker to inject OS commands and execute arbitrary code.

thehackerwire@mastodon.social at 2026-05-22T06:01:25.000Z ##

🟠 CVE-2026-44055 - High (7.5)

A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 allows a remote authenticated attacker to inject OS commands and execute arbitrary code.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44068
(7.6 HIGH)

EPSS: 0.15%

updated 2026-05-21T15:20:19.040000

1 posts

Incomplete sanitization of extended attribute (EA) path components in Netatalk 2.1.0 through 4.4.2 allows a remote authenticated attacker to write to files outside the intended metadata namespace via crafted EA names.

thehackerwire@mastodon.social at 2026-05-22T06:01:14.000Z ##

🟠 CVE-2026-44068 - High (7.6)

Incomplete sanitization of extended attribute (EA) path components in Netatalk 2.1.0 through 4.4.2 allows a remote authenticated attacker to write to files outside the intended metadata namespace via crafted EA names.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6279
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-05-21T15:19:30.540000

2 posts

The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthenticated Remote Code Execution via PHP Function Injection in versions up to and including 3.15.2. This is due to the `wp_conditional_tags` case in `Fusion_Builder_Conditional_Render_Helper::get_value()` passing attacker-controlled values from a base64-decoded JSON blob directly to `call_user_func()` without any allowli

offseq@infosec.exchange at 2026-05-21T06:00:24.000Z ##

🚨 CRITICAL: Avada (Fusion) Builder ≤3.15.2 has unauth RCE bug (CVE-2026-6279). Attackers can run PHP via exposed AJAX endpoint. Disable plugin or restrict access ASAP. Patch status: unconfirmed. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20266279 #infosec

##

thehackerwire@mastodon.social at 2026-05-21T05:59:52.000Z ##

🔴 CVE-2026-6279 - Critical (9.8)

The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthenticated Remote Code Execution via PHP Function Injection in versions up to and including 3.15.2. This is due to the `wp_conditional_tags` case in `Fusion_Builder_Cond...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45444
(10.0 CRITICAL)

EPSS: 0.04%

updated 2026-05-21T15:19:30.540000

1 posts

Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift Cards For WooCommerce Pro allows Using Malicious Files. This issue affects Gift Cards For WooCommerce Pro: from n/a through 4.2.6.

thehackerwire@mastodon.social at 2026-05-21T03:00:31.000Z ##

🔴 CVE-2026-45444 - Critical (10)

Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift Cards For WooCommerce Pro allows Using Malicious Files.

This issue affects Gift Cards For WooCommerce Pro: from n/a through 4.2.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9139
(9.8 CRITICAL)

EPSS: 0.13%

updated 2026-05-21T15:17:59.850000

2 posts

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded credential vulnerability in the embedded web configuration interface where authentication is implemented entirely in client-side JavaScript in login.zhtml, exposing static plaintext credentials in the page source. Unauthenticated attackers with network access can recover administrative credentials directly from the client-s

offseq@infosec.exchange at 2026-05-21T03:00:26.000Z ##

🔐 CVE-2026-9139: Taiko AG1000-01A SMS Alert Gateway (Revs 7.3, 8, UM-AG1000_R7.2) has a CRITICAL flaw (CVSS 9.8) — hard-coded admin creds in client JS. No patch yet. Restrict access, isolate device, monitor closely. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #CVE20269139

##

thehackerwire@mastodon.social at 2026-05-20T21:00:08.000Z ##

🔴 CVE-2026-9139 - Critical (9.8)

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded credential vulnerability in the embedded web configuration interface where authentication is implemented entirely in client-side JavaScript in login.zhtml, exposing static ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9141
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-05-21T15:17:59.850000

2 posts

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability in the embedded web configuration interface that allows unauthenticated attackers to access internal application pages without any session management or server-side authentication checks. Attackers with network access can directly request internal resources such as index.zhtml, point.zhtml, and log

offseq@infosec.exchange at 2026-05-21T01:30:27.000Z ##

🚨 CVE-2026-9141 (CRITICAL, CVSS 9.8): Taiko AG1000-01A SMS Alert Gateway web config lets unauthenticated attackers get full admin rights. No patch available — restrict access & monitor now. radar.offseq.com/threat/cve-20 #OffSeq #CVE #IoTSecurity #Vuln

##

thehackerwire@mastodon.social at 2026-05-20T21:00:18.000Z ##

🔴 CVE-2026-9141 - Critical (9.8)

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability in the embedded web configuration interface that allows unauthenticated attackers to access internal application pages without any session managem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-9144
(7.6 HIGH)

EPSS: 0.04%

updated 2026-05-21T15:17:59.850000

1 posts

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-site scripting vulnerability in the embedded web configuration interface that allows authenticated attackers to execute persistent JavaScript by fragmenting malicious payloads across multiple administrative form fields. Attackers can bypass front-end length restrictions using JavaScript comments and template literals to c

thehackerwire@mastodon.social at 2026-05-20T21:00:27.000Z ##

🟠 CVE-2026-9144 - High (7.6)

Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-site scripting vulnerability in the embedded web configuration interface that allows authenticated attackers to execute persistent JavaScript by fragmenting malicious pay...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71217
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:16:22.223000

1 posts

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent self-protection mechanism could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The following information is provided as informational only f

thehackerwire@mastodon.social at 2026-05-22T00:00:20.000Z ##

🟠 CVE-2025-71217 - High (7.8)

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent self-protection mechanism could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71216
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:16:22.037000

1 posts

A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agent cache mechanism could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The following information is provided as informational only for CVE re

thehackerwire@mastodon.social at 2026-05-22T00:00:09.000Z ##

🟠 CVE-2025-71216 - High (7.8)

A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agent cache mechanism could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute l...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71214
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:16:21.100000

1 posts

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent iCore service could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The following information is provided as informational only for CVE refer

thehackerwire@mastodon.social at 2026-05-21T23:00:24.000Z ##

🟠 CVE-2025-71214 - High (7.8)

An origin validation error vulnerability in the Trend Micro Apex One (mac) agent iCore service could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-71212
(7.8 HIGH)

EPSS: 0.03%

updated 2026-05-21T15:05:28.023000

1 posts

A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-22T02:00:04.000Z ##

🟠 CVE-2025-71212 - High (7.8)

A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34930
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:05:28.023000

1 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T23:00:15.000Z ##

🟠 CVE-2026-34930 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.

Please note: an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34927
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:05:28.023000

4 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T23:00:15.000Z ##

🟠 CVE-2026-34930 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.

Please note: an ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:57.000Z ##

🟠 CVE-2026-34929 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.

Please ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:47.000Z ##

🟠 CVE-2026-34928 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.

Please not...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T22:01:37.000Z ##

🟠 CVE-2026-34927 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target system...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34929
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:05:28.023000

1 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T22:01:57.000Z ##

🟠 CVE-2026-34929 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.

Please ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34928
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:05:28.023000

1 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T22:01:47.000Z ##

🟠 CVE-2026-34928 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.

Please not...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45206
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:05:28.023000

2 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T20:00:48.000Z ##

🟠 CVE-2026-45206 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T17:00:30.000Z ##

🟠 CVE-2026-45207 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45207
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:05:28.023000

2 posts

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T20:00:48.000Z ##

🟠 CVE-2026-45206 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-21T17:00:30.000Z ##

🟠 CVE-2026-45207 - High (7.8)

An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism.

Pl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45208
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-21T15:05:28.023000

1 posts

A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.

thehackerwire@mastodon.social at 2026-05-21T20:00:39.000Z ##

🟠 CVE-2026-45208 - High (7.8)

A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations.

Please note: an attacker must first obtain the ability to execute low-privileged code on the target...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2008-4250
(9.8 CRITICAL)

EPSS: 92.53%

updated 2026-05-21T12:57:17.353000

1 posts

The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, and 7 Pre-Beta allows remote attackers to execute arbitrary code via a crafted RPC request that triggers the overflow during path canonicalization, as exploited in the wild by Gimmiv.A in October 2008, aka "Server Service Vulnerability."

4 repos

https://github.com/NoTrustedx/Exploit_MS08-067

https://github.com/thunderstrike9090/Conflicker_analysis_scripts

https://github.com/BinRacer/ms08-067

https://github.com/BinRacer/ms08-067.py

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

CVE-2009-1537
(8.8 HIGH)

EPSS: 55.49%

updated 2026-05-21T12:57:12.850000

1 posts

Unspecified vulnerability in the QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 allows remote attackers to execute arbitrary code via a crafted QuickTime media file, as exploited in the wild in May 2009, aka "DirectX NULL Byte Overwrite Vulnerability."

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

CVE-2010-0806
(8.8 HIGH)

EPSS: 87.25%

updated 2026-05-21T12:57:10.303000

1 posts

Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka "Uninitialized Memory Corruption Vulnerability."

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

CVE-2010-0249
(8.8 HIGH)

EPSS: 88.68%

updated 2026-05-21T12:57:01.463000

1 posts

Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper ha

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

CVE-2009-3459
(8.8 HIGH)

EPSS: 91.02%

updated 2026-05-21T12:56:49.133000

1 posts

Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x before 8.1.7, and 9.x before 9.2 allows remote attackers to execute arbitrary code via a crafted PDF file that triggers memory corruption, as exploited in the wild in October 2009. NOTE: some of these details are obtained from third party information.

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

CVE-2026-44051
(8.1 HIGH)

EPSS: 0.02%

updated 2026-05-21T09:32:16

1 posts

An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink creation.

thehackerwire@mastodon.social at 2026-05-22T08:59:55.000Z ##

🟠 CVE-2026-44051 - High (8.1)

An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink creation.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42960
(10.0 CRITICAL)

EPSS: 0.02%

updated 2026-05-20T22:51:43.680000

2 posts

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning via promiscuous records for the authority section. Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such records. If an adversary is able to attach such records in a reply (i.e., spoofed packet, fragmentation attack) he would be able to poison Unbound's cach

thehackerwire@mastodon.social at 2026-05-23T04:00:02.000Z ##

🔴 CVE-2026-42960 - Critical (10)

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning via promiscuous records for the authority section. Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-23T04:00:02.000Z ##

🔴 CVE-2026-42960 - Critical (10)

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning via promiscuous records for the authority section. Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41292
(7.5 HIGH)

EPSS: 0.06%

updated 2026-05-20T22:49:46.850000

2 posts

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage while they are parsing and creating internal data structures for the options. Coordinated attacks can result in degradation and/or denial of service. Un

thehackerwire@mastodon.social at 2026-05-23T04:00:13.000Z ##

🟠 CVE-2026-41292 - High (7.5)

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-23T04:00:13.000Z ##

🟠 CVE-2026-41292 - High (7.5)

NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46333
(5.5 MEDIUM)

EPSS: 0.01%

updated 2026-05-20T21:31:29

9 posts

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointe

4 repos

https://github.com/0xBlackash/CVE-2026-46333

https://github.com/Aurillium/public-passwd

https://github.com/studiogangster/CVE-2026-46333

https://github.com/KaraZajac/CHARON

sourceware@fosstodon.org at 2026-05-22T12:47:11.000Z ##

To update the linux kernel for some recent local privilege escalation bugs CVE-2026-43284, CVE-2026-46333, CVE-2026-46300 (we do have some mitigations installed) we will have to reboot it yet again. We'll do that around 16:15 UTC today (in about 3.5 hours from now). If everything goes according to plan then this should not take more than a couple of minutes. This will briefly interrupt some services for sourceware.org, valgrind.org, cygwin.com, gcc.gnu.org, elfutils.org and dwarfstd.org.

##

linux@activitypub.awakari.com at 2026-05-20T15:40:19.000Z ## CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path The Qualys Threat Research Unit (TRU) has discovered and published the full advisory for CV...

#Vulnerabilities #and #Threat #Research #security #vulnerabilities

Origin | Interest | Match ##

rusty__shackleford@mastodon.social at 2026-05-22T12:57:53.000Z ##

I have no words.

---
9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros

thehackernews.com/2026/05/9-ye

> CVE-2026-46333 is a nine-year Linux kernel improper privilege management flaw introduced in November 2016 with a CVSS score of 5.5.

##

linux@activitypub.awakari.com at 2026-05-20T15:40:19.000Z ## CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path The Qualys Threat Research Unit (TRU) has discovered and published the full advisory for CV...

#Vulnerabilities #and #Threat #Research #security #vulnerabilities

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-20T15:40:19.000Z ## CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path The Qualys Threat Research Unit (TRU) has discovered and published the full advisory for CV...

#Vulnerabilities #and #Threat #Research #security #vulnerabilities

Origin | Interest | Match ##

raptor@infosec.exchange at 2026-05-21T17:44:07.000Z ##

#Qualys #Security #Advisory

Logic bug in the #Linux kernel's __ptrace_may_access() function
(CVE-2026-46333)

cdn2.qualys.com/advisory/2026/

##

linux@activitypub.awakari.com at 2026-05-21T09:57:16.000Z ## Nine-year-old Linux Kernel Vulnerability Let Attackers Exfiltrate SSH Private Keys A newly disclosed Linux kernel vulnerability, tracked as CVE-2026-46333, exposes a serious local privilege escalat...

#Cyber #Security #News #Linux #Vulnerability #News #cyber #security #cyber #security #news

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-20T15:40:19.000Z ## CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path The Qualys Threat Research Unit (TRU) has discovered and published the full advisory for CV...

#Vulnerabilities #and #Threat #Research #security #vulnerabilities

Origin | Interest | Match ##

lobsters@mastodon.social at 2026-05-20T19:25:09.000Z ##

Logic bug in the Linux kernel's __ptrace_may_access() function (CVE-2026-46333) lobste.rs/s/nwdn3w #linux #security
cdn2.qualys.com/advisory/2026/

##

CVE-2026-44926
(8.8 HIGH)

EPSS: 0.01%

updated 2026-05-20T20:16:40.517000

2 posts

InfoScale CmdServer before 7.4.2 mishandles access control.

CVE-2026-41091
(7.8 HIGH)

EPSS: 6.55%

updated 2026-05-20T19:06:36.850000

5 posts

Improper link resolution before file access ('link following') in Microsoft Defender allows an authorized attacker to elevate privileges locally.

2 repos

https://github.com/0xBlackash/CVE-2026-41091

https://github.com/ridhinva/defender-vulnerability-scanner

tierrasapiens@mastodon.social at 2026-05-23T00:18:12.000Z ##

🖲️ #Noticia de #CiberSeguridad #CiberGuerra #CiberAtaque #CiberNoticia
⚫ Actualizaciones para Microsoft Defender y Trend Micro
🔗 blog.segu-info.com.ar/2026/05/

El miércoles, Microsoft comenzó a implementar parches de seguridad para dos
vulnerabilidades de Defender que han sido explotadas en ataques Zero-Day.

La primera, identificada como
CVE-2026-41091, es una vulnerabilidad de escalamiento de privilegios que afecta a Microsoft

##

netsecio@mastodon.social at 2026-05-22T19:11:38.000Z ##

📰 Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges

⚠️ ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/mi

##

oversecurity@mastodon.social at 2026-05-22T09:20:40.000Z ##

Microsoft Patches Actively Exploited Defender Vulnerabilities Affecting Enterprise Systems

Microsoft has confirmed active exploitation of two security vulnerabilities in its security ecosystem, identified as CVE-2026-41091 and...

🔗️ [Thecyberexpress] link.is.it/oRM68F

##

beyondmachines1@infosec.exchange at 2026-05-21T17:01:08.000Z ##

Microsoft Patches Actively Exploited Defender Vulnerabilities

Microsoft and CISA confirmed active exploitation of vulnerabilities in Microsoft Defender, including a privilege escalation flaw (CVE-2026-41091) and a denial-of-service bug (CVE-2026-45498).

**Check that your Microsoft Defender engine version is 1.1.26040.8 or higher to ensure you are protected against these active exploits. While updates are usually automatic, manual verification is necessary for critical systems to confirm the patches were applied.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

CVE-2026-45498
(4.0 MEDIUM)

EPSS: 2.77%

updated 2026-05-20T19:05:46.837000

3 posts

Microsoft Defender Denial of Service Vulnerability

1 repos

https://github.com/ridhinva/defender-vulnerability-scanner

netsecio@mastodon.social at 2026-05-22T19:11:38.000Z ##

📰 Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges

⚠️ ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/mi

##

beyondmachines1@infosec.exchange at 2026-05-21T17:01:08.000Z ##

Microsoft Patches Actively Exploited Defender Vulnerabilities

Microsoft and CISA confirmed active exploitation of vulnerabilities in Microsoft Defender, including a privilege escalation flaw (CVE-2026-41091) and a denial-of-service bug (CVE-2026-45498).

**Check that your Microsoft Defender engine version is 1.1.26040.8 or higher to ensure you are protected against these active exploits. While updates are usually automatic, manual verification is necessary for critical systems to confirm the patches were applied.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-05-20T20:00:13.000Z ##

🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2008-4250 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-1537 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2009-3459 (secdb.nttzen.cloud/cve/detail/)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: cisa.gov/news-events/alerts/20 ; web.archive.org/web/2012032417).-,NOTE%3A,-There%20are%20reports ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0249 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2010-0806 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: learn.microsoft.com/en-us/secu ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-41091 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

⚠️ CVE-2026-45498 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: msrc.microsoft.com/update-guid ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498

##

CVE-2026-45584
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-20T18:56:32.350000

3 posts

Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.

1 repos

https://github.com/96613686/CVE-2026-45584

xeiaso.net@bsky.brid.gy at 2026-05-20T22:16:01.908Z ##

"No way to prevent this" say users of only language where this regularly happens https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45584/

"No way to prevent this" say u...

##

cadey@pony.social at 2026-05-20T22:16:02.000Z ##

"No way to prevent this" say users of only language where this regularly happens

xeiaso.net/shitposts/no-way-to

##

nyanbinary@infosec.exchange at 2026-05-20T20:16:24.000Z ##

msrc.microsoft.com/update-guid

One job. You had one job.

Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.

##

CVE-2026-24207
(9.8 CRITICAL)

EPSS: 0.10%

updated 2026-05-20T17:30:43.320000

1 posts

NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause an authentication bypass. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, denial of service, or information disclosure.

beyondmachines1@infosec.exchange at 2026-05-21T09:01:07.000Z ##

NVIDIA Patches Critical Authentication Bypass in Triton Inference Server

NVIDIA patched eight vulnerabilities in its Triton Inference Server, including a critical authentication bypass (CVE-2026-24207) that allow unauthenticated remote attackers to execute code, steal data, or disrupt AI model serving operations.

**Make sure your NVIDIA Triton Inference Servers are isolated from the internet and accessible only from trusted networks. Then update all Triton Inference Servers to release r26.03 or later ASAP, especially if they are exposed on the internet.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-20223
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-05-20T17:30:40.450000

3 posts

A vulnerability in the&nbsp;access validation of internal REST APIs of Cisco Secure Workload could allow an unauthenticated, remote attacker to access site resources with the privileges of the&nbsp;Site Admin role. This vulnerability is due to insufficient validation and authentication when accessing REST API endpoints. An attacker could exploit this vulnerability if they are able to send a cra

1 repos

https://github.com/HORKimhab/CVE-2026-20223

oversecurity@mastodon.social at 2026-05-22T07:51:39.000Z ##

Cisco Secure Workload Flaw CVE-2026-20223 Gets Maximum CVSS 10 Rating

Cisco has released security updates to fix a critical vulnerability, tracked as CVE-2026-20223, affecting its Cisco Secure Workload platform. The

🔗️ [Thecyberexpress] link.is.it/oVchv5

##

diker@mstdn.ca at 2026-05-21T15:24:59.000Z ##

Max severity #Cisco Secure Workload flaw gives Site #Admin privileges..Cisco has released security updates to address a maximum-severity Secure Workload #vulnerability that allows attackers to gain Site Admin privileges.Tracked as CVE-2026-20223, the security flaw was found in Secure Workload's internal REST APIs, and it enables unauthenticated attackers to access resources with the privileges of the Site Admin role.#cybersec #security #security #cyber #sec

##

beyondmachines1@infosec.exchange at 2026-05-21T15:01:06.000Z ##

Cisco Patches Critical CVSS 10.0 Authentication Bypass in Secure Workload

Cisco patched a critical CVSS 10.0 vulnerability in Secure Workload that allows unauthenticated attackers to gain Site Admin privileges via crafted API calls. The flaw enables unauthorized data access and configuration changes across tenant boundaries in both SaaS and on-premises environments.

**Make sure your Cisco Secure Workload clusters are isolated from the internet and accessible only from trusted networks. If you run on-premises Cisco Secure Workload, immediately update to version 3.10.8.3 or 4.0.3.17 to patch CVE-2026-20223; if you're on versions 3.9 or older, plan a migration to a supported patched release since no direct updates are available.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-45585
(6.8 MEDIUM)

EPSS: 0.11%

updated 2026-05-20T16:42:42.177000

2 posts

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as &quot;YellowKey&quot;. The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices. We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.

2 repos

https://github.com/bjbakker1984/Yellowkey-mitigation

https://github.com/everest90909/YellowKey-WinRE-Remediation

beyondmachines1@infosec.exchange at 2026-05-21T13:01:07.000Z ##

Microsoft Issues Emergency Mitigation for YellowKey BitLocker Bypass

Microsoft released emergency mitigations for a BitLocker bypass vulnerability (CVE-2026-45585) that allows attackers with physical access to access encrypted data via the Windows Recovery Environment.

**To protect against the YellowKey physical bypass attack switch your BitLocker configuration from TPM-only to TPM+PIN configuration. Relying on hardware-only secrets is no longer sufficient when the boot process itself can be manipulated. IT teams should also manually modify their WinRE images to remove the autofstx.exe entry from the registry until Microsoft releases an official, permanent patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

secdb@infosec.exchange at 2026-05-20T19:30:09.000Z ##

🚨 CVE-2026-45585 (YellowKey)

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as "YellowKey". The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices.
We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#yellowkey #microsoft #bitlocker #cve202645585

##

CVE-2026-6068
(6.5 MEDIUM)

EPSS: 0.05%

updated 2026-05-20T14:17:02.973000

1 posts

NASM contains a heap use after free vulnerability in response file (-@) processing where a dangling pointer to freed memory is stored in the global depend_file and later dereferenced, as the response-file buffer is freed before the pointer is used, allowing for data corruption or remote code execution.

bontchev@infosec.exchange at 2026-05-21T09:49:29.000Z ##

Another one from the Lulz Department: how about an RCE in your assembler?

"CVE-2026-6068 – From Heap UAF to Persistent RCE in NASM":

sekai.team/blog/nasm-cve-discl

##

CVE-2026-9064
(7.5 HIGH)

EPSS: 0.08%

updated 2026-05-20T14:02:12.280000

1 posts

A flaw was found in 389-ds-base. The get_ldapmessage_controls_ext() function in the LDAP server does not enforce an upper bound on the number of controls per LDAP message. A remote, unauthenticated attacker can send a specially crafted LDAP request containing hundreds of thousands of minimal controls within the default maximum BER message size (2 MB), causing excessive CPU consumption and heap all

thehackerwire@mastodon.social at 2026-05-20T19:01:15.000Z ##

🟠 CVE-2026-9064 - High (7.5)

A flaw was found in 389-ds-base. The get_ldapmessage_controls_ext() function in the LDAP server does not enforce an upper bound on the number of controls per LDAP message. A remote, unauthenticated attacker can send a specially crafted LDAP reques...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44933
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-20T14:01:24.027000

1 posts

`PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this root is frequently `/` (the system root) in standard configurations or when using `--root`. If the chroot target is `/`, it is a no-op, allowing the traversed path to execute host binaries (like `/bin/bash`) with root privileges.

thehackerwire@mastodon.social at 2026-05-20T19:01:05.000Z ##

🟠 CVE-2026-44933 - High (7.8)

`PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this root is frequently `/` (the system root) in standard configurations or when using `--root`. If the chroot target is `/`, it is a no-op, allowing the traversed path to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5200
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-20T13:54:54.890000

1 posts

The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 10.8.2. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify priv

thehackerwire@mastodon.social at 2026-05-20T20:00:03.000Z ##

🟠 CVE-2026-5200 - High (8.8)

The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 10.8.2. This is due to the plugin not properly verifying...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2031
(0 None)

EPSS: 0.43%

updated 2026-05-18T19:32:38.777000

1 posts

An Improper Access Control vulnerability in several internal API endpoints for Google Cloud Application Integration prior to 2026-01-23 allows a remote, unauthenticated attacker to disclose sensitive internal information and execute arbitrary code using specially crafted HTTP requests to inadvertently exposed internal API endpoints.

sayzard@mastodon.sayzard.org at 2026-05-22T23:42:19.000Z ##

StubZero: $148,337 RCE in Google Cloud Production

구글 클라우드의 내부 API에서 디버깅 엔드포인트 정보 유출이 원인이 되어 CVE-2026-2031로 지정된 원격 코드 실행(RCE) 취약점이 발견되었습니다. 이 취약점은 protobuf 기반 gRPC 서비스의 프로토콜 정의와 내부 워크플로우 큐 정보 노출을 통해 악용 가능했으며, 구글의 내부 인증 체계와 Stubby RPC 인프라를 악용해 권한 상승 및 코드 실행이 가능했습니다. 연구자는 이 문제를 발견 후 즉시 보고하여 신속히 대응되었으며, 구글 클라우드의 Application Integration 워크플로우와 관련된 보안 모델의 복잡성을 드러냈습니다. 이 사례는 대규모 클라우드 서비스에서 내부 API...

brutecat.com/articles/google-c

##

CVE-2026-6473
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-18T14:59:59.747000

1 posts

Integer wraparound in multiple PostgreSQL server features allows an unprivileged database user to cause the server to undersize an allocation and write out-of-bounds. This may execute arbitrary code as the operating system user running the database. In applications that pass gigabyte-scale user inputs to the relevant database functions, the application input provider may achieve a segmentation f

CVE-2026-42897
(8.1 HIGH)

EPSS: 6.29%

updated 2026-05-15T19:35:52.963000

1 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

1 repos

https://github.com/atiilla/CVE-2026-42897

hackmag@infosec.exchange at 2026-05-21T03:00:03.000Z ##

⚪️ Microsoft warns of attacks exploiting zero‑day vulnerability in Exchange Server

🗨️ Microsoft specialists have warned about attacks targeting a new zero-day vulnerability in Exchange Server, identified as CVE-2026-42897. The issue affects Exchange Server 2016, 2019, and Subscription Edition (SE). Since a full patch is not yet available, the company suggests using…

🔗 hackmag.com/news/exchange-0day

#news

##

CVE-2026-44578
(8.6 HIGH)

EPSS: 5.04%

updated 2026-05-14T18:34:38.530000

1 posts

Next.js is a React framework for building full-stack web applications. From 13.4.13 to before 15.5.16 and 16.2.5, self-hosted applications using the built-in Node.js server can be vulnerable to server-side request forgery through crafted WebSocket upgrade requests. An attacker can cause the server to proxy requests to arbitrary internal or external destinations, which may expose internal services

Nuclei template

7 repos

https://github.com/tocong282/CVE-2026-44578-PoC

https://github.com/0xBlackash/CVE-2026-44578

https://github.com/dinosn/CVE-2026-44578

https://github.com/love07oj/nextjs-cve-2026-44578

https://github.com/ynsmroztas/nextssrf

https://github.com/panchocosil/verify-ghsa-c4j6-fc7j-m34r

https://github.com/dwisiswant0/next-16.2.4-pocs

cR0w@infosec.exchange at 2026-05-20T19:38:48.000Z ##

horizon3.ai/attack-research/vu

CVE-2026-44578 is a High-severity server-side request forgery vulnerability affecting self-hosted Next.js applications that use the built-in Node.js server. The vulnerability exists in WebSocket upgrade request handling, where crafted requests can cause the server to proxy connections to arbitrary internal or external destinations. Vercel-hosted deployments are not affected.

#fuckJavaScript

##

CVE-2026-43284
(7.8 HIGH)

EPSS: 1.47%

updated 2026-05-14T18:33:53

1 posts

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when

31 repos

https://github.com/linnemanlabs/dirtyfrag-arm64

https://github.com/whosfault/CVE-2026-43284

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/ChernStepanov/DirtyFrag-for-dummies

https://github.com/liamromanis101/DirtyFrag-Detector

https://github.com/grabesec/XCP_ng_CVE-2026-43284_tester

https://github.com/suominen/CVE-2026-43284

https://github.com/scriptzteam/Paranoid-Dirty-Frag-CVE-2026-43284

https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4

https://github.com/krisiasty/vcheck

https://github.com/FrosterDL/CVE-2026-43284

https://github.com/First-John/cve_2026_frag_family_fix

https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan

https://github.com/XRSecCD/202605_dirty_frag

https://github.com/Aiyakami/rust_dirtyfrag

https://github.com/LucasPDiniz/CVE-2026-43284

https://github.com/metalx1993/dirtyfrag-patches

https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag

https://github.com/xd20111/CVE-2026-43284

https://github.com/ryan2929/CVE-2026-43284-

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/0xBlackash/CVE-2026-43284

https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe

https://github.com/kuniyal08/Dirty-Frag-CVE-2026-43284

https://github.com/dixyes/dirtypatch

https://github.com/Koshmare-Blossom/DirtyFrag-go

https://github.com/haydenjames/dirty-frag-check

https://github.com/AK777177/Dirty-Frag-Analysis

https://github.com/Percivalll/Dirty-Frag-Kubernetes-PoC

https://github.com/0xlane/pagecache-guard

https://github.com/6abc/Copy-Fail-CVE-2026-31431-dirty-frag-CVE-2026-43284

sourceware@fosstodon.org at 2026-05-22T12:47:11.000Z ##

To update the linux kernel for some recent local privilege escalation bugs CVE-2026-43284, CVE-2026-46333, CVE-2026-46300 (we do have some mitigations installed) we will have to reboot it yet again. We'll do that around 16:15 UTC today (in about 3.5 hours from now). If everything goes according to plan then this should not take more than a couple of minutes. This will briefly interrupt some services for sourceware.org, valgrind.org, cygwin.com, gcc.gnu.org, elfutils.org and dwarfstd.org.

##

CVE-2026-40369
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-14T17:52:50.143000

2 posts

Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.

3 repos

https://github.com/piffd0s/ntoskrnl-metadata

https://github.com/ercihan/CVE-2026-40369

https://github.com/orinimron123/CVE-2026-40369-EXPLOIT

CVE-2026-0265
(0 None)

EPSS: 0.03%

updated 2026-05-13T18:17:47.830000

1 posts

An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure acc

2 repos

https://github.com/tstephens1080/palo-alto-cve-2026-0265-checker

https://github.com/BishopFox/CVE-2026-0265-check

CVE-2026-28910
(3.3 LOW)

EPSS: 0.01%

updated 2026-05-13T14:02:20.380000

2 posts

This issue was addressed with improved permissions checking. This issue is fixed in macOS Tahoe 26.4. A malicious app may be able to access arbitrary files.

obivan at 2026-05-22T18:29:17.254Z ##

CVE-2026-28910: Breaking macOS App Sandbox Data Containers, TCC, and Hijacking Apps Using Archive Utility mysk.blog/2026/05/19/cve-2026-

##

obivan@infosec.exchange at 2026-05-22T18:29:17.000Z ##

CVE-2026-28910: Breaking macOS App Sandbox Data Containers, TCC, and Hijacking Apps Using Archive Utility mysk.blog/2026/05/19/cve-2026-

##

CVE-2026-26980
(9.4 CRITICAL)

EPSS: 63.49%

updated 2026-05-12T13:31:01

3 posts

### Impact A SQL injection vulnerability existed in Ghost's Content API that allowed unauthenticated attackers to read arbitrary data from the database. ### Vulnerable Versions This vulnerability is present in Ghost v3.24.0 to v6.19.0. ### Patches v6.19.1 contains a fix for this issue. **Note:** as this vulnerability lets an attacker gain access to a site's API keys, we recommend reviewing

Nuclei template

3 repos

https://github.com/vognik/CVE-2026-26980

https://github.com/dinosn/ghost-cve-2026-26980

https://github.com/Kulik-Labs-Development/Ghost-CMS-Code-Injection-Audit-CVE-2026-26980

VirusBulletin@infosec.exchange at 2026-05-22T09:08:47.000Z ##

XLab researchers show how threat actors exploited CVE-2026-26980 to compromise Ghost CMS, causing numerous websites to become accomplices in ClickFix attacks. blog.xlab.qianxin.com/ghost-cm

##

thenexusofprivacy@infosec.exchange at 2026-05-21T18:54:23.000Z ##

Thanks again! Yeah the read access from the SQL injection allowed exfiltration of admin API keys at which point game over. I don't see any malicious themes or changes to the theme file ... instead it seems like it was the vulnerability descried in blog.xlab.qianxin.com/ghost-cm (which I don't think had been published yet when I was doing the cleanup, or at least I didn't find it in my searching). Basically the hack edited every posts to put in a script in the "codeinjection_footer" field that brings the payload in from a malware site.

There aren't any obvious signs of LPE exploitation but who knows ... another good argument for spinning up a new instance.

@mildsunrise @JadedBlueEyes @thenexusofprivacy@gotosocial.thenexus.today

##

campuscodi@mastodon.social at 2026-05-21T18:06:48.000Z ##

A hacking campaign is planting FakeCaptcha pages and malware on websites built with the Ghost CMS.

The attacks began this month and are exploiting a vulnerability disclosed in February

blog.xlab.qianxin.com/ghost-cm

##

CVE-2026-1502
(0 None)

EPSS: 0.02%

updated 2026-05-10T21:16:28.247000

2 posts

CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host.

grahamperrin@bsd.cafe at 2026-05-22T00:06:34.000Z ##

RE: mastodon.social/@wollman/11661

@distrowatch @kaidenshi @brnrd

<vuxml.freebsd.org/freebsd/30bd> for CVE-2026-1502, one of the five vulnerable ports is deprecated but not yet expired.

295200 – lang/python314: Update to 3.14.5 — <bugs.freebsd.org/bugzilla/show>

285957 – lang/python312 as default python — <bugs.freebsd.org/bugzilla/show>

Cc @dvl

##

wollman@mastodon.social at 2026-05-21T23:11:50.000Z ##

Really feels like @dvl and I are the only people who actually read our #FreeBSD package security alerts, given the apparent complete lack of urgency on the part of anyone else to fix the two-months-outstanding lang/python* CVEs like CVE-2026-1502.

##

CVE-2026-34474
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-07T15:15:06.770000

1 posts

Sensitive data exposure leading to admin/WLAN credential leak in ZTE ZXHN H298A 1.1 and H108N 2.6. A crafted request to the router web interface can expose sensitive device and account information. In affected builds, the response may include the administrator password and WLAN PSK, enabling authentication bypass and network compromise. Some firmware versions may expose only partial identifiers (e

1 repos

https://github.com/minanagehsalalma/cve-2026-34474-zte-h298a-h108n-sensitive-data-exposure

CVE-2026-5140
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-04T14:16:35.190000

2 posts

Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus Update allows Authentication Bypass. This issue affects Pardus Update: from 0.6.3 before 0.6.4.

linux@activitypub.awakari.com at 2026-05-21T06:47:12.000Z ## Pardus Linux Vulnerability Chain Enables Complete System Takeover A critical local privilege escalation vulnerability chain tracked as CVE-2026–5140 has exposed serious security weaknesses in Par...

#Firewall #Daily #Cyber #News #Vulnerabilities #Vulnerability #News #CRLF #injection #flaw #CVE-2026–5140

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-21T06:47:12.000Z ## Pardus Linux Vulnerability Chain Enables Complete System Takeover A critical local privilege escalation vulnerability chain tracked as CVE-2026–5140 has exposed serious security weaknesses in Par...

#Firewall #Daily #Cyber #News #Vulnerabilities #Vulnerability #News #CRLF #injection #flaw #CVE-2026–5140

Origin | Interest | Match ##

CVE-2026-4115
(3.7 LOW)

EPSS: 0.01%

updated 2026-04-30T18:33:16.693000

2 posts

A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verify of the file crypto/ecc-ssh.c of the component Ed25519 Signature Handler. The manipulation results in improper verification of cryptographic signature. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is told to be difficult. The exploit is now public and may

lunarloony@dosgame.club at 2026-05-22T20:02:07.000Z ##

@simontatham Oh, excellent! Now the patch management system I have at work will stop moaning about CVE-2026-4115.

##

lunarloony@dosgame.club at 2026-05-22T20:02:07.000Z ##

@simontatham Oh, excellent! Now the patch management system I have at work will stop moaning about CVE-2026-4115.

##

CVE-2026-3102
(6.3 MEDIUM)

EPSS: 0.08%

updated 2026-04-29T01:00:01.613000

2 posts

A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affects the function SetMacOSTags of the file lib/Image/ExifTool/MacOS.pm of the component PNG File Parser. This manipulation of the argument DateTimeOriginal causes os command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized. Upgrading to version 13.

2 repos

https://github.com/ErikDervishi03/CVE-2026-31024

https://github.com/HORKimhab/CVE-2026-3102

obivan@infosec.exchange at 2026-05-21T20:54:31.000Z ##

How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102) securelist.com/exiftool-compro

##

threatcodex@infosec.exchange at 2026-05-21T15:30:46.000Z ##

How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)
#CVE_2026_3102
securelist.com/exiftool-compro

##

CVE-2013-0422
(9.8 CRITICAL)

EPSS: 93.61%

updated 2026-04-21T19:02:35.430000

1 posts

Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attackers to execute arbitrary code by (1) using the public getMBeanInstantiator method in the JmxMBeanServer class to obtain a reference to a private MBeanInstantiator object, then retrieving arbitrary Class references using the findClass method, and (2) using the Reflection API with recursion in a way that bypasses a securit

kev_Stalker@infosec.exchange at 2026-05-21T19:33:19.000Z ##

CVE-2013-0422 - Changed to Known Ransomware Status

Oracle JRE Remote Code Execution VulnerabilityVendor: OracleProduct: Java Runtime Environment (JRE)A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: May 21, 2026 at 18:00:35 UTCDate Added to KEV: 2022-05-25View CVE nvd.nist.gov/vuln/detail/CVE-2

##

CVE-2025-23256
(8.7 HIGH)

EPSS: 0.02%

updated 2026-04-15T00:35:42.020000

2 posts

NVIDIA BlueField contains a vulnerability in the management interface, where an attacker with local access could cause incorrect authorization to modify the configuration. A successful exploit of this vulnerability might lead to denial of service, escalation of privileges, information disclosure, and data tampering.

hugovalters@mastodon.social at 2026-05-22T18:05:42.000Z ##

CVE-2025-23256 - High severity info disclosure in Nvidia BlueField. Local access allows config tampering, DoS, privilege escalation. CVSS 8.7. No patch yet. Monitor for updates. #CVE #Nvidia #infosec

valtersit.com/cve/CVE-2025-232

##

hugovalters@mastodon.social at 2026-05-22T18:05:42.000Z ##

CVE-2025-23256 - High severity info disclosure in Nvidia BlueField. Local access allows config tampering, DoS, privilege escalation. CVSS 8.7. No patch yet. Monitor for updates. #CVE #Nvidia #infosec

valtersit.com/cve/CVE-2025-232

##

CVE-2025-32711
(9.3 CRITICAL)

EPSS: 8.76%

updated 2026-02-20T17:25:10.630000

1 posts

Ai command injection in M365 Copilot allows an unauthorized attacker to disclose information over a network.

2 repos

https://github.com/TreRB/markdown-exfil-tester

https://github.com/daryllundy/cve-2025-32711

sayzard@mastodon.sayzard.org at 2026-05-22T19:38:21.000Z ##

Reading the Prompt You Did Not Send: Detection at the Inference Boundary

이 글은 AI 에이전트 추론 경계에서 발생하는 간접 프롬프트 인젝션 공격과 이를 탐지하는 기술을 다룹니다. Microsoft 365 Copilot에서 발견된 CVE-2025-32711 사례를 중심으로, LLM이 자신의 컨텍스트 내 민감 정보를 악용해 외부로 유출하는 문제를 설명합니다. 현재 여러 탐지기 조합(ensemble) 기법이 80~90%대 정확도로 운영 중이나, 완전한 해결책은 아니며, 2026년까지 이어지는 관련 CVE 사례들이...

medium.com/system-weakness/rea

##

CVE-2025-48913(CVSS UNKNOWN)

EPSS: 0.21%

updated 2026-01-23T15:14:26

1 posts

If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities. This interface is now restricted to reject those protocols, removing this possibility. Users are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue.

EUVD_Bot@mastodon.social at 2026-05-22T13:01:05.000Z ##

🚨 EUVD-2026-31432

📊 Score: n/a
📦 Product: Apache CXF, Apache CXF, Apache CXF
🏢 Vendor: Apache Software Foundation
📅 Updated: 2026-05-22

📝 The fix for CVE-2025-48913: Apache CXF: Untrusted JMS configuration can lead to RCE was not complete, meaning that another path in the code might lead to code execution capabilities, if untrusted users are allowed to configure ...

🔗 euvd.enisa.europa.eu/vulnerabi

#cybersecurity #infosec #euvd #cve #vulnerability

##

CVE-2019-15107
(9.8 CRITICAL)

EPSS: 94.46%

updated 2025-11-06T16:50:47.130000

2 posts

An issue was discovered in Webmin <=1.920. The parameter old in password_change.cgi contains a command injection vulnerability.

Nuclei template

44 repos

https://github.com/aamfrk/Webmin-CVE-2019-15107

https://github.com/ch4ko/webmin_CVE-2019-15107

https://github.com/K3ysTr0K3R/CVE-2019-15107-EXPLOIT

https://github.com/g0db0x/CVE_2019_15107

https://github.com/darrenmartyn/CVE-2019-15107

https://github.com/TheAlpha19/MiniExploit

https://github.com/jas502n/CVE-2019-15107

https://github.com/olingo99/CVE-2019-15107

https://github.com/CyberTuz/CVE-2019-15107_detection

https://github.com/squid22/Webmin_CVE-2019-15107

https://github.com/hannob/webminex

https://github.com/MuirlandOracle/CVE-2019-15107

https://github.com/wenruoya/CVE-2019-15107

https://github.com/NasrallahBaadi/CVE-2019-15107

https://github.com/n0obit4/Webmin_1.890-POC

https://github.com/AdministratorGithub/CVE-2019-15107

https://github.com/ArtemCyberLab/Project-Exploitation-of-Webmin-Authentication-Vulnerability

https://github.com/kh4sh3i/Webmin-CVE

https://github.com/ianxtianxt/CVE-2019-15107

https://github.com/0x4r2/Webmin-CVE-2019-15107

https://github.com/viglia/cve-2019-15107

https://github.com/f0rkr/CVE-2019-15107

https://github.com/merlin-ke/CVE_2019_15107

https://github.com/ketlerd/CVE-2019-15107

https://github.com/Rayferrufino/Make-and-Break

https://github.com/AleWong/WebminRCE-EXP-CVE-2019-15107-

https://github.com/whokilleddb/CVE-2019-15107

https://github.com/HACHp1/webmin_docker_and_exp

https://github.com/Mattb709/CVE-2019-15107-Webmin-RCE-PoC

https://github.com/bayazid-bit/CVE-2019-15107

https://github.com/hadrian3689/webmin_1.920

https://github.com/EdouardosStav/CVE-2019-15107-RCE-WebMin

https://github.com/gozn/detect-CVE-2019-15107-by-pyshark

https://github.com/ruthvikvegunta/CVE-2019-15107

https://github.com/h4ck0rman/CVE-2019-15107

https://github.com/g1vi/CVE-2019-15107

https://github.com/hacknotes/CVE-2019-15107-Exploit

https://github.com/psw01/CVE-2019-15107_webminRCE

https://github.com/cdedmondson/Modified-CVE-2019-15107

https://github.com/Mattb709/CVE-2019-15107-Scanner

https://github.com/adampawelczyk/cve-2019-15107

https://github.com/diegojuan/CVE-2019-15107

https://github.com/D4rkScare/CVE-2019-15107

https://github.com/MasterCode112/CVE-2019-15107

kev_Stalker at 2026-05-22T20:53:16.619Z ##

CVE-2019-15107 - Changed to Known Ransomware Status

Webmin Command Injection VulnerabilityVendor: WebminProduct: WebminAn issue was discovered in Webmin. The parameter old in password_change.cgi contains a command injection vulnerability.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: May 22, 2026 at 19:00:35 UTCDate Added to KEV: 2022-03-25View CVE Details

nvd.nist.gov/vuln/detail/CVE-2

##

kev_Stalker@infosec.exchange at 2026-05-22T20:53:16.000Z ##

CVE-2019-15107 - Changed to Known Ransomware Status

Webmin Command Injection VulnerabilityVendor: WebminProduct: WebminAn issue was discovered in Webmin. The parameter old in password_change.cgi contains a command injection vulnerability.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: May 22, 2026 at 19:00:35 UTCDate Added to KEV: 2022-03-25View CVE Details

nvd.nist.gov/vuln/detail/CVE-2

#Ransomware #Webmin

##

CVE-2018-0802
(7.8 HIGH)

EPSS: 93.89%

updated 2025-10-22T00:31:30

3 posts

Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.

7 repos

https://github.com/Ridter/RTF_11882_0802

https://github.com/roninAPT/CVE-2018-0802

https://github.com/Abdibimantara/Maldoc-Analysis

https://github.com/likekabin/CVE-2018-0802_CVE-2017-11882

https://github.com/Palvinder-Singh/PS_CVE2018-0802

https://github.com/zldww2011/CVE-2018-0802_POC

https://github.com/rxwx/CVE-2018-0802

technadu at 2026-05-22T15:19:51.001Z ##

Cloud Atlas APT campaigns targeting Russia & Belarus are leveraging phishing, CVE-2018-0802, SSH tunnels, and a new “PowerCloud” tool that exfiltrates data into Google Sheets.

technadu.com/cloud-atlas-apt-t

##

Analyst207@mastodon.social at 2026-05-22T14:16:38.000Z ##

Cloud Atlas Expands Arsenal with New Tools, Payloads

Cloud Atlas is beefing up its toolkit with fresh tools and payloads, including a blast from the past - the notorious CVE-2018-0802 Microsoft Office Equation Editor vulnerability. The group is also reviving its use of ZIP archives with malicious LNK shortcuts that trigger PowerShell scripts, keeping security experts on high alert.

osintsights.com/cloud-atlas-ex

#CloudAtlas #Cve20180802 #MicrosoftOffice #Powershell #LnkShortcut

##

technadu@infosec.exchange at 2026-05-22T15:19:51.000Z ##

Cloud Atlas APT campaigns targeting Russia & Belarus are leveraging phishing, CVE-2018-0802, SSH tunnels, and a new “PowerCloud” tool that exfiltrates data into Google Sheets.

technadu.com/cloud-atlas-apt-t

#CyberSecurity #ThreatIntel #APT #InfoSec #Malware

##

CVE-2024-9643
(9.8 CRITICAL)

EPSS: 19.09%

updated 2025-09-19T19:33:43.980000

1 posts

The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authentication bypass due to hard-coded credentials in the administrative web server. An attacker with knowledge of the credentials can gain administrative access via crafted HTTP requests. This issue appears similar to CVE-2023-32645.

Nuclei template

beyondmachines1@infosec.exchange at 2026-05-21T10:01:07.000Z ##

Mass Exploitation of Four-Faith Industrial Routers for Botnet Expansion

Threat actors are conducting mass exploitation of a critical hard-coded credential flaw (CVE-2024-9643) in Four-Faith industrial routers to build botnets and gain footholds in corporate networks.

**Make sure all your Four-Faith industrial routers are isolated from the internet and only accessible from trusted networks. Then immediately update to the latest firmware to patch CVE-2024-9643, and disable the web management interface on any public-facing ports.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

CVE-2024-12802
(9.1 CRITICAL)

EPSS: 0.07%

updated 2025-01-09T15:32:58

3 posts

SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the separate handling of UPN (User Principal Name) and SAM (Security Account Manager) account names when integrated with Microsoft Active Directory, allowing MFA to be configured independently for each login method and potentially enabling attackers to bypass MFA by exploiting the alternative account name.

jbhall56 at 2026-05-22T11:23:52.765Z ##

SonicWall warned in a security advisory for CVE-2024-12802 that installing the firmware update alone on Gen6 devices does not fully mitigate the vulnerability, and a manual reconfiguration of the LDAP server is required. bleepingcomputer.com/news/secu

##

jbhall56@infosec.exchange at 2026-05-22T11:23:52.000Z ##

SonicWall warned in a security advisory for CVE-2024-12802 that installing the firmware update alone on Gen6 devices does not fully mitigate the vulnerability, and a manual reconfiguration of the LDAP server is required. bleepingcomputer.com/news/secu

##

blog@insicurezzadigitale.com at 2026-05-22T09:52:16.000Z ##

“Patchato” non significa protetto: attaccanti bypassano l’MFA sui VPN SonicWall Gen6 e raggiungono i file server in 30 minuti

CVE-2024-12802 sulle appliance SonicWall Gen6 SSL-VPN viene sfruttata attivamente nonostante la patch disponibile. Il motivo: il fix firmware non basta — richiede sei passaggi manuali aggiuntivi che la maggior parte degli amministratori non esegue. Il risultato: attori del ransomware ecosystem bypassano l'MFA, entrano nelle reti e raggiungono i file server in meno di trenta minuti.

insicurezzadigitale.com/patcha

##

CVE-2021-25740
(3.1 LOW)

EPSS: 0.51%

updated 2024-11-21T05:55:19.590000

1 posts

A security issue was discovered with Kubernetes that could enable users to send network traffic to locations they would otherwise not have access to via a confused deputy attack.

raesene@infosec.exchange at 2026-05-21T10:35:07.000Z ##

Here's the last one in our series of blogs on the unpatchable vulnerabilities of #Kubernetes, with CVE-2021-25740

securitylabs.datadoghq.com/art

##

CVE-2021-35036
(6.5 MEDIUM)

EPSS: 0.15%

updated 2023-01-29T05:02:05

2 posts

A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH firmware could allow an attacker to execute arbitrary OS commands on the device.

1 repos

https://github.com/minanagehsalalma/zyxel-cve-2021-35036-super-admin-password-leak

_r_netsec at 2026-05-22T14:43:05.856Z ##

Zyxel low-priv account leaked super-admin, FTPS, and TR-069 secrets across router fleets minanagehsalalma.github.io/zyx

##

_r_netsec@infosec.exchange at 2026-05-22T14:43:05.000Z ##

Zyxel low-priv account leaked super-admin, FTPS, and TR-069 secrets across router fleets minanagehsalalma.github.io/zyx

##

CVE-2026-33843
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2026-05-23T03:00:24.415Z ##

🚨 CRITICAL: CVE-2026-33843 in Microsoft Entra (Azure AD B2C) allows remote auth bypass (CVSS 9.1). Patch released — Microsoft manages remediation. No known exploits. Check advisory & verify your cloud config. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-23T03:00:24.000Z ##

🚨 CRITICAL: CVE-2026-33843 in Microsoft Entra (Azure AD B2C) allows remote auth bypass (CVSS 9.1). Patch released — Microsoft manages remediation. No known exploits. Check advisory & verify your cloud config. radar.offseq.com/threat/cve-20 #OffSeq #AzureAD #CloudSecurity #CVE202633843

##

CVE-2026-41104
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2026-05-23T01:30:25.624Z ##

🛡️ CRITICAL: CVE-2026-41104 in Microsoft Planetary Computer Pro (GeoCatalog) enables remote, unauthenticated info disclosure via insecure deserialization. Patch now — official fix available. Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-23T01:30:25.000Z ##

🛡️ CRITICAL: CVE-2026-41104 in Microsoft Planetary Computer Pro (GeoCatalog) enables remote, unauthenticated info disclosure via insecure deserialization. Patch now — official fix available. Details: radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #InfoSec #Microsoft

##

CVE-2026-42901
(0 None)

EPSS: 0.00%

2 posts

N/A

offseq at 2026-05-23T00:00:35.653Z ##

⚠️ CRITICAL: CVE-2026-42901 in Microsoft Entra (CVSS 10) enables remote privilege escalation via origin validation error. Patch now to prevent full system compromise! Fix: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-23T00:00:35.000Z ##

⚠️ CRITICAL: CVE-2026-42901 in Microsoft Entra (CVSS 10) enables remote privilege escalation via origin validation error. Patch now to prevent full system compromise! Fix: radar.offseq.com/threat/cve-20 #OffSeq #MicrosoftEntra #Vulnerability #Cybersecurity

##

CVE-2026-9256
(0 None)

EPSS: 0.00%

6 posts

N/A

jschauma@mstdn.social at 2026-05-22T23:36:22.000Z ##

The previous announced sibling vulnerability to "nginx rift" has been fixed by F5 and has been assigned CVE-2026-9256):

my.f5.com/manage/s/article/K00

This was previously called "nginx-poolslip" (nitter.net/nebusecurity/status) and is a DoS with possible RCE ("if the attacker can bypass ASLR" - not sure how?), using a similar regex capture vector.

Wouldn't be surprised if this is the new norm: one vuln lands, everybody points their AI at that attack vector and discovers sibling vulns.

##

cR0w at 2026-05-22T20:00:38.583Z ##

Another vuln in NGINX rewriting. Looks pretty similar to the last one. Requires ASLR bypass or disabled for RCE.

my.f5.com/manage/s/article/K00

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when a rewrite directive uses a regex pattern with distinct, overlapping Perl-Compatible Regular Expression (PCRE) captures (for example, /((.*))$) and a replacement string that references multiple such captures (for example, $1$2) in a redirect or arguments context. An unauthenticated attacker along with conditions beyond their control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, attackers can execute code on systems with Address Space Layout Randomization (ASLR) disabled or when the attacker can bypass ASLR. (CVE-2026-9256)

##

_r_netsec at 2026-05-22T19:58:05.625Z ##

CVE-2026-9256 - "nginx-poolslip", another new vulnerability in the rewrite module my.f5.com/manage/s/article/K00

##

jschauma@mstdn.social at 2026-05-22T23:36:22.000Z ##

The previous announced sibling vulnerability to "nginx rift" has been fixed by F5 and has been assigned CVE-2026-9256):

my.f5.com/manage/s/article/K00

This was previously called "nginx-poolslip" (nitter.net/nebusecurity/status) and is a DoS with possible RCE ("if the attacker can bypass ASLR" - not sure how?), using a similar regex capture vector.

Wouldn't be surprised if this is the new norm: one vuln lands, everybody points their AI at that attack vector and discovers sibling vulns.

##

cR0w@infosec.exchange at 2026-05-22T20:00:38.000Z ##

Another vuln in NGINX rewriting. Looks pretty similar to the last one. Requires ASLR bypass or disabled for RCE.

my.f5.com/manage/s/article/K00

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when a rewrite directive uses a regex pattern with distinct, overlapping Perl-Compatible Regular Expression (PCRE) captures (for example, /((.*))$) and a replacement string that references multiple such captures (for example, $1$2) in a redirect or arguments context. An unauthenticated attacker along with conditions beyond their control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, attackers can execute code on systems with Address Space Layout Randomization (ASLR) disabled or when the attacker can bypass ASLR. (CVE-2026-9256)

##

_r_netsec@infosec.exchange at 2026-05-22T19:58:05.000Z ##

CVE-2026-9256 - "nginx-poolslip", another new vulnerability in the rewrite module my.f5.com/manage/s/article/K00

##

CVE-2026-46529
(0 None)

EPSS: 0.00%

3 posts

N/A

1 repos

https://github.com/N1et/CVE-2026-46529

lobsters@mastodon.social at 2026-05-22T22:20:12.000Z ##

[oss-security] Evince/Atril/Xreader command injection CVE-2026-46529 lobste.rs/s/rlpzut #linux #security
lwn.net/ml/all/ce81312b-99e1-4

##

sayzard@mastodon.sayzard.org at 2026-05-22T14:40:06.000Z ##

POC for CVE-2026-46529 – RCE via PDF argv injection

CVE-2026-46529는 Linux용 PDF 뷰어인 Evince, Atril, Xreader에서 발견된 원격 코드 실행(RCE) 취약점으로, 악성 PDF 파일 내에 특수하게 조작된 argv 인젝션을 통해 공격자가 임의 코드를 실행할 수 있다. 공격자는 PDF 내에 ELF 공유 라이브러리와 PDF를 겸하는 폴리글롯 파일을 삽입하고, %f 치환자를 이용해 런타임 경로를 동적으로 해결하여 피해자의 시스템에서 쉘을 획득한다. GTK4 기반 최신 Evince에서는 일부 공격 경로가 차단되었으나 GTK3 기반 배포판은 여전히 취약하며, 근본적 해결책은 명령어 인자를 안전하게 처리하는 것이다.

github.com/N1et/CVE-2026-46529

#security #rce #pdf #linux #gtk

##

lobsters@mastodon.social at 2026-05-22T22:20:12.000Z ##

[oss-security] Evince/Atril/Xreader command injection CVE-2026-46529 lobste.rs/s/rlpzut #linux #security
lwn.net/ml/all/ce81312b-99e1-4

##

CVE-2026-8992
(0 None)

EPSS: 0.00%

2 posts

N/A

nyanbinary at 2026-05-22T15:29:20.058Z ##

cve.org/CVERecord?id=CVE-2026-

An improper certificate validation vulnerability in Ivanti Secure Access Client before 22.8R6 allows a remote unauthenticated attacker to execute arbitrary code.

OwO

Signed my separation agreement today, here is hoping the next shop doesnt have me deal with Ivanti..

##

nyanbinary@infosec.exchange at 2026-05-22T15:29:20.000Z ##

cve.org/CVERecord?id=CVE-2026-

An improper certificate validation vulnerability in Ivanti Secure Access Client before 22.8R6 allows a remote unauthenticated attacker to execute arbitrary code.

OwO

Signed my separation agreement today, here is hoping the next shop doesnt have me deal with Ivanti..

##

sourceware@fosstodon.org at 2026-05-22T12:47:11.000Z ##

To update the linux kernel for some recent local privilege escalation bugs CVE-2026-43284, CVE-2026-46333, CVE-2026-46300 (we do have some mitigations installed) we will have to reboot it yet again. We'll do that around 16:15 UTC today (in about 3.5 hours from now). If everything goes according to plan then this should not take more than a couple of minutes. This will briefly interrupt some services for sourceware.org, valgrind.org, cygwin.com, gcc.gnu.org, elfutils.org and dwarfstd.org.

##

AAKL@infosec.exchange at 2026-05-21T16:17:04.000Z ##

New.

Picus: Fragnesia CVE-2026-46300: Linux Kernel LPE Vulnerability Explained picussecurity.com/resource/blo #threatresearch #Linux #infosec #vulnerability

##

CVE-2026-25606
(0 None)

EPSS: 0.03%

1 posts

N/A

offseq@infosec.exchange at 2026-05-22T10:30:28.000Z ##

STER (Centralny Instytut Ochrony Pracy) faces a HIGH severity SQL Injection (CVE-2026-25606, CVSS 8.7). Authenticated attackers can access sensitive data via search filters. Patch by upgrading to v9.5. 🛡️ radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Vuln #Infosec

##

CVE-2026-8679
(0 None)

EPSS: 0.13%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-22T10:00:01.000Z ##

🟠 CVE-2026-8679 - High (7.5)

The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-22T09:00:41.000Z ##

🔈 CVE-2026-8679 (HIGH): AudioIgniter Music Player plugin ≤2.0.2 lets unauthenticated attackers access any playlist's metadata — including private & draft tracks — via insecure playlist ID handling. Restrict access & monitor for patches. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln

##

CVE-2026-47243
(0 None)

EPSS: 0.00%

1 posts

N/A

nyanbinary@infosec.exchange at 2026-05-21T14:52:13.000Z ##

... they also managed to call dibs on CVE-2026-0001 :party_porg2:

##

CVE-2026-46712
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

CVE-2026-48115
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

CVE-2026-46714
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

CVE-2026-46713
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

CVE-2026-47746
(0 None)

EPSS: 0.00%

1 posts

N/A

misskey_release_watcher@kodesumber.com at 2026-05-21T02:54:26.000Z ##

2026.5.4

General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正

github.com/misskey-dev/misskey

#misskey #misskeyadmin

##

Visit counter For Websites