##
Updated at UTC 2026-05-23T04:55:01.123721
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-9011 | 7.5 | 0.08% | 1 | 0 | 2026-05-22T09:31:35 | The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is | |
| CVE-2026-9018 | 8.8 | 0.03% | 1 | 0 | 2026-05-22T05:16:28.067000 | The Easy Elements for Elementor – Addons & Website Templates plugin for WordPres | |
| CVE-2026-4834 | 7.5 | 0.06% | 1 | 0 | 2026-05-22T04:16:26.647000 | The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'sear | |
| CVE-2026-41054 | 7.8 | 0.01% | 1 | 0 | 2026-05-22T04:16:24.770000 | In `src/havegecmd.c`, the `socket_handler` function performs a credential check | |
| CVE-2026-34911 | 7.7 | 0.01% | 1 | 0 | 2026-05-22T03:30:34 | A malicious actor with access to the network and low privileges could exploit a | |
| CVE-2026-33000 | 9.1 | 0.06% | 2 | 0 | 2026-05-22T03:30:33 | A malicious actor with access to the network and high privileges could exploit a | |
| CVE-2026-9264 | None | 0.04% | 1 | 0 | 2026-05-22T03:30:33 | A cross-site scripting (XSS) vulnerability in SketchUp 2026's Dynamic Components | |
| CVE-2026-45250 | 7.8 | 0.01% | 3 | 1 | 2026-05-22T02:16:34.810000 | The setcred(2) system call is only available to privileged users. However, befo | |
| CVE-2026-34910 | 10.0 | 0.10% | 2 | 0 | 2026-05-22T02:16:34.527000 | A malicious actor with access to the network could exploit an Improper Input Val | |
| CVE-2026-34909 | 10.0 | 0.02% | 2 | 0 | 2026-05-22T02:16:34.390000 | A malicious actor with access to the network could exploit a Path Traversal vuln | |
| CVE-2026-34908 | 10.0 | 0.02% | 2 | 0 | 2026-05-22T02:16:34.240000 | A malicious actor with access to the network could exploit an Improper Access Co | |
| CVE-2026-6960 | 9.8 | 0.15% | 2 | 1 | 2026-05-21T22:16:48.643000 | The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file upload | |
| CVE-2026-46473 | 7.5 | 0.01% | 2 | 0 | 2026-05-21T22:16:48.157000 | Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand. Secret | |
| CVE-2026-47102 | 8.8 | 0.05% | 1 | 0 | 2026-05-21T21:16:32.557000 | LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /us | |
| CVE-2026-47101 | 8.8 | 0.05% | 1 | 0 | 2026-05-21T21:16:32.413000 | LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API key | |
| CVE-2026-47114 | 8.8 | 0.16% | 1 | 0 | 2026-05-21T21:03:56.320000 | IINA before 1.4.3 contains a user-assisted command execution vulnerability that | |
| CVE-2026-34926 | 6.7 | 0.25% | 8 | 1 | 2026-05-21T20:16:14.027000 | A directory traversal vulnerability in the Apex One (on-premise) server could al | |
| CVE-2025-34291 | 8.8 | 31.20% | 4 | 2 | template | 2026-05-21T20:16:13.520000 | Langflow versions up to and including 1.6.9 contain a chained vulnerability that |
| CVE-2026-24216 | 7.8 | 0.06% | 1 | 0 | 2026-05-21T20:08:32.900000 | NVIDIA BioNemo for Linux contains a vulnerability where a user could cause a des | |
| CVE-2026-24217 | 8.8 | 0.08% | 2 | 0 | 2026-05-21T20:08:20.257000 | NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause | |
| CVE-2026-4858 | 8.0 | 0.04% | 1 | 0 | 2026-05-21T19:43:31.373000 | Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11. | |
| CVE-2026-20239 | 7.5 | 0.01% | 1 | 0 | 2026-05-21T19:42:21.353000 | In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform | |
| CVE-2026-48207 | 9.8 | 0.04% | 2 | 0 | 2026-05-21T19:16:53.700000 | Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializ | |
| CVE-2026-42945 | 8.1 | 1.00% | 1 | 29 | 2026-05-21T19:16:53.100000 | NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo | |
| CVE-2026-28764 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T19:16:52.123000 | MediaArea MediaInfoLib LXF element parsing heap-based buffer overflow vulnerabil | |
| CVE-2026-39531 | 9.3 | 0.03% | 1 | 0 | 2026-05-21T19:10:36.607000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-9089 | 8.8 | 0.00% | 1 | 0 | 2026-05-21T19:10:21.527000 | The ConnectWise Automate™ Agent does not fully verify the authenticity of compon | |
| CVE-2026-48241 | 8.1 | 0.05% | 2 | 0 | 2026-05-21T19:10:12.323000 | Open ISES Tickets before 3.44.2 contains hardcoded MySQL database credentials in | |
| CVE-2026-48235 | 8.2 | 0.03% | 1 | 0 | 2026-05-21T19:10:12.323000 | Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/r | |
| CVE-2026-48242 | 8.1 | 0.04% | 1 | 0 | 2026-05-21T19:10:12.323000 | Open ISES Tickets before 3.44.2 contains hardcoded MySQL database connection cre | |
| CVE-2026-45251 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T19:01:22.710000 | A file descriptor can be closed while a thread is blocked in a poll(2) or select | |
| CVE-2026-45253 | 8.4 | 0.01% | 1 | 0 | 2026-05-21T19:01:01.833000 | ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) a | |
| CVE-2026-45255 | 7.5 | 0.01% | 1 | 0 | 2026-05-21T19:00:34.217000 | When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, the | |
| CVE-2026-8632 | 7.8 | 0.01% | 2 | 0 | 2026-05-21T18:58:59.447000 | A potential security vulnerability has been identified in the HP Linux Imaging a | |
| CVE-2026-8631 | 9.8 | 0.02% | 3 | 0 | 2026-05-21T18:58:41.297000 | A potential security vulnerability has been identified in the HP Linux Imaging a | |
| CVE-2026-47783 | 8.1 | 0.07% | 1 | 0 | 2026-05-21T17:06:40.670000 | In memcached before 1.6.42, username data for SASL password database authenticat | |
| CVE-2026-47784 | 8.1 | 0.07% | 1 | 0 | 2026-05-21T17:06:33.240000 | In memcached before 1.6.42, password data for SASL password database authenticat | |
| CVE-2026-44925 | 8.8 | 0.00% | 2 | 0 | 2026-05-21T16:57:27.350000 | Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations | |
| CVE-2026-9111 | 8.8 | 0.03% | 1 | 0 | 2026-05-21T16:56:46.883000 | Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allow | |
| CVE-2026-9112 | 8.8 | 0.03% | 1 | 0 | 2026-05-21T16:56:43.173000 | Use after free in GPU in Google Chrome on Windows prior to 148.0.7778.179 allowe | |
| CVE-2026-9114 | 8.8 | 0.03% | 1 | 0 | 2026-05-21T16:56:26.853000 | Use after free in QUIC in Google Chrome on prior to 148.0.7778.179 allowed a rem | |
| CVE-2026-9117 | 7.5 | 0.03% | 1 | 0 | 2026-05-21T16:45:44.400000 | Type Confusion in GFX in Google Chrome on Linux, ChromeOS prior to 148.0.7778.17 | |
| CVE-2026-9118 | 8.8 | 0.03% | 1 | 0 | 2026-05-21T16:45:19.020000 | Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed | |
| CVE-2026-9119 | 8.8 | 0.02% | 1 | 0 | 2026-05-21T16:44:34.153000 | Heap buffer overflow in WebRTC in Google Chrome on prior to 148.0.7778.179 allow | |
| CVE-2026-9120 | 8.8 | 0.03% | 1 | 0 | 2026-05-21T16:41:34.767000 | Use after free in WebRTC in Google Chrome prior to 148.0.7778.179 allowed a remo | |
| CVE-2026-9121 | 8.8 | 0.03% | 1 | 0 | 2026-05-21T16:35:19.957000 | Out of bounds read in GPU in Google Chrome on prior to 148.0.7778.179 allowed a | |
| CVE-2026-9123 | 7.5 | 0.00% | 1 | 0 | 2026-05-21T16:31:56.420000 | Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS | |
| CVE-2026-9126 | 8.8 | 0.03% | 1 | 0 | 2026-05-21T16:23:01.260000 | Use after free in DOM in Google Chrome on prior to 148.0.7778.179 allowed a remo | |
| CVE-2026-43494 | 0 | 0.03% | 2 | 2 | 2026-05-21T16:16:23.157000 | In the Linux kernel, the following vulnerability has been resolved: net/rds: re | |
| CVE-2026-47373 | 7.5 | 0.03% | 2 | 0 | 2026-05-21T16:04:53.813000 | Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attack | |
| CVE-2026-23734 | 0 | 0.04% | 1 | 0 | 2026-05-21T16:04:53.813000 | XWiki Platform is a generic wiki platform. Versions prior to 18.1.0-rc-1, 17.10. | |
| CVE-2026-33137 | 0 | 0.04% | 1 | 0 | 2026-05-21T16:04:53.813000 | XWiki Platform is a generic wiki platform offering runtime services for applicat | |
| CVE-2026-40092 | 7.5 | 0.02% | 1 | 0 | 2026-05-21T16:04:53.813000 | nimiq-blockchain provides persistent block storage for Nimiq's Rust implementati | |
| CVE-2026-0393 | 0 | 0.05% | 1 | 0 | 2026-05-21T16:04:33.830000 | The affected product may expose credentials remotely between low privileged visu | |
| CVE-2025-71213 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T15:34:18 | An origin validation error vulnerability in Trend Micro Apex One could allow a l | |
| CVE-2026-5118 | 9.8 | 0.03% | 3 | 4 | 2026-05-21T15:34:17 | The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation | |
| CVE-2025-71210 | 9.8 | 0.42% | 2 | 0 | 2026-05-21T15:34:17 | A vulnerability in the Trend Micro Apex One management console could allow a rem | |
| CVE-2025-71211 | 9.8 | 0.43% | 1 | 0 | 2026-05-21T15:34:17 | A vulnerability in the Trend Micro Apex One management console could allow a rem | |
| CVE-2025-13479 | 7.5 | 0.03% | 1 | 0 | 2026-05-21T15:34:17 | Authorization bypass through User-Controlled key vulnerability in PosCube Hardwa | |
| CVE-2026-47372 | 9.1 | 0.01% | 1 | 0 | 2026-05-21T15:34:07 | Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values | |
| CVE-2026-42001 | 7.5 | 0.02% | 1 | 0 | 2026-05-21T15:27:51.530000 | Insufficient Validation of Autoprimary SOA Queries | |
| CVE-2026-24218 | 8.1 | 0.02% | 2 | 0 | 2026-05-21T15:26:35.653000 | NVIDIA DGX OS contains a vulnerability in the factory provisioning process, wher | |
| CVE-2026-5433 | 9.1 | 0.26% | 1 | 0 | 2026-05-21T15:26:35.653000 | Honeywell Control Network Module (CNM) contains command injection vulnerability | |
| CVE-2026-2740 | 8.4 | 1.25% | 1 | 0 | 2026-05-21T15:26:35.653000 | Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus | |
| CVE-2026-24188 | 8.2 | 0.04% | 1 | 0 | 2026-05-21T15:26:35.653000 | NVIDIA TensorRT contains a vulnerability where an attacker could cause an out-of | |
| CVE-2026-9082 | 6.5 | 0.02% | 17 | 6 | template | 2026-05-21T15:24:25.330000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti |
| CVE-2026-9157 | 8.4 | 0.02% | 1 | 0 | 2026-05-21T15:24:25.330000 | Improper input validation, Unrestricted upload of file with dangerous type vulne | |
| CVE-2026-39405 | 0 | 0.05% | 1 | 0 | 2026-05-21T15:24:25.330000 | Frappe Learning Management System (LMS) is a learning system that helps users st | |
| CVE-2026-39310 | 8.6 | 0.06% | 1 | 0 | 2026-05-21T15:24:25.330000 | Trilium Notes is a cross-platform, hierarchical note taking application focused | |
| CVE-2026-40165 | 8.7 | 0.02% | 1 | 0 | 2026-05-21T15:24:25.330000 | authentik is an open-source identity provider. Versions 2025.12.4 and prior, and | |
| CVE-2026-9133 | 7.7 | 0.02% | 1 | 0 | 2026-05-21T15:24:25.330000 | Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before ve | |
| CVE-2026-44052 | 7.5 | 0.03% | 1 | 0 | 2026-05-21T15:20:19.040000 | Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output | |
| CVE-2026-44050 | 9.9 | 0.14% | 1 | 0 | 2026-05-21T15:20:19.040000 | A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk | |
| CVE-2026-44049 | 7.5 | 0.07% | 1 | 0 | 2026-05-21T15:20:19.040000 | An out-of-bounds write due to improper null termination in convert_charset() in | |
| CVE-2026-44048 | 8.8 | 0.14% | 1 | 0 | 2026-05-21T15:20:19.040000 | A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in N | |
| CVE-2026-44047 | 8.8 | 0.03% | 1 | 0 | 2026-05-21T15:20:19.040000 | An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 throu | |
| CVE-2026-44062 | 7.5 | 0.19% | 1 | 0 | 2026-05-21T15:20:19.040000 | A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 t | |
| CVE-2026-44060 | 7.5 | 0.08% | 1 | 0 | 2026-05-21T15:20:19.040000 | An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a | |
| CVE-2026-44055 | 7.5 | 0.23% | 1 | 0 | 2026-05-21T15:20:19.040000 | A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 al | |
| CVE-2026-44068 | 7.6 | 0.15% | 1 | 0 | 2026-05-21T15:20:19.040000 | Incomplete sanitization of extended attribute (EA) path components in Netatalk 2 | |
| CVE-2026-6279 | 9.8 | 0.10% | 2 | 0 | 2026-05-21T15:19:30.540000 | The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthe | |
| CVE-2026-45444 | 10.0 | 0.04% | 1 | 0 | 2026-05-21T15:19:30.540000 | Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift | |
| CVE-2026-9139 | 9.8 | 0.13% | 2 | 0 | 2026-05-21T15:17:59.850000 | Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded crede | |
| CVE-2026-9141 | 9.8 | 0.22% | 2 | 0 | 2026-05-21T15:17:59.850000 | Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication | |
| CVE-2026-9144 | 7.6 | 0.04% | 1 | 0 | 2026-05-21T15:17:59.850000 | Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-sit | |
| CVE-2025-71217 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T15:16:22.223000 | An origin validation error vulnerability in the Trend Micro Apex One (mac) agent | |
| CVE-2025-71216 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T15:16:22.037000 | A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agen | |
| CVE-2025-71214 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T15:16:21.100000 | An origin validation error vulnerability in the Trend Micro Apex One (mac) agent | |
| CVE-2025-71212 | 7.8 | 0.03% | 1 | 0 | 2026-05-21T15:05:28.023000 | A link following vulnerability in the Trend Micro Apex One scan engine could all | |
| CVE-2026-34930 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T15:05:28.023000 | An origin validation vulnerability in the Apex One/SEP agent could allow a local | |
| CVE-2026-34927 | 7.8 | 0.01% | 4 | 0 | 2026-05-21T15:05:28.023000 | An origin validation vulnerability in the Apex One/SEP agent could allow a local | |
| CVE-2026-34929 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T15:05:28.023000 | An origin validation vulnerability in the Apex One/SEP agent could allow a local | |
| CVE-2026-34928 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T15:05:28.023000 | An origin validation vulnerability in the Apex One/SEP agent could allow a local | |
| CVE-2026-45206 | 7.8 | 0.01% | 2 | 0 | 2026-05-21T15:05:28.023000 | An origin validation vulnerability in the Apex One/SEP agent could allow a local | |
| CVE-2026-45207 | 7.8 | 0.01% | 2 | 0 | 2026-05-21T15:05:28.023000 | An origin validation vulnerability in the Apex One/SEP agent could allow a local | |
| CVE-2026-45208 | 7.8 | 0.01% | 1 | 0 | 2026-05-21T15:05:28.023000 | A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow | |
| CVE-2008-4250 | 9.8 | 92.53% | 1 | 4 | 2026-05-21T12:57:17.353000 | The Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP | |
| CVE-2009-1537 | 8.8 | 55.49% | 1 | 0 | 2026-05-21T12:57:12.850000 | Unspecified vulnerability in the QuickTime Movie Parser Filter in quartz.dll in | |
| CVE-2010-0806 | 8.8 | 87.25% | 1 | 0 | 2026-05-21T12:57:10.303000 | Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in | |
| CVE-2010-0249 | 8.8 | 88.68% | 1 | 0 | 2026-05-21T12:57:01.463000 | Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 o | |
| CVE-2009-3459 | 8.8 | 91.02% | 1 | 0 | 2026-05-21T12:56:49.133000 | Heap-based buffer overflow in Adobe Reader and Acrobat 7.x before 7.1.4, 8.x bef | |
| CVE-2026-44051 | 8.1 | 0.02% | 1 | 0 | 2026-05-21T09:32:16 | An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows | |
| CVE-2026-42960 | 10.0 | 0.02% | 2 | 0 | 2026-05-20T22:51:43.680000 | NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning | |
| CVE-2026-41292 | 7.5 | 0.06% | 2 | 0 | 2026-05-20T22:49:46.850000 | NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degrada | |
| CVE-2026-46333 | 5.5 | 0.01% | 9 | 4 | 2026-05-20T21:31:29 | In the Linux kernel, the following vulnerability has been resolved: ptrace: sli | |
| CVE-2026-44926 | 8.8 | 0.01% | 2 | 0 | 2026-05-20T20:16:40.517000 | InfoScale CmdServer before 7.4.2 mishandles access control. | |
| CVE-2026-41091 | 7.8 | 6.55% | 5 | 2 | 2026-05-20T19:06:36.850000 | Improper link resolution before file access ('link following') in Microsoft Defe | |
| CVE-2026-45498 | 4.0 | 2.77% | 3 | 1 | 2026-05-20T19:05:46.837000 | Microsoft Defender Denial of Service Vulnerability | |
| CVE-2026-45584 | 8.1 | 0.04% | 3 | 1 | 2026-05-20T18:56:32.350000 | Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker | |
| CVE-2026-24207 | 9.8 | 0.10% | 1 | 0 | 2026-05-20T17:30:43.320000 | NVIDIA Triton Inference Server contains a vulnerability where an attacker could | |
| CVE-2026-20223 | 10.0 | 0.06% | 3 | 1 | 2026-05-20T17:30:40.450000 | A vulnerability in the access validation of internal REST APIs of Cisco Sec | |
| CVE-2026-45585 | 6.8 | 0.11% | 2 | 2 | 2026-05-20T16:42:42.177000 | Microsoft is aware of a security feature bypass vulnerability in Windows publicl | |
| CVE-2026-6068 | 6.5 | 0.05% | 1 | 0 | 2026-05-20T14:17:02.973000 | NASM contains a heap use after free vulnerability in response file (-@) processi | |
| CVE-2026-9064 | 7.5 | 0.08% | 1 | 0 | 2026-05-20T14:02:12.280000 | A flaw was found in 389-ds-base. The get_ldapmessage_controls_ext() function in | |
| CVE-2026-44933 | 7.8 | 0.01% | 1 | 0 | 2026-05-20T14:01:24.027000 | `PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this ro | |
| CVE-2026-5200 | 8.8 | 0.04% | 1 | 0 | 2026-05-20T13:54:54.890000 | The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution | |
| CVE-2026-2031 | 0 | 0.43% | 1 | 0 | 2026-05-18T19:32:38.777000 | An Improper Access Control vulnerability in several internal API endpoints for G | |
| CVE-2026-6473 | 8.8 | 0.07% | 1 | 0 | 2026-05-18T14:59:59.747000 | Integer wraparound in multiple PostgreSQL server features allows an unprivileged | |
| CVE-2026-42897 | 8.1 | 6.29% | 1 | 1 | 2026-05-15T19:35:52.963000 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2026-44578 | 8.6 | 5.04% | 1 | 7 | template | 2026-05-14T18:34:38.530000 | Next.js is a React framework for building full-stack web applications. From 13.4 |
| CVE-2026-43284 | 7.8 | 1.47% | 1 | 31 | 2026-05-14T18:33:53 | In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: | |
| CVE-2026-40369 | 7.8 | 0.02% | 2 | 3 | 2026-05-14T17:52:50.143000 | Untrusted pointer dereference in Windows Kernel allows an authorized attacker to | |
| CVE-2026-0265 | 0 | 0.03% | 1 | 2 | 2026-05-13T18:17:47.830000 | An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en | |
| CVE-2026-28910 | 3.3 | 0.01% | 2 | 0 | 2026-05-13T14:02:20.380000 | This issue was addressed with improved permissions checking. This issue is fixed | |
| CVE-2026-26980 | 9.4 | 63.49% | 3 | 3 | template | 2026-05-12T13:31:01 | ### Impact A SQL injection vulnerability existed in Ghost's Content API that al |
| CVE-2026-1502 | 0 | 0.02% | 2 | 0 | 2026-05-10T21:16:28.247000 | CR/LF bytes were not rejected by HTTP client proxy tunnel headers or host. | |
| CVE-2026-34474 | 7.5 | 0.05% | 1 | 1 | 2026-05-07T15:15:06.770000 | Sensitive data exposure leading to admin/WLAN credential leak in ZTE ZXHN H298A | |
| CVE-2026-5140 | 8.8 | 0.06% | 2 | 0 | 2026-05-04T14:16:35.190000 | Improper neutralization of CRLF sequences ('CRLF injection') vulnerability in TU | |
| CVE-2026-4115 | 3.7 | 0.01% | 2 | 0 | 2026-04-30T18:33:16.693000 | A vulnerability was detected in PuTTY 0.83. Affected is the function eddsa_verif | |
| CVE-2026-3102 | 6.3 | 0.08% | 2 | 2 | 2026-04-29T01:00:01.613000 | A vulnerability was determined in exiftool up to 13.49 on macOS. This issue affe | |
| CVE-2013-0422 | 9.8 | 93.61% | 1 | 0 | 2026-04-21T19:02:35.430000 | Multiple vulnerabilities in Oracle Java 7 before Update 11 allow remote attacker | |
| CVE-2025-23256 | 8.7 | 0.02% | 2 | 0 | 2026-04-15T00:35:42.020000 | NVIDIA BlueField contains a vulnerability in the management interface, where an | |
| CVE-2025-32711 | 9.3 | 8.76% | 1 | 2 | 2026-02-20T17:25:10.630000 | Ai command injection in M365 Copilot allows an unauthorized attacker to disclose | |
| CVE-2025-48913 | None | 0.21% | 1 | 0 | 2026-01-23T15:14:26 | If untrusted users are allowed to configure JMS for Apache CXF, previously they | |
| CVE-2019-15107 | 9.8 | 94.46% | 2 | 44 | template | 2025-11-06T16:50:47.130000 | An issue was discovered in Webmin <=1.920. The parameter old in password_change. |
| CVE-2018-0802 | 7.8 | 93.89% | 3 | 7 | 2025-10-22T00:31:30 | Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Offic | |
| CVE-2024-9643 | 9.8 | 19.09% | 1 | 0 | template | 2025-09-19T19:33:43.980000 | The Four-Faith F3x36 router using firmware v2.0.0 is vulnerable to authenticatio |
| CVE-2024-12802 | 9.1 | 0.07% | 3 | 0 | 2025-01-09T15:32:58 | SSL-VPN MFA Bypass in SonicWALL SSL-VPN can arise in specific cases due to the s | |
| CVE-2021-25740 | 3.1 | 0.51% | 1 | 0 | 2024-11-21T05:55:19.590000 | A security issue was discovered with Kubernetes that could enable users to send | |
| CVE-2021-35036 | 6.5 | 0.15% | 2 | 1 | 2023-01-29T05:02:05 | A command injection vulnerability in the web interface of the Zyxel NWA-1100-NH | |
| CVE-2026-33843 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-41104 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-42901 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-9256 | 0 | 0.00% | 6 | 0 | N/A | ||
| CVE-2026-46529 | 0 | 0.00% | 3 | 1 | N/A | ||
| CVE-2026-8992 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-46300 | 0 | 0.00% | 2 | 8 | N/A | ||
| CVE-2026-25606 | 0 | 0.03% | 1 | 0 | N/A | ||
| CVE-2026-8679 | 0 | 0.13% | 2 | 0 | N/A | ||
| CVE-2026-47243 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-0001 | 0 | 0.00% | 1 | 2 | N/A | ||
| CVE-2026-46712 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-48115 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-46714 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-46713 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-47746 | 0 | 0.00% | 1 | 0 | N/A |
updated 2026-05-22T09:31:35
1 posts
🟠 CVE-2026-9011 - High (7.5)
The Ditty – Responsive News Tickers, Sliders, and Lists plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 3.1.65. This is due to the plugin not properly verifying that a user is authorized to perfor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9011/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-22T05:16:28.067000
1 posts
🟠 CVE-2026-9018 - High (8.8)
The Easy Elements for Elementor – Addons & Website Templates plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.4.5 via the `easyel_handle_register()` function. This is due to the `wp_ajax_nopriv_e...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9018/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-22T04:16:26.647000
1 posts
🟠 CVE-2026-4834 - High (7.5)
The WP ERP Pro plugin for WordPress is vulnerable to SQL Injection via the 'search_key' parameter in all versions up to, and including, 1.5.1. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation o...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4834/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-22T04:16:24.770000
1 posts
🟠 CVE-2026-41054 - High (7.8)
In `src/havegecmd.c`, the `socket_handler` function performs a credential check on the abstract UNIX socket (`\0/sys/entropy/haveged`). However, while it detects if the connecting user is not root (`cred.uid != 0`) and prepares a negative acknowle...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41054/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-22T03:30:34
1 posts
🟠 CVE-2026-34911 - High (7.7)
A malicious actor with access to the network and low privileges could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to obtain sensitive information.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34911/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-22T03:30:33
2 posts
🔴 CVE-2026-33000 - Critical (9.1)
A malicious actor with access to the network and high privileges could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33000/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-33000 (CVSS 9.1): Ubiquiti UniFi OS Server has a critical improper input validation flaw. High-privileged attackers on the network can execute command injection. Mitigation steps not published yet. Stay tuned: https://radar.offseq.com/threat/cve-2026-33000-cwe-20-improper-input-validation-in-983d26ac #OffSeq #Infosec #UniFiOS
##updated 2026-05-22T03:30:33
1 posts
⚠️ CRITICAL: CVE-2026-9264 in Trimble SketchUp 2026 allows RCE & file exfiltration via malicious SKP files (Dynamic Components, IE11 browser). No patch yet. Avoid untrusted SKP files. More: https://radar.offseq.com/threat/cve-2026-9264-cwe-94-improper-control-of-generatio-9d9e29a0 #OffSeq #SketchUp #Vuln #InfoSec
##updated 2026-05-22T02:16:34.810000
3 posts
1 repos
🟠 CVE-2026-45250 - High (7.8)
The setcred(2) system call is only available to privileged users. However, before the privilege level of the caller is checked, the user-supplied list of supplementary groups is copied into a fixed-size kernel stack buffer without first validatin...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45250/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##"No way to prevent this" say users of only language where this regularly happens
https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45250/
"No way to prevent this" say u...
"No way to prevent this" say users of only language where this regularly happens
##updated 2026-05-22T02:16:34.527000
2 posts
🚨 CVE-2026-34910: CRITICAL improper input validation in Ubiquiti UniFi OS Server allows unauthenticated command injection (CVSS 10.0). No patch yet. Restrict network access & monitor vendor updates. https://radar.offseq.com/threat/cve-2026-34910-cwe-20-improper-input-validation-in-54cb0e00 #OffSeq #Vuln #Ubiquiti #Infosec
##🔴 CVE-2026-34910 - Critical (10)
A malicious actor with access to the network could exploit an Improper Input Validation vulnerability found in UniFi OS devices to execute a Command Injection.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34910/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-22T02:16:34.390000
2 posts
🔒 CRITICAL: CVE-2026-34909 - Path Traversal in Ubiquiti UniFi OS Server (CVSS 10). Allows arbitrary file access & manipulation. No patch yet — restrict access & monitor! Details: https://radar.offseq.com/threat/cve-2026-34909-cwe-22-path-traversal-in-ubiquiti-i-4d93b8c5 #OffSeq #UniFi #Vuln #BlueTeam
##🔴 CVE-2026-34909 - Critical (10)
A malicious actor with access to the network could exploit a Path Traversal vulnerability found in UniFi OS devices to access files on the underlying system that could be manipulated to access an underlying account.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34909/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-22T02:16:34.240000
2 posts
🚨 CVE-2026-34908 (CVSS 10.0): Ubiquiti UniFi OS Server has a critical improper access control flaw, allowing unauthenticated remote compromise. No patch yet — restrict network access & monitor vendor updates. https://radar.offseq.com/threat/cve-2026-34908-cwe-284-improper-access-control-gen-70db5de1 #OffSeq #UniFi #Vuln #BlueTeam
##🔴 CVE-2026-34908 - Critical (10)
A malicious actor with access to the network could exploit an Improper Access Control vulnerability found in UniFi OS devices to make unauthorized changes to the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34908/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T22:16:48.643000
2 posts
1 repos
🔴 CVE-2026-6960 - Critical (9.8)
The BookingPress Pro plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'bookingpress_validate_submitted_booking_form_func' function in all versions up to, and including, 5.6. This makes it poss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6960/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CRITICAL: CVE-2026-6960 in BookingPress Appointment Booking Pro (≤5.6) allows unauthenticated file uploads — risk of RCE! Remove signature fields & monitor uploads. No patch yet — stay vigilant. https://radar.offseq.com/threat/cve-2026-6960-cwe-434-unrestricted-upload-of-file--eb314579 #OffSeq #WordPress #Vulnerability #CyberAlert
##updated 2026-05-21T22:16:48.157000
2 posts
🚩 HIGH severity: CVE-2026-46473 in Authen::TOTP (<0.1.1, Perl) — secrets generated with rand are predictable, weakening TOTP security. Upgrade to 0.1.1+ when possible. More: https://radar.offseq.com/threat/cve-2026-46473-cwe-331-insufficient-entropy-in-tch-3d3628d8 #OffSeq #Vulnerability #Perl #MFA #CVE202646473
##🟠 CVE-2026-46473 - High (7.5)
Authen::TOTP versions before 0.1.1 for Perl generate secrets using rand.
Secrets were generated using Perl's built-in rand function, which is predictable and unsuitable for security usage.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46473/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T21:16:32.557000
1 posts
🟠 CVE-2026-47102 - High (8.8)
LiteLLM prior to 1.83.10 allows a user to modify their own user_role via the /user/update endpoint. While the endpoint correctly restricts users to updating only their own account, it does not restrict which fields may be changed. A user who can r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47102/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T21:16:32.413000
1 posts
🟠 CVE-2026-47101 - High (8.8)
LiteLLM prior to 1.83.14 allows an authenticated internal_user to create API keys with access to routes that their role does not permit. When generating a key, the allowed_routes field is stored without verifying that the specified routes fall wit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47101/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T21:03:56.320000
1 posts
🟠 CVE-2026-47114 - High (8.8)
IINA before 1.4.3 contains a user-assisted command execution vulnerability that allows remote attackers to execute arbitrary commands by supplying malicious mpv_-prefixed query parameters through the iina://open custom URL scheme handler. Attacker...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47114/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T20:16:14.027000
8 posts
1 repos
📰 CISA KEV Catalog Updated: Actively Exploited Langflow and Trend Micro Flaws Demand Urgent Patching
📢 CISA KEV UPDATE: Two new vulnerabilities affecting Langflow (CVE-2025-34291) & Trend Micro Apex One (CVE-2026-34926) are being actively exploited. Federal agencies mandated to patch. All orgs urged to patch NOW! #CyberSecurity #Vulnerability #Patc...
🌐 cyber[.]netsecops[.]io
🔗 https://cyber.netsecops.io/articles/cisa-adds-langflow-and-trend-micro-bugs-to-kev-catal…
##CVE-2026-34926.
Security Week: TrendAI Patches Apex One Zero-Day Exploited in the Wild https://www.securityweek.com/trendai-patches-apex-one-zero-day-exploited-in-the-wild/ @SecurityWeek #infosec #vulnerability
##Trend Micro Discloses Apex One Zero-Day Exploited in Attacks
A critical zero-day vulnerability, CVE-2026-34926, has been discovered in Trend Micro's Apex One on-premises server, allowing pre-authenticated local attackers to inject malicious code - and it's being actively exploited in attacks. Federal agencies have been ordered to patch affected systems ASAP, with a deadline of June 4, 2026.
#ZeroDay #ApexOne #Cve202634926 #TrendMicro #DirectoryTraversal
##CVE-2026-34926.
Security Week: TrendAI Patches Apex One Zero-Day Exploited in the Wild https://www.securityweek.com/trendai-patches-apex-one-zero-day-exploited-in-the-wild/ @SecurityWeek #infosec #vulnerability
##Trend Micro Patches Actively Exploited Directory Traversal in Apex One
Trend Micro patched eight vulnerabilities in Apex One and Vision One, including a directory traversal flaw (CVE-2026-34926) that is exploited in the wild to inject malicious code into security agents.
**If you're using Trend Micro Apex One (on-premise) or Vision One, you are under attack. Immediately update to the patched versions (SP1 CP Build 18012 / SP1 Build 17079 for on-premise, or agent build 14.0.20731+ for cloud) since one of its flaws is actively exploited to push malware through your own security tools. Even if the exploited flaw requires authentication, obviously that is not difficult to obtain for hackers.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/trend-micro-patches-actively-exploited-directory-traversal-in-apex-one-r-u-9-l-z/gD2P6Ple2L
🚨 [CISA-2026:0521] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0521)
CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2025-34291 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-34291)
- Name: Langflow Origin Validation Error Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://github.com/langflow-ai/langflow ; https://github.com/langflow-ai/langflow/releases/tag/v1.9.3; https://github.com/langflow-ai/langflow/issues/11465#event-25774545848 ; https://nvd.nist.gov/vuln/detail/CVE-2025-34291
⚠️ CVE-2026-34926 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34926)
- Name: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Trend Micro
- Product: Apex One
- Notes: https://success.trendmicro.com/en-US/solution/KA-0023430 ; https://nvd.nist.gov/vuln/detail/CVE-2026-34926
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260521 #cisa20260521 #cve_2025_34291 #cve_2026_34926 #cve202534291 #cve202634926
##CVE ID: CVE-2026-34926
Vendor: Trend Micro
Product: Apex One
Date Added: 2026-05-21
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-34926
EITW ../ in Trend Micro Apex One. :brdAlert:
https://success.trendmicro.com/en-US/solution/KA-0023430
CVE-2026-34926
##TrendAI has released updates to Apex One (on-premise), Apex One as a Service and Vision One - Standard Endpoint Protection (SEP) to resolve multiple vulnerabilities.
updated 2026-05-21T20:16:13.520000
4 posts
2 repos
https://github.com/ridhinva/CVE-2025-34291-Langflow-Scanner
https://github.com/amnnrth/CVE-2025-34291_cors_security_scanner
📰 CISA KEV Catalog Updated: Actively Exploited Langflow and Trend Micro Flaws Demand Urgent Patching
📢 CISA KEV UPDATE: Two new vulnerabilities affecting Langflow (CVE-2025-34291) & Trend Micro Apex One (CVE-2026-34926) are being actively exploited. Federal agencies mandated to patch. All orgs urged to patch NOW! #CyberSecurity #Vulnerability #Patc...
🌐 cyber[.]netsecops[.]io
🔗 https://cyber.netsecops.io/articles/cisa-adds-langflow-and-trend-micro-bugs-to-kev-catal…
##🔵 THREAT INTELLIGENCE
CISA Adds Exploited Langflow and Trend Micro Apex One Vulnerabilities to KEV
Vulnerability | CRITICAL
CVEs: CVE-2025-34291
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added two security flaws impacting Langflow and Trend Micro Apex One to...
Full analysis:
https://www.yazoul.net/news/article/cisa-adds-exploited-langflow-and-trend-micro-apex-one-vulnerabilities-to-kev
🚨 [CISA-2026:0521] CISA Adds 2 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0521)
CISA has added 2 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2025-34291 (https://secdb.nttzen.cloud/cve/detail/CVE-2025-34291)
- Name: Langflow Origin Validation Error Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Langflow
- Product: Langflow
- Notes: This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https://github.com/langflow-ai/langflow ; https://github.com/langflow-ai/langflow/releases/tag/v1.9.3; https://github.com/langflow-ai/langflow/issues/11465#event-25774545848 ; https://nvd.nist.gov/vuln/detail/CVE-2025-34291
⚠️ CVE-2026-34926 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34926)
- Name: Trend Micro Apex One (On-Premise) Directory Traversal Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Trend Micro
- Product: Apex One
- Notes: https://success.trendmicro.com/en-US/solution/KA-0023430 ; https://nvd.nist.gov/vuln/detail/CVE-2026-34926
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260521 #cisa20260521 #cve_2025_34291 #cve_2026_34926 #cve202534291 #cve202634926
##CVE ID: CVE-2025-34291
Vendor: Langflow
Product: Langflow
Date Added: 2026-05-21
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2025-34291
updated 2026-05-21T20:08:32.900000
1 posts
🟠 CVE-2026-24216 - High (7.8)
NVIDIA BioNemo for Linux contains a vulnerability where a user could cause a deserialization of untrusted data. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24216/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T20:08:20.257000
2 posts
🟠 CVE-2026-24217 - High (8.8)
NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause a path traversal by loading a malicious file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24217/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24217 - High (8.8)
NVIDIA BioNeMo Core for Linux contains a vulnerability where a user could cause a path traversal by loading a malicious file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24217/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:43:31.373000
1 posts
🟠 CVE-2026-4858 - High (8)
Mattermost versions 11.6.x <= 11.6.0, 11.5.x <= 11.5.3, 11.4.x <= 11.4.4, 10.11.x <= 10.11.14 fail to check integration URL for path traversal which allows an malicious authenticated user to call an arbitrary API via system admin Matt...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:42:21.353000
1 posts
🟠 CVE-2026-20239 - High (7.5)
In Splunk Enterprise versions below 10.2.2 and 10.0.5, and Splunk Cloud Platform versions below 10.3.2512.8, 10.2.2510.11, 10.1.2507.21, and 10.0.2503.13, a user with a role that has access to the `_internal` index could view session cookies and r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-20239/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:16:53.700000
2 posts
🚨 CRITICAL: CVE-2026-48207 in Apache Fory <1.0.0 — Deserialization flaw in PyFory ReduceSerializer bypasses DeserializationPolicy, risking RCE if strict mode is off. Upgrade to 1.0.0+ ASAP! https://radar.offseq.com/threat/cve-2026-48207-cwe-502-deserialization-of-untruste-97a80f2c #OffSeq #CVE202648207 #Vulnerability #ApacheFory
##🔴 CVE-2026-48207 - Critical (9.8)
Deserialization of untrusted data in Apache Fory PyFory. PyFory's ReduceSerializer could bypass documented DeserializationPolicy validation hooks during reduce-state restoration and global-name resolution. An application is vulnerable if it deseri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-48207/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:16:53.100000
1 posts
29 repos
https://github.com/realityone/cve-2026-42945-scan
https://github.com/imSre9/CVE-2026-42945
https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC
https://github.com/MateusVerass/nGixshell
https://github.com/soksofos/wazuh-nginx-cve-2026-42945-sca-lab
https://github.com/byezero/nginx-cve-2026-42945-check
https://github.com/0xBlackash/CVE-2026-42945
https://github.com/RedCrazyGhost/CVE-2026-42945
https://github.com/friparia/NGINX_RIFT_SCAN_CVE_2026_42945
https://github.com/hnytgl/cve-2026-42945
https://github.com/fkj-src/fix_nginx_cve_2026_42945
https://github.com/forxiucn/nginx-cve-2026-42945-poc
https://github.com/iammerrida-source/nginx-rift-detect
https://github.com/chenqin231/CVE-2026-42945
https://github.com/tal7aouy/nginx-cve-2026-42945
https://github.com/gagaltotal/CVE-2026-42945-NGINX-Rift-Toolkit
https://github.com/oseasfr/Scanner_CVE_2026-42945
https://github.com/dinosn/cve-2026-42945-nginx32-lab
https://github.com/cipherspy/CVE-2026-42945-POC
https://github.com/Renison-Gohel/CVE-2026-42945-NGINX-Rift
https://github.com/DepthFirstDisclosures/Nginx-Rift
https://github.com/BarAppTeam/nginx-cve-fix
https://github.com/yusufdalbudak/CVE-2026-42945
https://github.com/sibersan/web-server-audit_CVE-2026-42945
https://github.com/ChamsBouzaiene/ai-vuln-rediscovery-nginx-cve-2026-42945
https://github.com/jelasin/CVE-2026-42945
https://github.com/nanwinata/nginxrift-CVE-2026-42945
Thank you for these kind words!
If you are interested we started to deploy in production the algorithms presented during FIRST CTI in Munich. An example here:
https://vulnerability.circl.lu/vuln/cve-2026-42945#sightings
Click on the "Forecast" tab.
Have a nice day!
##updated 2026-05-21T19:16:52.123000
1 posts
🟠 CVE-2026-28764 - High (7.8)
MediaArea MediaInfoLib LXF element parsing heap-based buffer overflow vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-28764/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:10:36.607000
1 posts
🔴 CVE-2026-39531 - Critical (9.3)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wp Directory Kit WP Directory Kit allows Blind SQL Injection.
This issue affects WP Directory Kit: from n/a through 1.5.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:10:21.527000
1 posts
🟠 CVE-2026-9089 - High (8.8)
The ConnectWise Automate™ Agent does not fully verify the authenticity of components obtained during plugin loading and self-update operations. This issue is addressed in Automate 2026.5.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9089/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:10:12.323000
2 posts
🚨 CRITICAL: Open ISES Tickets <3.44.2 has hardcoded MySQL creds in loader.php (CVE-2026-48241), exposing DBs to attack if reachable. Restrict file & DB access, rotate creds now. No official fix yet. https://radar.offseq.com/threat/cve-2026-48241-use-of-hard-coded-credentials-in-op-e794805b #OffSeq #Vulnerability #MySQL #AppSec
##🟠 CVE-2026-48241 - High (8.1)
Open ISES Tickets before 3.44.2 contains hardcoded MySQL database credentials in loader.php (a public-facing database utility) that are committed to the source repository. Any actor with access to the public source tree (or an unauthenticated atta...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-48241/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:10:12.323000
1 posts
🟠 CVE-2026-48235 - High (8.2)
Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/remotes.inc.php where latitude, longitude, callsign, mph, altitude, and timestamp values parsed from external GPS tracking service XML/JSON responses (InstaMapper and G...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-48235/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:10:12.323000
1 posts
🚨 CRITICAL: CVE-2026-48242 in Open ISES Tickets <3.44.2 — Hardcoded MySQL creds in public code could enable unauthorized DB access. No patch yet. Rotate creds & review deployments immediately. https://radar.offseq.com/threat/cve-2026-48242-use-of-hard-coded-credentials-in-op-348559d8 #OffSeq #Vulnerability #InfoSec #CVE202648242
##updated 2026-05-21T19:01:22.710000
1 posts
🟠 CVE-2026-45251 - High (7.8)
A file descriptor can be closed while a thread is blocked in a poll(2) or select(2) call waiting for that descriptor. Because the blocked thread does not hold a reference to the underlying object, this closure may result in the object being freed...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45251/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:01:01.833000
1 posts
🟠 CVE-2026-45253 - High (8.4)
ptrace(PT_SC_REMOTE) failed to properly validate parameters for the syscall(2) and __syscall(2) meta-system calls. As a result, a user with the ability to debug a process may trigger arbitrary code execution in the kernel, even if the target proc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45253/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T19:00:34.217000
1 posts
🟠 CVE-2026-45255 - High (7.5)
When bsdinstall or bsdconfig are prompted to scan for nearby Wi-Fi networks, they build up a list of network names and use bsddialog(1) to prompt the user to select a network. This is implemented using a shell script, and the code which handled n...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45255/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T18:58:59.447000
2 posts
🟠 CVE-2026-8632 - High (7.8)
A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via operating system command injection.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8632 - High (7.8)
A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via operating system command injection.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8632/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T18:58:41.297000
3 posts
🔴 CVE-2026-8631 - Critical (9.8)
A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via an integer overflow in the hpcups processing ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-8631 - Critical (9.8)
A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software. This potential vulnerability may allow escalation of privileges and/or arbitrary code execution via an integer overflow in the hpcups processing ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-8631: Critical heap buffer overflow in HP Linux Imaging & Printing Software (CVSS 9.3). Remote, unauthenticated code execution possible. No patch yet — restrict print service access & monitor jobs. Details: https://radar.offseq.com/threat/cve-2026-8631-cwe-122-heap-based-buffer-overflow-i-d4679b19 #OffSeq #Vulnerability #HP
##updated 2026-05-21T17:06:40.670000
1 posts
🟠 CVE-2026-47783 - High (8.1)
In memcached before 1.6.42, username data for SASL password database authentication has a timing side channel because a loop exits as soon as a valid username is found by sasl_server_userdb_checkpass.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47783/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T17:06:33.240000
1 posts
🟠 CVE-2026-47784 - High (8.1)
In memcached before 1.6.42, password data for SASL password database authentication has a timing side channel because memcmp is used by sasl_server_userdb_checkpass.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47784/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:57:27.350000
2 posts
🟠 CVE-2026-44925 - High (8.8)
Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations Manager (VIOM) allows an attacker to force the user with an active session into clicking a malicious HTML link, which triggers unintended modifications on VIOM web app...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44925/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44925 - High (8.8)
Cross-Site Request Forgery (CSRF) vulnerability in InfoScale v.9.1.3 Operations Manager (VIOM) allows an attacker to force the user with an active session into clicking a malicious HTML link, which triggers unintended modifications on VIOM web app...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44925/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:56:46.883000
1 posts
🟠 CVE-2026-9111 - High (8.8)
Use after free in WebRTC in Google Chrome on Linux prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9111/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:56:43.173000
1 posts
🟠 CVE-2026-9112 - High (8.8)
Use after free in GPU in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9112/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:56:26.853000
1 posts
🟠 CVE-2026-9114 - High (8.8)
Use after free in QUIC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9114/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:45:44.400000
1 posts
🟠 CVE-2026-9117 - High (7.5)
Type Confusion in GFX in Google Chrome on Linux, ChromeOS prior to 148.0.7778.179 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9117/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:45:19.020000
1 posts
🟠 CVE-2026-9118 - High (8.8)
Use after free in XR in Google Chrome on Windows prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9118/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:44:34.153000
1 posts
🟠 CVE-2026-9119 - High (8.8)
Heap buffer overflow in WebRTC in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9119/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:41:34.767000
1 posts
🟠 CVE-2026-9120 - High (8.8)
Use after free in WebRTC in Google Chrome prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9120/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:35:19.957000
1 posts
🟠 CVE-2026-9121 - High (8.8)
Out of bounds read in GPU in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9121/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:31:56.420000
1 posts
🟠 CVE-2026-9123 - High (7.5)
Heap buffer overflow in Chromecast in Google Chrome on Android, Linux, ChromeOS prior to 148.0.7778.179 allowed a local attacker to execute arbitrary code inside a sandbox via malicious network traffic. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9123/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:23:01.260000
1 posts
🟠 CVE-2026-9126 - High (8.8)
Use after free in DOM in Google Chrome on prior to 148.0.7778.179 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9126/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:16:23.157000
2 posts
2 repos
updated 2026-05-21T16:04:53.813000
2 posts
🟠 CVE-2026-47373 - High (7.5)
Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks.
These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-47373 - High (7.5)
Crypt::SaltedHash versions through 0.09 for Perl is susceptible to timing attacks.
These versions use Perl's built-in eq comparison. Discrepencies in timing could be used to guess the underlying hash.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47373/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:04:53.813000
1 posts
⚠️ CRITICAL: CVE-2026-23734 in XWiki Platform (xwiki-commons) allows unauthenticated path traversal — attackers can read config files via crafted 'resource' parameters. Patch to 18.1.0-rc-1, 17.10.3, 17.4.9, or 16.10.17+ now! https://radar.offseq.com/threat/cve-2026-23734-cwe-23-relative-path-traversal-in-x-16518aab #OffSeq #xwiki #vuln
##updated 2026-05-21T16:04:53.813000
1 posts
🚨 CRITICAL: CVE-2026-33137 impacts XWiki Platform (<16.10.17, <17.4.9, <17.10.3, <18.1.0-rc-1). Unauthenticated users can create/modify documents via missing auth on POST /wikis/{wikiName}. Patch now! https://radar.offseq.com/threat/cve-2026-33137-cwe-862-missing-authorization-in-xw-b0399ab5 #OffSeq #XWiki #CVE #Infosec
##updated 2026-05-21T16:04:53.813000
1 posts
🟠 CVE-2026-40092 - High (7.5)
nimiq-blockchain provides persistent block storage for Nimiq's Rust implementation. In versions 1.3.0 and below, a malicious network peer can crash any Nimiq full node by publishing a crafted Kademlia DHT record. The maliciously crafted record wou...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40092/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T16:04:33.830000
1 posts
#OT #Advisory VDE-2026-052
CODESYS Visualization - Insufficiently Protected Credentials
A vulnerability in the CODESYS Visualization login dialog has been identified. During logins within the CODESYS Visualization, authentication data may not be sufficiently isolated when multiple users perform login operations concurrently.
#CVE CVE-2026-0393
https://certvde.com/en/advisories/vde-2026-052/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-07_vde-2026-052.json
##updated 2026-05-21T15:34:18
1 posts
🟠 CVE-2025-71213 - High (7.8)
An origin validation error vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:34:17
3 posts
4 repos
https://github.com/puj790201-lab/CVE-2026-5118
https://github.com/Jenderal92/CVE-2026-5118
🔴 CVE-2026-5118 - Critical (9.8)
The Divi Form Builder plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 5.1.2. This is due to the plugin accepting a user-controlled 'role' parameter from POST data during user registration without valida...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5118/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 CRITICAL vuln in Divi Form Builder (≤5.1.2) — improper privilege management lets attackers create admin accounts via role parameter abuse. Restrict registration & watch for patches! CVE-2026-5118 https://radar.offseq.com/threat/cve-2026-5118-cwe-269-improper-privilege-managemen-c310b7ad #OffSeq #WordPress #CVE20265118 #Infosec
##🚨 CRITICAL: CVE-2026-5118 in Divi Form Builder (≤5.1.2) lets unauth'd users gain admin privileges via unvalidated 'role' parameter. Disable registration & monitor for patches! https://radar.offseq.com/threat/cve-2026-5118-cwe-269-improper-privilege-managemen-c310b7ad #OffSeq #WordPress #PrivilegeEscalation #Vuln
##updated 2026-05-21T15:34:17
2 posts
🔴 CVE-2025-71211 - Critical (9.8)
A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71211/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-71210 - Critical (9.8)
A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations.
Please note: although this vulnerability carries a technical critical CVSS rat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71210/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:34:17
1 posts
🔴 CVE-2025-71211 - Critical (9.8)
A vulnerability in the Trend Micro Apex One management console could allow a remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is similar in scope to CVE-2025-71210 but affects a different ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71211/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:34:17
1 posts
🟠 CVE-2025-13479 - High (7.5)
Authorization bypass through User-Controlled key vulnerability in PosCube Hardware Software and Consulting Ltd. QR Menu allows Exploitation of Trusted Identifiers.
This issue affects QR Menu: through 21052026. NOTE: The vendor was contacted earl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-13479/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:34:07
1 posts
🔴 CVE-2026-47372 - Critical (9.1)
Crypt::SaltedHash versions through 0.09 for Perl generate insecure random values for salts.
These versions use the built-in rand function, which is predictable and unsuitable for cryptography.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47372/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:27:51.530000
1 posts
🟠 CVE-2026-42001 - High (7.5)
Insufficient Validation of Autoprimary SOA Queries
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:26:35.653000
2 posts
🟠 CVE-2026-24218 - High (8.1)
NVIDIA DGX OS contains a vulnerability in the factory provisioning process, where the cloning of a base image causes identical SSH host keys to be deployed across multiple systems. The sharing of cryptographic identifiers across all similarly pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-24218 - High (8.1)
NVIDIA DGX OS contains a vulnerability in the factory provisioning process, where the cloning of a base image causes identical SSH host keys to be deployed across multiple systems. The sharing of cryptographic identifiers across all similarly pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:26:35.653000
1 posts
🔴 CVE-2026-5433 - Critical (9.1)
Honeywell Control
Network Module (CNM) contains command injection vulnerability
in the web interface. An attacker could exploit this vulnerability via command
delimiters, potentially resulting in Remote Code Execution (RCE).
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5433/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:26:35.653000
1 posts
🟠 CVE-2026-2740 - High (8.4)
Zohocorp ManageEngine ADSelfService Plus version before 6525, DataSecurity Plus before 6264 and RecoveryManager Plus before 6313 are vulnerable to Authenticated Remote code execution in the agent machines due to the bug in the 3rd party dependency.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2740/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:26:35.653000
1 posts
🟠 CVE-2026-24188 - High (8.2)
NVIDIA TensorRT contains a vulnerability where an attacker could cause an out-of-bounds write. A successful exploit of this vulnerability might lead to data tampering.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-24188/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:24:25.330000
17 posts
6 repos
https://github.com/HORKimhab/CVE-2026-9082
https://github.com/7h30th3r0n3/CVE-2026-9082-Drupal-PoC
https://github.com/0xBlackash/CVE-2026-9082
https://github.com/ridhinva/CVE-2026-9082
🟡 New security advisory:
CVE-2026-9082 affects multiple systems.
• Impact: Security weakness that could be exploited
• Risk: Potential for targeted attacks
• Mitigation: Schedule patching in your next maintenance window
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-9082-drupal-core-sqli-actively-exploited-poc
🔍 Drupal Core SQL Injection Vulnerability Added to KEV Catalog
📝 Drupal Core CVE-2026-9082 exploited, poses significant risk to federal networks.
📰 Alerts
##🚨 [CISA-2026:0522] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0522)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-9082 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-9082)
- Name: Drupal Core SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Drupal
- Product: Core
- Notes: https://www.drupal.org/sa-core-2026-004 ; https://nvd.nist.gov/vuln/detail/CVE-2026-9082
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260522 #cisa20260522 #cve_2026_9082 #cve20269082
##CVE ID: CVE-2026-9082
Vendor: Drupal
Product: Core
Date Added: 2026-05-22
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-9082
Keys to the Kingdom: Anonymous SQL Injection in Drupal Core (CVE-2026-9082) https://slcyber.io/research-center/keys-to-the-kingdom-anonymous-sql-injection-in-drupal-core-cve-2026-9082/
##Drupal Sites Targeted in SQL Injection Attacks
Drupal sites are under attack as SQL injection exploits are now being detected in the wild, taking advantage of a vulnerability that can be triggered without authentication. This critical flaw, CVE-2026-9082, allows attackers to execute arbitrary SQL and potentially run remote code, putting sites that use PostgreSQL at risk.
#SqlInjection #Drupal #Cve20269082 #EmergingThreats #ArbitraryCodeExecution
##Faille Drupal critique : injection SQL via PostgreSQL (CVE-2026-9082)
##🔍 Drupal Core SQL Injection Vulnerability Added to KEV Catalog
📝 Drupal Core CVE-2026-9082 exploited, poses significant risk to federal networks.
📰 Alerts
##🚨 [CISA-2026:0522] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0522)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-9082 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-9082)
- Name: Drupal Core SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Drupal
- Product: Core
- Notes: https://www.drupal.org/sa-core-2026-004 ; https://nvd.nist.gov/vuln/detail/CVE-2026-9082
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260522 #cisa20260522 #cve_2026_9082 #cve20269082
##CVE ID: CVE-2026-9082
Vendor: Drupal
Product: Core
Date Added: 2026-05-22
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-9082
Keys to the Kingdom: Anonymous SQL Injection in Drupal Core (CVE-2026-9082) https://slcyber.io/research-center/keys-to-the-kingdom-anonymous-sql-injection-in-drupal-core-cve-2026-9082/
##Drupal Sites Targeted in SQL Injection Attacks
Drupal sites are under attack as SQL injection exploits are now being detected in the wild, taking advantage of a vulnerability that can be triggered without authentication. This critical flaw, CVE-2026-9082, allows attackers to execute arbitrary SQL and potentially run remote code, putting sites that use PostgreSQL at risk.
#SqlInjection #Drupal #Cve20269082 #EmergingThreats #ArbitraryCodeExecution
##Faille Drupal critique : injection SQL via PostgreSQL (CVE-2026-9082)
##🛡️ Drupal corregge una falla SQL: aggiornare subito è la miglior difesa, perché gli exploit potrebbero arrivare a breve. #Drupal #CyberSecurity
🔗 https://www.tomshw.it/hardware/drupal-cve-2026-9082-sql-injection-postgresql
##🚨 Drupal sites using PostgreSQL face a highly critical SQL injection vuln (CVE-2026-9082), risking RCE & data exposure. Patch versions 11.3, 11.2, 10.6, 10.5.x ASAP. Update Symfony & Twig too. No active exploitation yet. https://radar.offseq.com/threat/drupal-patches-highly-critical-vulnerability-expos-a1486e66 #OffSeq #Drupal #SQLInjection #Infosec
##Drupal – CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web https://www.it-connect.fr/drupal-cve-2026-9082-cette-faille-critique-de-type-injection-sql-menace-les-sites-web/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Web
##Si votre CMS est un #Drupal, ou si vous connaissez quelqu’un qui administre un site Drupal : c’est le moment de vérifier la version.
La faille CVE-2026-9082 touche Drupal Core avec base PostgreSQL : injection SQL critique, exploitable sans compte, pouvant mener à fuite de données, élévation de privilèges voire RCE selon le contexte.
À corriger en priorité :
Drupal 10.5 → 10.5.10
Drupal 10.6 → 10.6.9
Drupal 11.2 → 11.2.12
Drupal 11.3 → 11.3.10
MySQL/MariaDB ne semblent pas concernés par cette SQLi, mais les mises à jour incluent aussi Symfony/Twig : patch recommandé pour tout le monde.
👇
https://www.drupal.org/sa-core-2026-004
"Drupal – CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web"
👇
https://www.it-connect.fr/drupal-cve-2026-9082-cette-faille-critique-de-type-injection-sql-menace-les-sites-web/
🔍 (à noter la diff entre estimation LLM VLAI et attribution CVSS officielle en Medium)
👇
https://vulnerability.circl.lu/vuln/CVE-2026-9082
💬
⬇️
https://infosec.pub/
updated 2026-05-21T15:24:25.330000
1 posts
🟠 CVE-2026-9157 - High (8.4)
Improper input validation, Unrestricted upload of file with dangerous type vulnerability in Gmission Web Fax allows Remote Code Inclusion.
This issue affects Web Fax: from 3.0 before 3.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9157/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:24:25.330000
1 posts
⚠️ CRITICAL: Frappe LMS <2.50.1 is vulnerable (CVE-2026-39405, CVSS 9.4). Path traversal lets course editors write files outside restricted dirs via SCORM ZIP upload. Upgrade to 2.50.1 ASAP! https://radar.offseq.com/threat/cve-2026-39405-cwe-22-improper-limitation-of-a-pat-fc462187 #OffSeq #infosec #vuln #FrappeLMS
##updated 2026-05-21T15:24:25.330000
1 posts
🟠 CVE-2026-39310 - High (8.6)
Trilium Notes is a cross-platform, hierarchical note taking application focused on building large personal knowledge bases. In versions 0.102.1 and prior, the Clipper API in Trilium Desktop (v0.101.3) allows full authentication bypass when running...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39310/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:24:25.330000
1 posts
🟠 CVE-2026-40165 - High (8.7)
authentik is an open-source identity provider. Versions 2025.12.4 and prior, and versions 2026.2.0-rc1 through 2026.2.2 were vulnerable to Authentication Bypass through SAML NameID XML Comment Injection. Due to how authentik extracted the NameID v...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40165/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:24:25.330000
1 posts
🟠 CVE-2026-9133 - High (7.7)
Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform ar...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9133/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🟠 CVE-2026-44052 - High (7.5)
Netatalk 2.1.0 through 4.4.2 inserts LDAP simple-bind passwords into log output in cleartext, which allows an attacker with access to the log files to obtain LDAP credentials.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44052/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🔴 CVE-2026-44050 - Critical (9.9)
A heap-based buffer overflow in the CNID daemon comm_rcv() function in Netatalk 2.0.0 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code with escalated privileges or cause a denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44050/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🟠 CVE-2026-44049 - High (7.5)
An out-of-bounds write due to improper null termination in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44049/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🟠 CVE-2026-44048 - High (8.8)
A stack-based buffer overflow via UCS-2 type confusion in convert_charset() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44048/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🟠 CVE-2026-44047 - High (8.8)
An SQL injection vulnerability in the MySQL CNID backend in Netatalk 3.1.0 through 4.4.2 allows a remote authenticated attacker to obtain unauthorized access to data, modify data, or cause a denial of service.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44047/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🟠 CVE-2026-44062 - High (7.5)
A missing output length bounds check in pull_charset_flags() in Netatalk 2.0.4 through 4.4.2 allows a remote authenticated attacker to execute arbitrary code or cause a denial of service via crafted character set data.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🟠 CVE-2026-44060 - High (7.5)
An integer underflow in dsi_writeinit() in Netatalk 1.5.0 through 4.4.2 allows a remote unauthenticated attacker to cause a denial of service via a crafted DSI write request.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44060/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🟠 CVE-2026-44055 - High (7.5)
A logic error involving bitwise OR operations in Netatalk 3.1.4 through 4.4.2 allows a remote authenticated attacker to inject OS commands and execute arbitrary code.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44055/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:20:19.040000
1 posts
🟠 CVE-2026-44068 - High (7.6)
Incomplete sanitization of extended attribute (EA) path components in Netatalk 2.1.0 through 4.4.2 allows a remote authenticated attacker to write to files outside the intended metadata namespace via crafted EA names.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44068/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:19:30.540000
2 posts
🚨 CRITICAL: Avada (Fusion) Builder ≤3.15.2 has unauth RCE bug (CVE-2026-6279). Attackers can run PHP via exposed AJAX endpoint. Disable plugin or restrict access ASAP. Patch status: unconfirmed. https://radar.offseq.com/threat/cve-2026-6279-cwe-74-improper-neutralization-of-sp-f70da2f6 #OffSeq #WordPress #CVE20266279 #infosec
##🔴 CVE-2026-6279 - Critical (9.8)
The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthenticated Remote Code Execution via PHP Function Injection in versions up to and including 3.15.2. This is due to the `wp_conditional_tags` case in `Fusion_Builder_Cond...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6279/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:19:30.540000
1 posts
🔴 CVE-2026-45444 - Critical (10)
Unrestricted Upload of File with Dangerous Type vulnerability in WP Swings Gift Cards For WooCommerce Pro allows Using Malicious Files.
This issue affects Gift Cards For WooCommerce Pro: from n/a through 4.2.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45444/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:17:59.850000
2 posts
🔐 CVE-2026-9139: Taiko AG1000-01A SMS Alert Gateway (Revs 7.3, 8, UM-AG1000_R7.2) has a CRITICAL flaw (CVSS 9.8) — hard-coded admin creds in client JS. No patch yet. Restrict access, isolate device, monitor closely. https://radar.offseq.com/threat/cve-2026-9139-cwe-798-use-of-hard-coded-credential-8aa594cc #OffSeq #Vulnerability #CVE20269139
##🔴 CVE-2026-9139 - Critical (9.8)
Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a hard-coded credential vulnerability in the embedded web configuration interface where authentication is implemented entirely in client-side JavaScript in login.zhtml, exposing static ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9139/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:17:59.850000
2 posts
🚨 CVE-2026-9141 (CRITICAL, CVSS 9.8): Taiko AG1000-01A SMS Alert Gateway web config lets unauthenticated attackers get full admin rights. No patch available — restrict access & monitor now. https://radar.offseq.com/threat/cve-2026-9141-cwe-306-missing-authentication-for-c-ffd85a83 #OffSeq #CVE #IoTSecurity #Vuln
##🔴 CVE-2026-9141 - Critical (9.8)
Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains an authentication bypass vulnerability in the embedded web configuration interface that allows unauthenticated attackers to access internal application pages without any session managem...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9141/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:17:59.850000
1 posts
🟠 CVE-2026-9144 - High (7.6)
Taiko AG1000-01A SMS Alert Gateway Rev 7.3 and Rev 8 contains a stored cross-site scripting vulnerability in the embedded web configuration interface that allows authenticated attackers to execute persistent JavaScript by fragmenting malicious pay...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9144/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:16:22.223000
1 posts
🟠 CVE-2025-71217 - High (7.8)
An origin validation error vulnerability in the Trend Micro Apex One (mac) agent self-protection mechanism could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71217/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:16:22.037000
1 posts
🟠 CVE-2025-71216 - High (7.8)
A time-of-check time-of-use vulnerability in the Trend Micro Apex One (mac) agent cache mechanism could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute l...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71216/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:16:21.100000
1 posts
🟠 CVE-2025-71214 - High (7.8)
An origin validation error vulnerability in the Trend Micro Apex One (mac) agent iCore service could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:05:28.023000
1 posts
🟠 CVE-2025-71212 - High (7.8)
A link following vulnerability in the Trend Micro Apex One scan engine could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-71212/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:05:28.023000
1 posts
🟠 CVE-2026-34930 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.
Please note: an ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34930/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:05:28.023000
4 posts
🟠 CVE-2026-34930 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different process protection mechanism.
Please note: an ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34930/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34929 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.
Please ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34929/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34928 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.
Please not...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34928/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34927 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target system...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34927/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:05:28.023000
1 posts
🟠 CVE-2026-34929 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different inter-process communication mechanism.
Please ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34929/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:05:28.023000
1 posts
🟠 CVE-2026-34928 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-34927 but exists in a different named pipe communication mechanism.
Please not...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34928/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:05:28.023000
2 posts
🟠 CVE-2026-45206 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism.
Pl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45206/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45207 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism.
Pl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45207/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:05:28.023000
2 posts
🟠 CVE-2026-45206 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45207 but exists in a different process protection communication mechanism.
Pl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45206/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45207 - High (7.8)
An origin validation vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations. This is similar to CVE-2026-45206 but exists in a different process protection communication mechanism.
Pl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45207/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T15:05:28.023000
1 posts
🟠 CVE-2026-45208 - High (7.8)
A time-of-check time-of-use vulnerability in the Apex One/SEP agent could allow a local attacker to escalate privileges on affected installations.
Please note: an attacker must first obtain the ability to execute low-privileged code on the target...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-21T12:57:17.353000
1 posts
4 repos
https://github.com/NoTrustedx/Exploit_MS08-067
https://github.com/thunderstrike9090/Conflicker_analysis_scripts
🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0520)
CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-4250 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-4250)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 ; https://nvd.nist.gov/vuln/detail/CVE-2008-4250
⚠️ CVE-2009-1537 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-1537)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 ; https://nvd.nist.gov/vuln/detail/CVE-2009-1537
⚠️ CVE-2009-3459 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-3459)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: https://www.cisa.gov/news-events/alerts/2009/10/13/adobe-reader-and-acrobat-vulnerabilities ; https://web.archive.org/web/20120324170253/http://www.adobe.com/support/security/bulletins/apsb09-15.html#:~:text=CVE%2D2009%2D3459).-,NOTE%3A,-There%20are%20reports ; https://nvd.nist.gov/vuln/detail/CVE-2009-3459
⚠️ CVE-2010-0249 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0249)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/979352 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0249
⚠️ CVE-2010-0806 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0806)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806
⚠️ CVE-2026-41091 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-41091)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091
⚠️ CVE-2026-45498 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-45498)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-45498 ; https://nvd.nist.gov/vuln/detail/CVE-2026-45498
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498
##updated 2026-05-21T12:57:12.850000
1 posts
🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0520)
CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-4250 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-4250)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 ; https://nvd.nist.gov/vuln/detail/CVE-2008-4250
⚠️ CVE-2009-1537 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-1537)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 ; https://nvd.nist.gov/vuln/detail/CVE-2009-1537
⚠️ CVE-2009-3459 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-3459)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: https://www.cisa.gov/news-events/alerts/2009/10/13/adobe-reader-and-acrobat-vulnerabilities ; https://web.archive.org/web/20120324170253/http://www.adobe.com/support/security/bulletins/apsb09-15.html#:~:text=CVE%2D2009%2D3459).-,NOTE%3A,-There%20are%20reports ; https://nvd.nist.gov/vuln/detail/CVE-2009-3459
⚠️ CVE-2010-0249 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0249)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/979352 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0249
⚠️ CVE-2010-0806 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0806)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806
⚠️ CVE-2026-41091 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-41091)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091
⚠️ CVE-2026-45498 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-45498)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-45498 ; https://nvd.nist.gov/vuln/detail/CVE-2026-45498
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498
##updated 2026-05-21T12:57:10.303000
1 posts
🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0520)
CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-4250 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-4250)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 ; https://nvd.nist.gov/vuln/detail/CVE-2008-4250
⚠️ CVE-2009-1537 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-1537)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 ; https://nvd.nist.gov/vuln/detail/CVE-2009-1537
⚠️ CVE-2009-3459 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-3459)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: https://www.cisa.gov/news-events/alerts/2009/10/13/adobe-reader-and-acrobat-vulnerabilities ; https://web.archive.org/web/20120324170253/http://www.adobe.com/support/security/bulletins/apsb09-15.html#:~:text=CVE%2D2009%2D3459).-,NOTE%3A,-There%20are%20reports ; https://nvd.nist.gov/vuln/detail/CVE-2009-3459
⚠️ CVE-2010-0249 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0249)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/979352 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0249
⚠️ CVE-2010-0806 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0806)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806
⚠️ CVE-2026-41091 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-41091)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091
⚠️ CVE-2026-45498 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-45498)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-45498 ; https://nvd.nist.gov/vuln/detail/CVE-2026-45498
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498
##updated 2026-05-21T12:57:01.463000
1 posts
🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0520)
CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-4250 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-4250)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 ; https://nvd.nist.gov/vuln/detail/CVE-2008-4250
⚠️ CVE-2009-1537 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-1537)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 ; https://nvd.nist.gov/vuln/detail/CVE-2009-1537
⚠️ CVE-2009-3459 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-3459)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: https://www.cisa.gov/news-events/alerts/2009/10/13/adobe-reader-and-acrobat-vulnerabilities ; https://web.archive.org/web/20120324170253/http://www.adobe.com/support/security/bulletins/apsb09-15.html#:~:text=CVE%2D2009%2D3459).-,NOTE%3A,-There%20are%20reports ; https://nvd.nist.gov/vuln/detail/CVE-2009-3459
⚠️ CVE-2010-0249 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0249)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/979352 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0249
⚠️ CVE-2010-0806 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0806)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806
⚠️ CVE-2026-41091 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-41091)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091
⚠️ CVE-2026-45498 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-45498)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-45498 ; https://nvd.nist.gov/vuln/detail/CVE-2026-45498
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498
##updated 2026-05-21T12:56:49.133000
1 posts
🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0520)
CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-4250 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-4250)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 ; https://nvd.nist.gov/vuln/detail/CVE-2008-4250
⚠️ CVE-2009-1537 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-1537)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 ; https://nvd.nist.gov/vuln/detail/CVE-2009-1537
⚠️ CVE-2009-3459 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-3459)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: https://www.cisa.gov/news-events/alerts/2009/10/13/adobe-reader-and-acrobat-vulnerabilities ; https://web.archive.org/web/20120324170253/http://www.adobe.com/support/security/bulletins/apsb09-15.html#:~:text=CVE%2D2009%2D3459).-,NOTE%3A,-There%20are%20reports ; https://nvd.nist.gov/vuln/detail/CVE-2009-3459
⚠️ CVE-2010-0249 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0249)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/979352 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0249
⚠️ CVE-2010-0806 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0806)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806
⚠️ CVE-2026-41091 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-41091)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091
⚠️ CVE-2026-45498 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-45498)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-45498 ; https://nvd.nist.gov/vuln/detail/CVE-2026-45498
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498
##updated 2026-05-21T09:32:16
1 posts
🟠 CVE-2026-44051 - High (8.1)
An improper link resolution vulnerability in Netatalk 3.0.2 through 4.4.2 allows a remote authenticated attacker to read arbitrary files or overwrite arbitrary files via attacker-controlled symlink creation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44051/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-20T22:51:43.680000
2 posts
🔴 CVE-2026-42960 - Critical (10)
NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning via promiscuous records for the authority section. Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42960/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-42960 - Critical (10)
NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to poisoning via promiscuous records for the authority section. Promiscuous RRSets that complement DNS replies in the authority section can be used to trick Unbound to cache such ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42960/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-20T22:49:46.850000
2 posts
🟠 CVE-2026-41292 - High (7.5)
NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41292/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41292 - High (7.5)
NLnet Labs Unbound up to and including version 1.25.0 is vulnerable to a degradation of service attack related to parsing long lists of incoming EDNS options. An adversary sending queries with too many EDNS options can hold Unbound threads hostage...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41292/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-20T21:31:29
9 posts
4 repos
https://github.com/0xBlackash/CVE-2026-46333
https://github.com/Aurillium/public-passwd
To update the linux kernel for some recent local privilege escalation bugs CVE-2026-43284, CVE-2026-46333, CVE-2026-46300 (we do have some mitigations installed) we will have to reboot it yet again. We'll do that around 16:15 UTC today (in about 3.5 hours from now). If everything goes according to plan then this should not take more than a couple of minutes. This will briefly interrupt some services for sourceware.org, valgrind.org, cygwin.com, gcc.gnu.org, elfutils.org and dwarfstd.org.
##I have no words.
---
9-Year-Old Linux Kernel Flaw Enables Root Command Execution on Major Distros
https://thehackernews.com/2026/05/9-year-old-linux-kernel-flaw-enables.html?m=1
> CVE-2026-46333 is a nine-year Linux kernel improper privilege management flaw introduced in November 2016 with a CVSS score of 5.5.
##Logic bug in the #Linux kernel's __ptrace_may_access() function
(CVE-2026-46333)
https://cdn2.qualys.com/advisory/2026/05/20/cve-2026-46333-ptrace.txt
##Logic bug in the Linux kernel's __ptrace_may_access() function (CVE-2026-46333) https://lobste.rs/s/nwdn3w #linux #security
https://cdn2.qualys.com/advisory/2026/05/20/cve-2026-46333-ptrace.txt
updated 2026-05-20T20:16:40.517000
2 posts
🟠 CVE-2026-44926 - High (8.8)
InfoScale CmdServer before 7.4.2 mishandles access control.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44926/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44926 - High (8.8)
InfoScale CmdServer before 7.4.2 mishandles access control.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44926/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-20T19:06:36.850000
5 posts
2 repos
🖲️ #Noticia de #CiberSeguridad #CiberGuerra #CiberAtaque #CiberNoticia
⚫ Actualizaciones para Microsoft Defender y Trend Micro
🔗 http://blog.segu-info.com.ar/2026/05/actualizaciones-para-dos-zero-day-en.html
El miércoles, Microsoft comenzó a implementar parches de seguridad para dos
vulnerabilidades de Defender que han sido explotadas en ataques Zero-Day.
La primera, identificada como
CVE-2026-41091, es una vulnerabilidad de escalamiento de privilegios que afecta a Microsoft
📰 Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges
⚠️ ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow
🌐 cyber[.]netsecops[.]io
##Microsoft Patches Actively Exploited Defender Vulnerabilities Affecting Enterprise Systems
Microsoft has confirmed active exploitation of two security vulnerabilities in its security ecosystem, identified as CVE-2026-41091 and...
🔗️ [Thecyberexpress] https://link.is.it/oRM68F
##Microsoft Patches Actively Exploited Defender Vulnerabilities
Microsoft and CISA confirmed active exploitation of vulnerabilities in Microsoft Defender, including a privilege escalation flaw (CVE-2026-41091) and a denial-of-service bug (CVE-2026-45498).
**Check that your Microsoft Defender engine version is 1.1.26040.8 or higher to ensure you are protected against these active exploits. While updates are usually automatic, manual verification is necessary for critical systems to confirm the patches were applied.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/microsoft-patches-actively-exploited-defender-vulnerabilities-0-b-g-y-f/gD2P6Ple2L
🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0520)
CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-4250 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-4250)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 ; https://nvd.nist.gov/vuln/detail/CVE-2008-4250
⚠️ CVE-2009-1537 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-1537)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 ; https://nvd.nist.gov/vuln/detail/CVE-2009-1537
⚠️ CVE-2009-3459 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-3459)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: https://www.cisa.gov/news-events/alerts/2009/10/13/adobe-reader-and-acrobat-vulnerabilities ; https://web.archive.org/web/20120324170253/http://www.adobe.com/support/security/bulletins/apsb09-15.html#:~:text=CVE%2D2009%2D3459).-,NOTE%3A,-There%20are%20reports ; https://nvd.nist.gov/vuln/detail/CVE-2009-3459
⚠️ CVE-2010-0249 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0249)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/979352 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0249
⚠️ CVE-2010-0806 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0806)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806
⚠️ CVE-2026-41091 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-41091)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091
⚠️ CVE-2026-45498 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-45498)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-45498 ; https://nvd.nist.gov/vuln/detail/CVE-2026-45498
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498
##updated 2026-05-20T19:05:46.837000
3 posts
1 repos
📰 Warning: Microsoft Defender Flaws Actively Exploited to Gain SYSTEM Privileges
⚠️ ACTIVE EXPLOITATION ALERT: Flaws in Microsoft Defender (CVE-2026-41091, CVE-2026-45498) are being used by attackers to gain SYSTEM privileges and disable AV. Patch the Malware Protection Engine immediately! #CyberSecurity #Vulnerability #PatchNow
🌐 cyber[.]netsecops[.]io
##Microsoft Patches Actively Exploited Defender Vulnerabilities
Microsoft and CISA confirmed active exploitation of vulnerabilities in Microsoft Defender, including a privilege escalation flaw (CVE-2026-41091) and a denial-of-service bug (CVE-2026-45498).
**Check that your Microsoft Defender engine version is 1.1.26040.8 or higher to ensure you are protected against these active exploits. While updates are usually automatic, manual verification is necessary for critical systems to confirm the patches were applied.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/microsoft-patches-actively-exploited-defender-vulnerabilities-0-b-g-y-f/gD2P6Ple2L
🚨 [CISA-2026:0520] CISA Adds 7 Known Exploited Vulnerabilities to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0520)
CISA has added 7 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2008-4250 (https://secdb.nttzen.cloud/cve/detail/CVE-2008-4250)
- Name: Microsoft Windows Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Windows
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-067 ; https://nvd.nist.gov/vuln/detail/CVE-2008-4250
⚠️ CVE-2009-1537 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-1537)
- Name: Microsoft DirectX NULL Byte Overwrite Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: DirectX
- Notes: https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 ; https://nvd.nist.gov/vuln/detail/CVE-2009-1537
⚠️ CVE-2009-3459 (https://secdb.nttzen.cloud/cve/detail/CVE-2009-3459)
- Name: Adobe Acrobat and Reader Heap-Based Buffer Overflow Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Adobe
- Product: Acrobat and Reader
- Notes: https://www.cisa.gov/news-events/alerts/2009/10/13/adobe-reader-and-acrobat-vulnerabilities ; https://web.archive.org/web/20120324170253/http://www.adobe.com/support/security/bulletins/apsb09-15.html#:~:text=CVE%2D2009%2D3459).-,NOTE%3A,-There%20are%20reports ; https://nvd.nist.gov/vuln/detail/CVE-2009-3459
⚠️ CVE-2010-0249 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0249)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/SecurityAdvisories/2010/979352 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0249
⚠️ CVE-2010-0806 (https://secdb.nttzen.cloud/cve/detail/CVE-2010-0806)
- Name: Microsoft Internet Explorer Use-After-Free Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Internet Explorer
- Notes: https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806
⚠️ CVE-2026-41091 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-41091)
- Name: Microsoft Defender Link Following Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-41091 ; https://nvd.nist.gov/vuln/detail/CVE-2026-41091
⚠️ CVE-2026-45498 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-45498)
- Name: Microsoft Defender Denial of Service Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Defender
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-45498 ; https://nvd.nist.gov/vuln/detail/CVE-2026-45498
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260520 #cisa20260520 #cve_2008_4250 #cve_2009_1537 #cve_2009_3459 #cve_2010_0249 #cve_2010_0806 #cve_2026_41091 #cve_2026_45498 #cve20084250 #cve20091537 #cve20093459 #cve20100249 #cve20100806 #cve202641091 #cve202645498
##updated 2026-05-20T18:56:32.350000
3 posts
1 repos
"No way to prevent this" say users of only language where this regularly happens
https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45584/
"No way to prevent this" say u...
"No way to prevent this" say users of only language where this regularly happens
##https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-45584
One job. You had one job.
##Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.
updated 2026-05-20T17:30:43.320000
1 posts
NVIDIA Patches Critical Authentication Bypass in Triton Inference Server
NVIDIA patched eight vulnerabilities in its Triton Inference Server, including a critical authentication bypass (CVE-2026-24207) that allow unauthenticated remote attackers to execute code, steal data, or disrupt AI model serving operations.
**Make sure your NVIDIA Triton Inference Servers are isolated from the internet and accessible only from trusted networks. Then update all Triton Inference Servers to release r26.03 or later ASAP, especially if they are exposed on the internet.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/nvidia-patches-critical-authentication-bypass-in-triton-inference-server-p-g-a-8-j/gD2P6Ple2L
updated 2026-05-20T17:30:40.450000
3 posts
1 repos
Cisco Secure Workload Flaw CVE-2026-20223 Gets Maximum CVSS 10 Rating
Cisco has released security updates to fix a critical vulnerability, tracked as CVE-2026-20223, affecting its Cisco Secure Workload platform. The
🔗️ [Thecyberexpress] https://link.is.it/oVchv5
##Max severity #Cisco Secure Workload flaw gives Site #Admin privileges..Cisco has released security updates to address a maximum-severity Secure Workload #vulnerability that allows attackers to gain Site Admin privileges.Tracked as CVE-2026-20223, the security flaw was found in Secure Workload's internal REST APIs, and it enables unauthenticated attackers to access resources with the privileges of the Site Admin role.#cybersec #security #security #cyber #sec
##Cisco Patches Critical CVSS 10.0 Authentication Bypass in Secure Workload
Cisco patched a critical CVSS 10.0 vulnerability in Secure Workload that allows unauthenticated attackers to gain Site Admin privileges via crafted API calls. The flaw enables unauthorized data access and configuration changes across tenant boundaries in both SaaS and on-premises environments.
**Make sure your Cisco Secure Workload clusters are isolated from the internet and accessible only from trusted networks. If you run on-premises Cisco Secure Workload, immediately update to version 3.10.8.3 or 4.0.3.17 to patch CVE-2026-20223; if you're on versions 3.9 or older, plan a migration to a supported patched release since no direct updates are available.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/cisco-patches-critical-cvss-10-0-authentication-bypass-in-secure-workload-e-r-6-z-j/gD2P6Ple2L
updated 2026-05-20T16:42:42.177000
2 posts
2 repos
Microsoft Issues Emergency Mitigation for YellowKey BitLocker Bypass
Microsoft released emergency mitigations for a BitLocker bypass vulnerability (CVE-2026-45585) that allows attackers with physical access to access encrypted data via the Windows Recovery Environment.
**To protect against the YellowKey physical bypass attack switch your BitLocker configuration from TPM-only to TPM+PIN configuration. Relying on hardware-only secrets is no longer sufficient when the boot process itself can be manipulated. IT teams should also manually modify their WinRE images to remove the autofstx.exe entry from the registry until Microsoft releases an official, permanent patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/microsoft-issues-emergency-mitigation-for-yellowkey-bitlocker-bypass-8-8-6-n-a/gD2P6Ple2L
🚨 CVE-2026-45585 (YellowKey)
Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as "YellowKey". The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices.
We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-45585
#nttdata #zen #secdb #infosec
#yellowkey #microsoft #bitlocker #cve202645585
updated 2026-05-20T14:17:02.973000
1 posts
Another one from the Lulz Department: how about an RCE in your assembler?
"CVE-2026-6068 – From Heap UAF to Persistent RCE in NASM":
##updated 2026-05-20T14:02:12.280000
1 posts
🟠 CVE-2026-9064 - High (7.5)
A flaw was found in 389-ds-base. The get_ldapmessage_controls_ext() function in the LDAP server does not enforce an upper bound on the number of controls per LDAP message. A remote, unauthenticated attacker can send a specially crafted LDAP reques...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-9064/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-20T14:01:24.027000
1 posts
🟠 CVE-2026-44933 - High (7.8)
`PluginScript` attempts to `chroot` the plugin to the `repoManagerRoot`, this root is frequently `/` (the system root) in standard configurations or when using `--root`. If the chroot target is `/`, it is a no-op, allowing the traversed path to ex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44933/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-20T13:54:54.890000
1 posts
🟠 CVE-2026-5200 - High (8.8)
The AcyMailing – An Ultimate Newsletter Plugin and Marketing Automation Solution for WordPress plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 10.8.2. This is due to the plugin not properly verifying...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-5200/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T19:32:38.777000
1 posts
StubZero: $148,337 RCE in Google Cloud Production
구글 클라우드의 내부 API에서 디버깅 엔드포인트 정보 유출이 원인이 되어 CVE-2026-2031로 지정된 원격 코드 실행(RCE) 취약점이 발견되었습니다. 이 취약점은 protobuf 기반 gRPC 서비스의 프로토콜 정의와 내부 워크플로우 큐 정보 노출을 통해 악용 가능했으며, 구글의 내부 인증 체계와 Stubby RPC 인프라를 악용해 권한 상승 및 코드 실행이 가능했습니다. 연구자는 이 문제를 발견 후 즉시 보고하여 신속히 대응되었으며, 구글 클라우드의 Application Integration 워크플로우와 관련된 보안 모델의 복잡성을 드러냈습니다. 이 사례는 대규모 클라우드 서비스에서 내부 API...
##updated 2026-05-18T14:59:59.747000
1 posts
Patch Today: CVE-2026-6473 #postgres https://thebuild.com/blog/2026/05/21/patch-today-cve-2026-6473/
##updated 2026-05-15T19:35:52.963000
1 posts
1 repos
⚪️ Microsoft warns of attacks exploiting zero‑day vulnerability in Exchange Server
🗨️ Microsoft specialists have warned about attacks targeting a new zero-day vulnerability in Exchange Server, identified as CVE-2026-42897. The issue affects Exchange Server 2016, 2019, and Subscription Edition (SE). Since a full patch is not yet available, the company suggests using…
##updated 2026-05-14T18:34:38.530000
1 posts
7 repos
https://github.com/tocong282/CVE-2026-44578-PoC
https://github.com/0xBlackash/CVE-2026-44578
https://github.com/dinosn/CVE-2026-44578
https://github.com/love07oj/nextjs-cve-2026-44578
https://github.com/ynsmroztas/nextssrf
https://horizon3.ai/attack-research/vulnerabilities/cve-2026-44578/
##CVE-2026-44578 is a High-severity server-side request forgery vulnerability affecting self-hosted Next.js applications that use the built-in Node.js server. The vulnerability exists in WebSocket upgrade request handling, where crafted requests can cause the server to proxy connections to arbitrary internal or external destinations. Vercel-hosted deployments are not affected.
updated 2026-05-14T18:33:53
1 posts
31 repos
https://github.com/linnemanlabs/dirtyfrag-arm64
https://github.com/whosfault/CVE-2026-43284
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/ChernStepanov/DirtyFrag-for-dummies
https://github.com/liamromanis101/DirtyFrag-Detector
https://github.com/grabesec/XCP_ng_CVE-2026-43284_tester
https://github.com/suominen/CVE-2026-43284
https://github.com/scriptzteam/Paranoid-Dirty-Frag-CVE-2026-43284
https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
https://github.com/krisiasty/vcheck
https://github.com/FrosterDL/CVE-2026-43284
https://github.com/First-John/cve_2026_frag_family_fix
https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
https://github.com/XRSecCD/202605_dirty_frag
https://github.com/Aiyakami/rust_dirtyfrag
https://github.com/LucasPDiniz/CVE-2026-43284
https://github.com/metalx1993/dirtyfrag-patches
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://github.com/xd20111/CVE-2026-43284
https://github.com/ryan2929/CVE-2026-43284-
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/0xBlackash/CVE-2026-43284
https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe
https://github.com/kuniyal08/Dirty-Frag-CVE-2026-43284
https://github.com/dixyes/dirtypatch
https://github.com/Koshmare-Blossom/DirtyFrag-go
https://github.com/haydenjames/dirty-frag-check
https://github.com/AK777177/Dirty-Frag-Analysis
https://github.com/Percivalll/Dirty-Frag-Kubernetes-PoC
https://github.com/0xlane/pagecache-guard
https://github.com/6abc/Copy-Fail-CVE-2026-31431-dirty-frag-CVE-2026-43284
To update the linux kernel for some recent local privilege escalation bugs CVE-2026-43284, CVE-2026-46333, CVE-2026-46300 (we do have some mitigations installed) we will have to reboot it yet again. We'll do that around 16:15 UTC today (in about 3.5 hours from now). If everything goes according to plan then this should not take more than a couple of minutes. This will briefly interrupt some services for sourceware.org, valgrind.org, cygwin.com, gcc.gnu.org, elfutils.org and dwarfstd.org.
##updated 2026-05-14T17:52:50.143000
2 posts
3 repos
https://github.com/piffd0s/ntoskrnl-metadata
CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox - VoidSec
https://voidsec.com/cve-2026-40369-browser-sandbox-escape/
Read on HackerWorkspace: https://hackerworkspace.com/article/cve-2026-40369-twelve-bytes-to-escape-the-browser-sandbox-voidsec
##CVE-2026-40369: Twelve Bytes to Escape the Browser Sandbox https://voidsec.com/cve-2026-40369-browser-sandbox-escape/
##updated 2026-05-13T18:17:47.830000
1 posts
2 repos
https://github.com/tstephens1080/palo-alto-cve-2026-0265-checker
When Your VPN Opens Your Private Network to the Public https://www.hacktron.ai/blog/cve-2026-0265-panos-globalprotect-cas-auth-bypass
##updated 2026-05-13T14:02:20.380000
2 posts
CVE-2026-28910: Breaking macOS App Sandbox Data Containers, TCC, and Hijacking Apps Using Archive Utility https://mysk.blog/2026/05/19/cve-2026-28910/
##CVE-2026-28910: Breaking macOS App Sandbox Data Containers, TCC, and Hijacking Apps Using Archive Utility https://mysk.blog/2026/05/19/cve-2026-28910/
##updated 2026-05-12T13:31:01
3 posts
3 repos
https://github.com/vognik/CVE-2026-26980
https://github.com/dinosn/ghost-cve-2026-26980
https://github.com/Kulik-Labs-Development/Ghost-CMS-Code-Injection-Audit-CVE-2026-26980
XLab researchers show how threat actors exploited CVE-2026-26980 to compromise Ghost CMS, causing numerous websites to become accomplices in ClickFix attacks. https://blog.xlab.qianxin.com/ghost-cms-page-poisoning-cve-2026-26980/
##Thanks again! Yeah the read access from the SQL injection allowed exfiltration of admin API keys at which point game over. I don't see any malicious themes or changes to the theme file ... instead it seems like it was the vulnerability descried in https://blog.xlab.qianxin.com/ghost-cms-mass-compromised-via-cve-2026-26980-now-fueling-clickfix-attacks/ (which I don't think had been published yet when I was doing the cleanup, or at least I didn't find it in my searching). Basically the hack edited every posts to put in a script in the "codeinjection_footer" field that brings the payload in from a malware site.
There aren't any obvious signs of LPE exploitation but who knows ... another good argument for spinning up a new instance.
@mildsunrise @JadedBlueEyes @thenexusofprivacy@gotosocial.thenexus.today
##A hacking campaign is planting FakeCaptcha pages and malware on websites built with the Ghost CMS.
The attacks began this month and are exploiting a vulnerability disclosed in February
##updated 2026-05-10T21:16:28.247000
2 posts
RE: https://mastodon.social/@wollman/116615093350624840
@distrowatch @kaidenshi @brnrd
<https://vuxml.freebsd.org/freebsd/30bda1c3-369b-11f1-b51c-6dd25bec137b.html> for CVE-2026-1502, one of the five vulnerable ports is deprecated but not yet expired.
295200 – lang/python314: Update to 3.14.5 — <https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=295200>
285957 – lang/python312 as default python — <https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=285957>
Cc @dvl
##Really feels like @dvl and I are the only people who actually read our #FreeBSD package security alerts, given the apparent complete lack of urgency on the part of anyone else to fix the two-months-outstanding lang/python* CVEs like CVE-2026-1502.
##updated 2026-05-07T15:15:06.770000
1 posts
1 repos
https://github.com/minanagehsalalma/cve-2026-34474-zte-h298a-h108n-sensitive-data-exposure
CVE-2026-34474: Pre-auth credential disclosure in ZTE H298A / H108N via ETHCheat https://minanagehsalalma.github.io/cve-2026-34474-zte-h298a-h108n-sensitive-data-exposure/
##updated 2026-05-04T14:16:35.190000
2 posts
updated 2026-04-30T18:33:16.693000
2 posts
@simontatham Oh, excellent! Now the patch management system I have at work will stop moaning about CVE-2026-4115.
##@simontatham Oh, excellent! Now the patch management system I have at work will stop moaning about CVE-2026-4115.
##updated 2026-04-29T01:00:01.613000
2 posts
2 repos
How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102) https://securelist.com/exiftool-compromise-mac/119866/
##How an image could compromise your Mac: understanding an ExifTool vulnerability (CVE-2026-3102)
#CVE_2026_3102
https://securelist.com/exiftool-compromise-mac/119866/
updated 2026-04-21T19:02:35.430000
1 posts
CVE-2013-0422 - Changed to Known Ransomware Status
Oracle JRE Remote Code Execution VulnerabilityVendor: OracleProduct: Java Runtime Environment (JRE)A vulnerability in the way Java restricts the permissions of Java applets could allow an attacker to execute commands on a vulnerable system.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: May 21, 2026 at 18:00:35 UTCDate Added to KEV: 2022-05-25View CVE https://nvd.nist.gov/vuln/detail/CVE-2013-0422
##updated 2026-04-15T00:35:42.020000
2 posts
CVE-2025-23256 - High severity info disclosure in Nvidia BlueField. Local access allows config tampering, DoS, privilege escalation. CVSS 8.7. No patch yet. Monitor for updates. #CVE #Nvidia #infosec
##CVE-2025-23256 - High severity info disclosure in Nvidia BlueField. Local access allows config tampering, DoS, privilege escalation. CVSS 8.7. No patch yet. Monitor for updates. #CVE #Nvidia #infosec
##updated 2026-02-20T17:25:10.630000
1 posts
2 repos
Reading the Prompt You Did Not Send: Detection at the Inference Boundary
이 글은 AI 에이전트 추론 경계에서 발생하는 간접 프롬프트 인젝션 공격과 이를 탐지하는 기술을 다룹니다. Microsoft 365 Copilot에서 발견된 CVE-2025-32711 사례를 중심으로, LLM이 자신의 컨텍스트 내 민감 정보를 악용해 외부로 유출하는 문제를 설명합니다. 현재 여러 탐지기 조합(ensemble) 기법이 80~90%대 정확도로 운영 중이나, 완전한 해결책은 아니며, 2026년까지 이어지는 관련 CVE 사례들이...
##updated 2026-01-23T15:14:26
1 posts
🚨 EUVD-2026-31432
📊 Score: n/a
📦 Product: Apache CXF, Apache CXF, Apache CXF
🏢 Vendor: Apache Software Foundation
📅 Updated: 2026-05-22
📝 The fix for CVE-2025-48913: Apache CXF: Untrusted JMS configuration can lead to RCE was not complete, meaning that another path in the code might lead to code execution capabilities, if untrusted users are allowed to configure ...
🔗 https://euvd.enisa.europa.eu/vulnerability/EUVD-2026-31432
##updated 2025-11-06T16:50:47.130000
2 posts
44 repos
https://github.com/aamfrk/Webmin-CVE-2019-15107
https://github.com/ch4ko/webmin_CVE-2019-15107
https://github.com/K3ysTr0K3R/CVE-2019-15107-EXPLOIT
https://github.com/g0db0x/CVE_2019_15107
https://github.com/darrenmartyn/CVE-2019-15107
https://github.com/TheAlpha19/MiniExploit
https://github.com/jas502n/CVE-2019-15107
https://github.com/olingo99/CVE-2019-15107
https://github.com/CyberTuz/CVE-2019-15107_detection
https://github.com/squid22/Webmin_CVE-2019-15107
https://github.com/hannob/webminex
https://github.com/MuirlandOracle/CVE-2019-15107
https://github.com/wenruoya/CVE-2019-15107
https://github.com/NasrallahBaadi/CVE-2019-15107
https://github.com/n0obit4/Webmin_1.890-POC
https://github.com/AdministratorGithub/CVE-2019-15107
https://github.com/ArtemCyberLab/Project-Exploitation-of-Webmin-Authentication-Vulnerability
https://github.com/kh4sh3i/Webmin-CVE
https://github.com/ianxtianxt/CVE-2019-15107
https://github.com/0x4r2/Webmin-CVE-2019-15107
https://github.com/viglia/cve-2019-15107
https://github.com/f0rkr/CVE-2019-15107
https://github.com/merlin-ke/CVE_2019_15107
https://github.com/ketlerd/CVE-2019-15107
https://github.com/Rayferrufino/Make-and-Break
https://github.com/AleWong/WebminRCE-EXP-CVE-2019-15107-
https://github.com/whokilleddb/CVE-2019-15107
https://github.com/HACHp1/webmin_docker_and_exp
https://github.com/Mattb709/CVE-2019-15107-Webmin-RCE-PoC
https://github.com/bayazid-bit/CVE-2019-15107
https://github.com/hadrian3689/webmin_1.920
https://github.com/EdouardosStav/CVE-2019-15107-RCE-WebMin
https://github.com/gozn/detect-CVE-2019-15107-by-pyshark
https://github.com/ruthvikvegunta/CVE-2019-15107
https://github.com/h4ck0rman/CVE-2019-15107
https://github.com/g1vi/CVE-2019-15107
https://github.com/hacknotes/CVE-2019-15107-Exploit
https://github.com/psw01/CVE-2019-15107_webminRCE
https://github.com/cdedmondson/Modified-CVE-2019-15107
https://github.com/Mattb709/CVE-2019-15107-Scanner
https://github.com/adampawelczyk/cve-2019-15107
https://github.com/diegojuan/CVE-2019-15107
CVE-2019-15107 - Changed to Known Ransomware Status
Webmin Command Injection VulnerabilityVendor: WebminProduct: WebminAn issue was discovered in Webmin. The parameter old in password_change.cgi contains a command injection vulnerability.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: May 22, 2026 at 19:00:35 UTCDate Added to KEV: 2022-03-25View CVE Details
##CVE-2019-15107 - Changed to Known Ransomware Status
Webmin Command Injection VulnerabilityVendor: WebminProduct: WebminAn issue was discovered in Webmin. The parameter old in password_change.cgi contains a command injection vulnerability.Status changed from Unknown to Known for ransomware campaign usage.Flip detected on: May 22, 2026 at 19:00:35 UTCDate Added to KEV: 2022-03-25View CVE Details
##updated 2025-10-22T00:31:30
3 posts
7 repos
https://github.com/Ridter/RTF_11882_0802
https://github.com/roninAPT/CVE-2018-0802
https://github.com/Abdibimantara/Maldoc-Analysis
https://github.com/likekabin/CVE-2018-0802_CVE-2017-11882
https://github.com/Palvinder-Singh/PS_CVE2018-0802
Cloud Atlas APT campaigns targeting Russia & Belarus are leveraging phishing, CVE-2018-0802, SSH tunnels, and a new “PowerCloud” tool that exfiltrates data into Google Sheets.
##Cloud Atlas Expands Arsenal with New Tools, Payloads
Cloud Atlas is beefing up its toolkit with fresh tools and payloads, including a blast from the past - the notorious CVE-2018-0802 Microsoft Office Equation Editor vulnerability. The group is also reviving its use of ZIP archives with malicious LNK shortcuts that trigger PowerShell scripts, keeping security experts on high alert.
#CloudAtlas #Cve20180802 #MicrosoftOffice #Powershell #LnkShortcut
##Cloud Atlas APT campaigns targeting Russia & Belarus are leveraging phishing, CVE-2018-0802, SSH tunnels, and a new “PowerCloud” tool that exfiltrates data into Google Sheets.
##updated 2025-09-19T19:33:43.980000
1 posts
Mass Exploitation of Four-Faith Industrial Routers for Botnet Expansion
Threat actors are conducting mass exploitation of a critical hard-coded credential flaw (CVE-2024-9643) in Four-Faith industrial routers to build botnets and gain footholds in corporate networks.
**Make sure all your Four-Faith industrial routers are isolated from the internet and only accessible from trusted networks. Then immediately update to the latest firmware to patch CVE-2024-9643, and disable the web management interface on any public-facing ports.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/mass-exploitation-of-four-faith-industrial-routers-for-botnet-expansion-v-x-5-k-e/gD2P6Ple2L
updated 2025-01-09T15:32:58
3 posts
SonicWall warned in a security advisory for CVE-2024-12802 that installing the firmware update alone on Gen6 devices does not fully mitigate the vulnerability, and a manual reconfiguration of the LDAP server is required. https://www.bleepingcomputer.com/news/security/hackers-bypass-sonicwall-vpn-mfa-due-to-incomplete-patching/
##SonicWall warned in a security advisory for CVE-2024-12802 that installing the firmware update alone on Gen6 devices does not fully mitigate the vulnerability, and a manual reconfiguration of the LDAP server is required. https://www.bleepingcomputer.com/news/security/hackers-bypass-sonicwall-vpn-mfa-due-to-incomplete-patching/
##updated 2024-11-21T05:55:19.590000
1 posts
Here's the last one in our series of blogs on the unpatchable vulnerabilities of #Kubernetes, with CVE-2021-25740
https://securitylabs.datadoghq.com/articles/unpatchable-kubernetes-vulnerabilities-cve-2021-25740/
##updated 2023-01-29T05:02:05
2 posts
1 repos
https://github.com/minanagehsalalma/zyxel-cve-2021-35036-super-admin-password-leak
Zyxel low-priv account leaked super-admin, FTPS, and TR-069 secrets across router fleets https://minanagehsalalma.github.io/zyxel-cve-2021-35036-super-admin-password-leak/
##Zyxel low-priv account leaked super-admin, FTPS, and TR-069 secrets across router fleets https://minanagehsalalma.github.io/zyxel-cve-2021-35036-super-admin-password-leak/
##🚨 CRITICAL: CVE-2026-33843 in Microsoft Entra (Azure AD B2C) allows remote auth bypass (CVSS 9.1). Patch released — Microsoft manages remediation. No known exploits. Check advisory & verify your cloud config. https://radar.offseq.com/threat/cve-2026-33843-cwe-288-authentication-bypass-using-57b6f0a6 #OffSeq #AzureAD #CloudSecurity #CVE202633843
##🚨 CRITICAL: CVE-2026-33843 in Microsoft Entra (Azure AD B2C) allows remote auth bypass (CVSS 9.1). Patch released — Microsoft manages remediation. No known exploits. Check advisory & verify your cloud config. https://radar.offseq.com/threat/cve-2026-33843-cwe-288-authentication-bypass-using-57b6f0a6 #OffSeq #AzureAD #CloudSecurity #CVE202633843
##🛡️ CRITICAL: CVE-2026-41104 in Microsoft Planetary Computer Pro (GeoCatalog) enables remote, unauthenticated info disclosure via insecure deserialization. Patch now — official fix available. Details: https://radar.offseq.com/threat/cve-2026-41104-cwe-502-deserialization-of-untruste-e4c1701e #OffSeq #Vulnerability #InfoSec #Microsoft
##🛡️ CRITICAL: CVE-2026-41104 in Microsoft Planetary Computer Pro (GeoCatalog) enables remote, unauthenticated info disclosure via insecure deserialization. Patch now — official fix available. Details: https://radar.offseq.com/threat/cve-2026-41104-cwe-502-deserialization-of-untruste-e4c1701e #OffSeq #Vulnerability #InfoSec #Microsoft
##⚠️ CRITICAL: CVE-2026-42901 in Microsoft Entra (CVSS 10) enables remote privilege escalation via origin validation error. Patch now to prevent full system compromise! Fix: https://radar.offseq.com/threat/cve-2026-42901-cwe-346-origin-validation-error-in--0744f928 #OffSeq #MicrosoftEntra #Vulnerability #Cybersecurity
##⚠️ CRITICAL: CVE-2026-42901 in Microsoft Entra (CVSS 10) enables remote privilege escalation via origin validation error. Patch now to prevent full system compromise! Fix: https://radar.offseq.com/threat/cve-2026-42901-cwe-346-origin-validation-error-in--0744f928 #OffSeq #MicrosoftEntra #Vulnerability #Cybersecurity
##The previous announced sibling vulnerability to "nginx rift" has been fixed by F5 and has been assigned CVE-2026-9256):
https://my.f5.com/manage/s/article/K000161377
This was previously called "nginx-poolslip" (https://nitter.net/nebusecurity/status/2057071579876753643) and is a DoS with possible RCE ("if the attacker can bypass ASLR" - not sure how?), using a similar regex capture vector.
Wouldn't be surprised if this is the new norm: one vuln lands, everybody points their AI at that attack vector and discovers sibling vulns.
##Another vuln in NGINX rewriting. Looks pretty similar to the last one. Requires ASLR bypass or disabled for RCE.
https://my.f5.com/manage/s/article/K000161377
##NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when a rewrite directive uses a regex pattern with distinct, overlapping Perl-Compatible Regular Expression (PCRE) captures (for example, /((.*))$) and a replacement string that references multiple such captures (for example, $1$2) in a redirect or arguments context. An unauthenticated attacker along with conditions beyond their control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, attackers can execute code on systems with Address Space Layout Randomization (ASLR) disabled or when the attacker can bypass ASLR. (CVE-2026-9256)
CVE-2026-9256 - "nginx-poolslip", another new vulnerability in the rewrite module https://my.f5.com/manage/s/article/K000161377
##The previous announced sibling vulnerability to "nginx rift" has been fixed by F5 and has been assigned CVE-2026-9256):
https://my.f5.com/manage/s/article/K000161377
This was previously called "nginx-poolslip" (https://nitter.net/nebusecurity/status/2057071579876753643) and is a DoS with possible RCE ("if the attacker can bypass ASLR" - not sure how?), using a similar regex capture vector.
Wouldn't be surprised if this is the new norm: one vuln lands, everybody points their AI at that attack vector and discovers sibling vulns.
##Another vuln in NGINX rewriting. Looks pretty similar to the last one. Requires ASLR bypass or disabled for RCE.
https://my.f5.com/manage/s/article/K000161377
##NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when a rewrite directive uses a regex pattern with distinct, overlapping Perl-Compatible Regular Expression (PCRE) captures (for example, /((.*))$) and a replacement string that references multiple such captures (for example, $1$2) in a redirect or arguments context. An unauthenticated attacker along with conditions beyond their control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, attackers can execute code on systems with Address Space Layout Randomization (ASLR) disabled or when the attacker can bypass ASLR. (CVE-2026-9256)
CVE-2026-9256 - "nginx-poolslip", another new vulnerability in the rewrite module https://my.f5.com/manage/s/article/K000161377
##[oss-security] Evince/Atril/Xreader command injection CVE-2026-46529 https://lobste.rs/s/rlpzut #linux #security
https://lwn.net/ml/all/ce81312b-99e1-4305-a816-e74b2bd1ffd5@app.fastmail.com/
POC for CVE-2026-46529 – RCE via PDF argv injection
CVE-2026-46529는 Linux용 PDF 뷰어인 Evince, Atril, Xreader에서 발견된 원격 코드 실행(RCE) 취약점으로, 악성 PDF 파일 내에 특수하게 조작된 argv 인젝션을 통해 공격자가 임의 코드를 실행할 수 있다. 공격자는 PDF 내에 ELF 공유 라이브러리와 PDF를 겸하는 폴리글롯 파일을 삽입하고, %f 치환자를 이용해 런타임 경로를 동적으로 해결하여 피해자의 시스템에서 쉘을 획득한다. GTK4 기반 최신 Evince에서는 일부 공격 경로가 차단되었으나 GTK3 기반 배포판은 여전히 취약하며, 근본적 해결책은 명령어 인자를 안전하게 처리하는 것이다.
##[oss-security] Evince/Atril/Xreader command injection CVE-2026-46529 https://lobste.rs/s/rlpzut #linux #security
https://lwn.net/ml/all/ce81312b-99e1-4305-a816-e74b2bd1ffd5@app.fastmail.com/
https://www.cve.org/CVERecord?id=CVE-2026-8992
An improper certificate validation vulnerability in Ivanti Secure Access Client before 22.8R6 allows a remote unauthenticated attacker to execute arbitrary code.
OwO
Signed my separation agreement today, here is hoping the next shop doesnt have me deal with Ivanti..
##https://www.cve.org/CVERecord?id=CVE-2026-8992
An improper certificate validation vulnerability in Ivanti Secure Access Client before 22.8R6 allows a remote unauthenticated attacker to execute arbitrary code.
OwO
Signed my separation agreement today, here is hoping the next shop doesnt have me deal with Ivanti..
##2 posts
8 repos
https://github.com/ExploitEoom/CVE-2026-46300
https://github.com/Sentebale/CVE-2026-46300
https://github.com/HORKimhab/CVE-2026-46300
https://github.com/First-John/cve_2026_frag_family_fix
https://github.com/Maxime288/Fragnesia-CVE-2026-46300
https://github.com/0xBlackash/CVE-2026-46300
https://github.com/Koshmare-Blossom/Fragnesia-go
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
To update the linux kernel for some recent local privilege escalation bugs CVE-2026-43284, CVE-2026-46333, CVE-2026-46300 (we do have some mitigations installed) we will have to reboot it yet again. We'll do that around 16:15 UTC today (in about 3.5 hours from now). If everything goes according to plan then this should not take more than a couple of minutes. This will briefly interrupt some services for sourceware.org, valgrind.org, cygwin.com, gcc.gnu.org, elfutils.org and dwarfstd.org.
##New.
Picus: Fragnesia CVE-2026-46300: Linux Kernel LPE Vulnerability Explained https://www.picussecurity.com/resource/blog/fragnesia-cve-2026-46300-linux-kernel-lpe-vulnerability-explained #threatresearch #Linux #infosec #vulnerability
##STER (Centralny Instytut Ochrony Pracy) faces a HIGH severity SQL Injection (CVE-2026-25606, CVSS 8.7). Authenticated attackers can access sensitive data via search filters. Patch by upgrading to v9.5. 🛡️ https://radar.offseq.com/threat/cve-2026-25606-cwe-89-improper-neutralization-of-s-41b4f04f #OffSeq #SQLInjection #Vuln #Infosec
##🟠 CVE-2026-8679 - High (7.5)
The AudioIgniter plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 2.0.2. This is due to the handle_playlist_endpoint() function (hooked to template_redirect) accepting a user-controlled playl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8679/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔈 CVE-2026-8679 (HIGH): AudioIgniter Music Player plugin ≤2.0.2 lets unauthenticated attackers access any playlist's metadata — including private & draft tracks — via insecure playlist ID handling. Restrict access & monitor for patches. https://radar.offseq.com/threat/cve-2026-8679-cwe-639-authorization-bypass-through-07a73ddb #OffSeq #WordPress #Vuln
##CVE-2026-47243: Kata Containers guest-root to host-root escape via virtiofs https://lobste.rs/s/blhd1c #security #virtualization
https://www.openwall.com/lists/oss-security/2026/05/21/14
... they also managed to call dibs on CVE-2026-0001 :party_porg2:
##General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正
https://github.com/misskey-dev/misskey/releases/tag/2026.5.4
##General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正
https://github.com/misskey-dev/misskey/releases/tag/2026.5.4
##General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正
https://github.com/misskey-dev/misskey/releases/tag/2026.5.4
##General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正
https://github.com/misskey-dev/misskey/releases/tag/2026.5.4
##General セキュリティに関する修正 GHSA-2m3r-xx7x-63j6 (CVE-2026-46712) GHSA-w8x2-gpq6-jxvf (CVE-2026-46713) GHSA-38jx-423m-g387 (CVE-2026-47746) GHSA-wmhf-m93m-rgmj (CVE-2026-46714) GHSA-j49q-76hx-mv8f (CVE-2026-48115) Client Fix: ビルドに失敗することがある問題を修正
https://github.com/misskey-dev/misskey/releases/tag/2026.5.4
##