##
Updated at UTC 2026-05-12T23:46:26.668565
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-45185 | 9.8 | 0.00% | 13 | 1 | 2026-05-12T21:16:16.807000 | Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable u | |
| CVE-2026-35071 | 8.2 | 0.00% | 2 | 0 | 2026-05-12T19:49:35.160000 | Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper ne | |
| CVE-2026-41712 | 7.5 | 0.03% | 4 | 0 | 2026-05-12T19:26:04.083000 | Spring AI's chat memory component contained a problematic default that, when not | |
| CVE-2026-44277 | 9.8 | 0.00% | 3 | 0 | 2026-05-12T18:57:02.307000 | A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, Fo | |
| CVE-2026-28972 | 6.5 | 0.02% | 2 | 0 | 2026-05-12T18:30:37 | An out-of-bounds write issue was addressed with improved input validation. This | |
| CVE-2026-44183 | 9.8 | 0.00% | 2 | 0 | 2026-05-12T18:17:29.427000 | Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in | |
| CVE-2026-44167 | 7.5 | 0.00% | 2 | 0 | 2026-05-12T18:17:29.273000 | phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3 | |
| CVE-2026-42899 | 7.5 | 0.00% | 1 | 0 | 2026-05-12T18:17:26.733000 | Loop with unreachable exit condition ('infinite loop') in ASP.NET Core allows an | |
| CVE-2026-41096 | 9.8 | 0.00% | 2 | 0 | 2026-05-12T18:17:21.167000 | Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attac | |
| CVE-2026-41089 | 9.8 | 0.00% | 2 | 0 | 2026-05-12T18:17:20.720000 | Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker | |
| CVE-2026-35433 | 7.3 | 0.00% | 2 | 0 | 2026-05-12T18:17:13.710000 | Improper input validation in .NET allows an unauthorized attacker to elevate pri | |
| CVE-2026-32177 | 7.3 | 0.00% | 2 | 0 | 2026-05-12T18:16:58.947000 | Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate pr | |
| CVE-2026-32175 | 4.3 | 0.00% | 1 | 0 | 2026-05-12T18:16:58.737000 | A tampering vulnerability exists when .NET Core improperly handles specially cra | |
| CVE-2026-6722 | 9.8 | 0.29% | 2 | 0 | 2026-05-12T17:48:21.643000 | In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, a | |
| CVE-2026-43992 | 9.8 | 0.00% | 4 | 0 | 2026-05-12T17:16:21.240000 | JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-securit | |
| CVE-2026-42860 | 8.5 | 0.03% | 2 | 0 | 2026-05-12T16:50:08.553000 | The Open edx Enterprise Service app provides enterprise features to the Open edX | |
| CVE-2026-5084 | 6.5 | 0.01% | 2 | 0 | 2026-05-12T16:48:58.260000 | WebDyne::Session versions through 2.075 for Perl generates the session id insecu | |
| CVE-2026-2465 | 8.8 | 0.04% | 4 | 0 | 2026-05-12T16:47:58.570000 | Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering | |
| CVE-2026-6001 | 8.8 | 0.04% | 2 | 0 | 2026-05-12T16:47:58.570000 | Authorization bypass through User-Controlled key vulnerability in ABIS Technolog | |
| CVE-2026-42609 | 8.1 | 0.04% | 2 | 0 | 2026-05-12T16:16:54.790000 | Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a business logic vulne | |
| CVE-2026-42612 | 8.5 | 0.03% | 2 | 0 | 2026-05-12T16:16:40.253000 | Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a stored Cross-Site Sc | |
| CVE-2026-43937 | 8.8 | 0.00% | 2 | 0 | 2026-05-12T16:16:18.740000 | YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin O | |
| CVE-2026-28986 | 7.5 | 0.02% | 2 | 0 | 2026-05-12T15:32:40 | A race condition was addressed with additional validation. This issue is fixed i | |
| CVE-2026-8111 | 8.8 | 0.00% | 2 | 0 | 2026-05-12T15:31:52 | SQL injection in the web console of Ivanti Endpoint Manager before version 2024 | |
| CVE-2026-8110 | 7.8 | 0.00% | 4 | 0 | 2026-05-12T15:31:49 | Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before | |
| CVE-2026-8043 | 9.6 | 0.00% | 4 | 0 | 2026-05-12T15:31:49 | External control of a file name in Ivanti Xtraction before version 2026.2 allows | |
| CVE-2026-7432 | 7.8 | 0.00% | 2 | 0 | 2026-05-12T15:31:48 | A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally a | |
| CVE-2026-0300 | 9.8 | 6.22% | 2 | 8 | 2026-05-12T15:31:19 | A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Capti | |
| CVE-2026-31431 | 7.8 | 4.06% | 10 | 100 | 2026-05-12T15:31:18 | In the Linux kernel, the following vulnerability has been resolved: crypto: alg | |
| CVE-2026-7287 | 7.5 | 0.26% | 2 | 0 | 2026-05-12T15:11:29.503000 | ** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep() | |
| CVE-2026-7256 | 8.8 | 0.83% | 2 | 0 | 2026-05-12T15:11:29.503000 | ** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI pro | |
| CVE-2026-45091 | 9.1 | 0.00% | 2 | 0 | 2026-05-12T15:09:10 | In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embe | |
| CVE-2026-8162 | 7.5 | 0.04% | 4 | 0 | 2026-05-12T15:08:22.857000 | multiparty@4.2.3 and lower versions are vulnerable to denial of service via unca | |
| CVE-2026-8159 | 7.5 | 0.04% | 2 | 0 | 2026-05-12T15:08:22.857000 | multiparty@4.2.3 and lower versions are vulnerable to denial of service via regu | |
| CVE-2026-45223 | 8.8 | 0.08% | 2 | 0 | 2026-05-12T14:47:42.170000 | Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coor | |
| CVE-2026-45006 | 8.8 | 0.11% | 2 | 0 | 2026-05-12T14:20:56.547000 | OpenClaw before 2026.4.23 contains an improper access control vulnerability in t | |
| CVE-2026-34263 | 9.6 | 0.02% | 6 | 0 | 2026-05-12T14:19:41.400000 | Due to improper Spring Security configuration, SAP Commerce cloud allows an unau | |
| CVE-2026-34260 | 9.6 | 0.01% | 6 | 0 | 2026-05-12T14:19:41.400000 | SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerabil | |
| CVE-2026-34259 | 8.2 | 0.01% | 2 | 0 | 2026-05-12T14:19:41.400000 | Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, | |
| CVE-2025-40946 | 8.3 | 0.02% | 2 | 0 | 2026-05-12T14:19:41.400000 | A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blu | |
| CVE-2025-40949 | 9.1 | 0.17% | 2 | 0 | 2026-05-12T14:19:41.400000 | A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.1 | |
| CVE-2025-40947 | 7.5 | 0.23% | 2 | 0 | 2026-05-12T14:19:41.400000 | A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.1 | |
| CVE-2026-25786 | 9.1 | 0.04% | 2 | 0 | 2026-05-12T14:19:41.400000 | Affected devices do not properly validate and sanitize PLC/station name rendered | |
| CVE-2026-27662 | 7.7 | 0.03% | 2 | 0 | 2026-05-12T14:19:41.400000 | Affected devices do not properly restrict access to the web browser via the Cont | |
| CVE-2026-44412 | 7.8 | 0.01% | 2 | 0 | 2026-05-12T14:19:41.400000 | A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 | |
| CVE-2026-32658 | 8.0 | 0.04% | 2 | 0 | 2026-05-12T14:17:10.613000 | Dell Automation Platform versions prior to 2.0.0.0, contains a missing authoriza | |
| CVE-2026-42869 | 10.0 | 0.12% | 2 | 0 | 2026-05-12T14:17:05.463000 | SOCFortress CoPilot focuses on providing a single pane of glass for all your sec | |
| CVE-2026-35227 | 0 | 0.10% | 2 | 0 | 2026-05-12T14:15:46.747000 | An unauthenticated remote attacker may exhaust all available TCP connections in | |
| CVE-2026-4890 | 7.5 | 0.18% | 2 | 0 | 2026-05-12T14:15:46.747000 | A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allo | |
| CVE-2026-43441 | 7.5 | 0.05% | 2 | 0 | 2026-05-12T14:10:27.343000 | In the Linux kernel, the following vulnerability has been resolved: net: bondin | |
| CVE-2026-43437 | 7.8 | 0.01% | 2 | 0 | 2026-05-12T14:10:27.343000 | In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: | |
| CVE-2026-43456 | 7.8 | 0.01% | 2 | 0 | 2026-05-12T14:10:27.343000 | In the Linux kernel, the following vulnerability has been resolved: bonding: fi | |
| CVE-2026-43466 | 8.2 | 0.05% | 2 | 0 | 2026-05-12T14:10:27.343000 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: | |
| CVE-2026-43464 | 7.5 | 0.06% | 2 | 0 | 2026-05-12T14:10:27.343000 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: | |
| CVE-2026-39432 | 8.2 | 0.03% | 4 | 0 | 2026-05-12T14:03:52.757000 | Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Inco | |
| CVE-2026-42742 | 8.5 | 0.03% | 2 | 0 | 2026-05-12T14:03:52.757000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-42741 | 8.5 | 0.03% | 2 | 0 | 2026-05-12T14:03:52.757000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-8072 | None | 0.03% | 2 | 0 | 2026-05-12T12:32:23 | Insecure generation of credentials in the local SAT (Technical Support) access f | |
| CVE-2026-25787 | 9.1 | 0.04% | 2 | 0 | 2026-05-12T12:32:22 | Affected devices do not properly validate and sanitize Technology Object (TO) na | |
| CVE-2026-33893 | 7.5 | 0.04% | 2 | 0 | 2026-05-12T12:32:22 | A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.00 | |
| CVE-2026-44411 | 7.8 | 0.01% | 2 | 0 | 2026-05-12T12:32:22 | A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 | |
| CVE-2026-41551 | 9.1 | 0.05% | 2 | 0 | 2026-05-12T12:32:22 | A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected ve | |
| CVE-2026-45214 | 8.5 | 0.03% | 4 | 0 | 2026-05-12T12:32:22 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-45213 | 7.6 | 0.03% | 4 | 0 | 2026-05-12T12:32:22 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-41713 | 8.2 | 0.03% | 2 | 0 | 2026-05-12T12:32:22 | A malicious user could craft input that is stored in conversation memory and lat | |
| CVE-2026-45211 | 8.5 | 0.03% | 2 | 0 | 2026-05-12T12:32:22 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-45218 | 7.7 | 0.03% | 2 | 0 | 2026-05-12T12:32:22 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-40833 | 7.5 | 0.04% | 2 | 0 | 2026-05-12T12:32:21 | The affected devices contain a null pointer dereference vulnerability while proc | |
| CVE-2026-22925 | 7.5 | 0.04% | 2 | 0 | 2026-05-12T12:32:21 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). Th | |
| CVE-2026-22924 | 9.1 | 0.04% | 2 | 0 | 2026-05-12T12:32:14 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). Th | |
| CVE-2025-6577 | 9.8 | 0.03% | 2 | 0 | 2026-05-12T12:32:14 | Improper neutralization of special elements used in an SQL command ('SQL injecti | |
| CVE-2026-2993 | 7.5 | 0.10% | 2 | 0 | 2026-05-12T09:31:33 | The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable | |
| CVE-2026-42882 | 9.4 | 0.12% | 2 | 0 | 2026-05-11T20:25:44.450000 | oxyno-zeta/s3-proxy is an aws s3 proxy written in go. Prior to 5.0.0, s3-proxy c | |
| CVE-2026-42843 | 8.8 | 0.04% | 2 | 0 | 2026-05-11T20:25:42.893000 | Grav API Plugin is a RESTful API for Grav CMS that provides full headless access | |
| CVE-2026-41431 | 8.0 | 0.04% | 2 | 0 | 2026-05-11T19:16:22.897000 | Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Ap | |
| CVE-2026-8177 | 7.5 | 0.02% | 2 | 0 | 2026-05-11T18:32:45 | XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when | |
| CVE-2026-6433 | 7.3 | 0.03% | 2 | 0 | 2026-05-11T18:32:45 | The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize | |
| CVE-2026-44413 | 8.2 | 0.00% | 3 | 0 | 2026-05-11T18:31:59 | In JetBrains TeamCity before 2026.1 2025.11.5 authenticated users could expose s | |
| CVE-2026-43639 | 8.0 | 0.05% | 2 | 0 | 2026-05-11T18:31:59 | Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerabili | |
| CVE-2026-45004 | 7.8 | 0.01% | 2 | 0 | 2026-05-11T18:31:59 | OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in | |
| CVE-2026-33357 | 7.5 | 0.03% | 4 | 0 | 2026-05-11T18:31:55 | In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5. | |
| CVE-2026-33356 | 7.7 | 0.03% | 4 | 0 | 2026-05-11T18:31:55 | In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated l | |
| CVE-2026-33362 | 8.6 | 0.03% | 2 | 0 | 2026-05-11T18:31:55 | In Meari IoT SDK builds embedded in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (b | |
| CVE-2026-33361 | 7.5 | 0.02% | 2 | 0 | 2026-05-11T18:31:54 | In Meari IoT SDK image handling (libmrplayer.so) as observed in CloudEdge 5.5.0 | |
| CVE-2026-33359 | 7.5 | 0.05% | 2 | 0 | 2026-05-11T18:31:54 | In Meari IoT Cloud alert image storage on Alibaba OSS (latest observed; storage | |
| CVE-2026-7815 | 8.8 | 0.05% | 2 | 0 | 2026-05-11T18:31:54 | SQL injection vulnerability in pgAdmin 4 Maintenance Tool. Four user-supplied J | |
| CVE-2026-7813 | 9.9 | 0.06% | 2 | 0 | 2026-05-11T18:31:54 | Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Se | |
| CVE-2026-7819 | 8.1 | 0.04% | 2 | 0 | 2026-05-11T18:31:54 | Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager. check_ | |
| CVE-2026-43640 | 8.1 | 0.06% | 2 | 0 | 2026-05-11T18:16:37.110000 | Bitwarden Server prior to v2026.4.1 does not require master-password re-authenti | |
| CVE-2026-42603 | 8.8 | 0.04% | 2 | 0 | 2026-05-11T18:16:35.887000 | OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses | |
| CVE-2026-7816 | 8.8 | 0.19% | 2 | 0 | 2026-05-11T17:16:35 | OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query exp | |
| CVE-2026-44738 | 7.7 | 0.03% | 2 | 0 | 2026-05-11T17:16:34.747000 | Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-l | |
| CVE-2026-43500 | 7.8 | 0.01% | 13 | 13 | 2026-05-11T17:16:34.290000 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also | |
| CVE-2026-4802 | 8.0 | 0.19% | 2 | 0 | 2026-05-11T15:32:12 | A flaw was found in Cockpit. This vulnerability allows a remote attacker to achi | |
| CVE-2026-8253 | 2.4 | 0.03% | 1 | 0 | 2026-05-11T15:08:09.893000 | A vulnerability was identified in Devs Palace ERP Online up to 4.0.0. Affected b | |
| CVE-2026-40281 | 10.0 | 0.09% | 1 | 1 | 2026-05-11T14:46:07.127000 | Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 an | |
| CVE-2026-40636 | 9.8 | 0.07% | 4 | 0 | 2026-05-11T12:32:39 | Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to | |
| CVE-2025-10470 | 8.6 | 0.05% | 2 | 0 | 2026-05-11T12:32:39 | The Magic Link authentication flow accepts multiple invalid authentication reque | |
| CVE-2026-43438 | 7.8 | 0.01% | 2 | 0 | 2026-05-11T09:31:35 | In the Linux kernel, the following vulnerability has been resolved: sched_ext: | |
| CVE-2026-43452 | 8.2 | 0.05% | 2 | 0 | 2026-05-11T09:31:35 | In the Linux kernel, the following vulnerability has been resolved: netfilter: | |
| CVE-2026-43447 | 7.8 | 0.01% | 2 | 0 | 2026-05-11T09:31:35 | In the Linux kernel, the following vulnerability has been resolved: iavf: fix P | |
| CVE-2026-43461 | 7.8 | 0.01% | 2 | 0 | 2026-05-11T09:31:35 | In the Linux kernel, the following vulnerability has been resolved: spi: amlogi | |
| CVE-2026-43462 | 7.5 | 0.04% | 2 | 0 | 2026-05-11T09:31:35 | In the Linux kernel, the following vulnerability has been resolved: net: spacem | |
| CVE-2026-43434 | 7.8 | 0.01% | 2 | 0 | 2026-05-11T09:31:34 | In the Linux kernel, the following vulnerability has been resolved: rust_binder | |
| CVE-2026-43433 | 7.8 | 0.01% | 2 | 0 | 2026-05-11T09:31:34 | In the Linux kernel, the following vulnerability has been resolved: rust_binder | |
| CVE-2026-43454 | 7.8 | 0.01% | 2 | 0 | 2026-05-11T09:31:34 | In the Linux kernel, the following vulnerability has been resolved: netfilter: | |
| CVE-2026-43469 | 7.5 | 0.05% | 2 | 0 | 2026-05-11T09:31:34 | In the Linux kernel, the following vulnerability has been resolved: xprtrdma: D | |
| CVE-2026-43465 | 9.8 | 0.06% | 2 | 0 | 2026-05-11T09:31:34 | In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: | |
| CVE-2026-43284 | 7.8 | 0.01% | 6 | 20 | 2026-05-11T06:31:33 | In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: | |
| CVE-2026-8274 | 5.3 | 0.01% | 2 | 0 | 2026-05-11T05:16:16.580000 | A security vulnerability has been detected in npitre cramfs-tools up to 2.1. Aff | |
| CVE-2026-8260 | 8.8 | 0.04% | 3 | 1 | 2026-05-11T03:31:32 | A vulnerability was found in D-Link DCS-935L up to 1.10.01. The impacted element | |
| CVE-2021-47930 | 8.2 | 0.04% | 1 | 0 | 2026-05-10T15:31:26 | Balbooa Joomla Forms Builder 2.0.6 contains an unauthenticated SQL injection vul | |
| CVE-2021-47932 | 9.8 | 0.08% | 1 | 0 | 2026-05-10T15:31:19 | WordPress TheCartPress 1.5.3.6 contains an unauthenticated privilege escalation | |
| CVE-2021-47936 | 9.8 | 0.22% | 1 | 0 | 2026-05-10T15:31:19 | OpenCATS 0.9.4 contains a remote code execution vulnerability that allows unauth | |
| CVE-2021-47933 | 9.8 | 0.17% | 1 | 0 | 2026-05-10T15:31:19 | WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that | |
| CVE-2026-7270 | 7.8 | 0.01% | 1 | 1 | 2026-05-10T08:16:08.693000 | An operator precedence bug in the kernel results in a scenario where a buffer ov | |
| CVE-2026-8234 | 8.8 | 0.04% | 2 | 0 | 2026-05-10T07:16:08.740000 | A security vulnerability has been detected in EFM ipTIME A8004T 14.18.2. This vu | |
| CVE-2025-66172 | 6.5 | 0.01% | 1 | 0 | 2026-05-09T09:31:45 | The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 a | |
| CVE-2026-25077 | 6.3 | 0.02% | 1 | 0 | 2026-05-09T09:31:45 | Account users are allowed by default to register templates to be downloaded dire | |
| CVE-2026-42271 | 8.8 | 0.05% | 1 | 0 | 2026-05-08T20:04:50.543000 | LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) fo | |
| CVE-2026-42208 | 9.8 | 37.37% | 4 | 4 | 2026-05-08T19:19:34.537000 | LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) fo | |
| CVE-2026-7482 | 9.1 | 0.10% | 3 | 4 | 2026-05-08T17:26:03 | Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGU | |
| CVE-2026-33587 | 10.0 | 0.06% | 1 | 0 | 2026-05-07T21:30:27 | Lack of user input sanitisation in Open Notebook v1.8.3 allows the application u | |
| CVE-2026-6973 | 7.2 | 5.01% | 2 | 0 | 2026-05-07T19:18:39.910000 | An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, | |
| CVE-2026-42611 | 8.9 | 0.04% | 2 | 0 | 2026-05-05T21:36:29 | ### Summary A low-privileged (with the ability to create a page) user can cause | |
| CVE-2026-42613 | 9.4 | 0.05% | 4 | 0 | 2026-05-05T21:26:07 | # Bug Report: Registration Privilege Escalation via Missing Server-Side Validati | |
| CVE-2026-42607 | 9.1 | 0.23% | 2 | 0 | 2026-05-05T21:21:13 | ### Summary An authenticated user with administrative privileges can achieve Rem | |
| CVE-2026-42315 | 8.1 | 0.06% | 2 | 0 | 2026-05-05T21:18:20 | ### Summary No sanitization of package folder name allows writing files anywhere | |
| CVE-2026-42260 | 8.2 | 0.00% | 4 | 0 | 2026-05-05T20:51:46 | ### Summary `src/utils/urlSafety.ts` exposes `isPublicHttpUrl` / `assertPublicHt | |
| CVE-2026-43938 | 8.1 | 0.00% | 4 | 0 | 2026-05-05T20:31:36 | **Description:** Stored (second-order) Cross-Site Scripting (XSS) occurs when at | |
| CVE-2026-42864 | 9.9 | 0.05% | 4 | 0 | 2026-05-05T18:21:19 | ### Impact The `POST /api/v2/firefighter/raid/jira_bot` endpoint (`CreateJiraB | |
| CVE-2026-42313 | 8.3 | 0.04% | 2 | 0 | 2026-05-04T22:08:27 | ### Summary The `set_config_value()` API method (`@permission(Perms.SETTINGS)`) | |
| CVE-2026-41893 | None | 0.04% | 1 | 0 | 2026-05-04T20:53:02 | ## Summary The HTTP login endpoints (`POST /login` and `POST /signalk/v1/auth/l | |
| CVE-2026-41940 | 9.8 | 67.01% | 7 | 67 | template | 2026-05-04T18:31:33 | cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0 |
| CVE-2026-4670 | 9.8 | 0.22% | 1 | 0 | 2026-05-04T18:20:39.803000 | Authentication bypass by primary weakness vulnerability in Progress Software MOV | |
| CVE-2026-42511 | 7.3 | 0.06% | 2 | 0 | 2026-04-30T15:31:40 | The BOOTP file field is written to the lease file without escaping embedded doub | |
| CVE-2025-20362 | 6.5 | 46.39% | 1 | 0 | template | 2025-10-22T00:34:26 | A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security |
| CVE-2017-0144 | 8.1 | 94.32% | 2 | 21 | 2025-10-22T00:32:22 | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 | |
| CVE-2024-27355 | 7.5 | 0.33% | 2 | 0 | 2025-09-15T17:17:49.997000 | An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3 | |
| CVE-2026-43989 | 0 | 0.00% | 4 | 0 | N/A | ||
| CVE-2026-43991 | 0 | 0.00% | 4 | 0 | N/A | ||
| CVE-2026-43990 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-43993 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-8161 | 0 | 0.04% | 2 | 1 | N/A | ||
| CVE-2026-42858 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-41050 | 0 | 0.00% | 1 | 0 | N/A | ||
| CVE-2026-6735 | 0 | 0.05% | 1 | 0 | N/A | ||
| CVE-2026-42562 | 0 | 0.04% | 1 | 0 | N/A |
updated 2026-05-12T21:16:16.807000
13 posts
1 repos
https://github.com/liamromanis101/Dead.Letter-CVE-2026-45185
XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Patches are out: https://www.exim.org/static/doc/security/EXIM-Security-2026-05-01.1/EXIM-Security-2026-05-01.1.txt
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Comments: https://news.ycombinator.com/item?id=48111748
Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim - https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##🚀 Ah, another day, another #CVE nobody asked for. Humans vs. #AI in a race to exploit #Exim, because *obviously* that's what we need—Skynet learning to hack email servers. 😂 But hey, at least the buzzwords and pentest pitches are here to save us from the tedium of actual #security work. 📉
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim #Skynet #Hacking #HackerNews #ngated
Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
#HackerNews #DeadLetter #CVE202645185 #UnauthenticatedRCE #Exim #LLMVsHumans
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Patches are out: https://www.exim.org/static/doc/security/EXIM-Security-2026-05-01.1/EXIM-Security-2026-05-01.1.txt
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Comments: https://news.ycombinator.com/item?id=48111748
🚀 Ah, another day, another #CVE nobody asked for. Humans vs. #AI in a race to exploit #Exim, because *obviously* that's what we need—Skynet learning to hack email servers. 😂 But hey, at least the buzzwords and pentest pitches are here to save us from the tedium of actual #security work. 📉
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim #Skynet #Hacking #HackerNews #ngated
Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
#HackerNews #DeadLetter #CVE202645185 #UnauthenticatedRCE #Exim #LLMVsHumans
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##updated 2026-05-12T19:49:35.160000
2 posts
🟠 CVE-2026-35071 - High (8.2)
Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35071/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35071 - High (8.2)
Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35071/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T19:26:04.083000
4 posts
🟠 CVE-2026-41712 - High (7.5)
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41712 - High (7.5)
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41712 - High (7.5)
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41712 - High (7.5)
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T18:57:02.307000
3 posts
Fortinet Disrupts Critical RCE Flaws in FortiSandbox, FortiAuthenticator
Fortinet has patched a critical remote code execution vulnerability in its FortiAuthenticator and FortiSandbox products, which could have allowed unauthenticated attackers to run unauthorized code or commands. The company has released fixed builds to address the flaw, tracked as CVE-2026-44277, and…
#RemoteCodeExecution #Fortiauthenticator #Cve202644277 #Fortinet #IdentityAndAccessManagement
##🔴 CVE-2026-44277 - Critical (9.8)
A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44277/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44277 - Critical (9.8)
A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44277/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T18:30:37
2 posts
Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
https://xint.io/blog/kernel-vulnerabilities-ios-ipados
Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
https://xint.io/blog/kernel-vulnerabilities-ios-ipados
updated 2026-05-12T18:17:29.427000
2 posts
🔴 CVE-2026-44183 - Critical (9.8)
Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44183/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44183 - Critical (9.8)
Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44183/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T18:17:29.273000
2 posts
🟠 CVE-2026-44167 - High (7.5)
phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44167 - High (7.5)
phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T18:17:26.733000
1 posts
CVE-2026-42899 – ASP.NET Core Denial of Service
github.com/dotnet/annou...
Microsoft Security Advisory CV...
updated 2026-05-12T18:17:21.167000
2 posts
checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
updated 2026-05-12T18:17:20.720000
2 posts
checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
updated 2026-05-12T18:17:13.710000
2 posts
Even .NET Framework has an update, with its own fixes for CVE-2026-32177 and CVE-2026-35433.
support.microsoft.com/en-us/topic/...
So, start your update engines :)
May 12, 2026-KB5087051 Cumulat...
CVE-2026-35433 – .NET Elevation of Privilege
github.com/dotnet/annou...
Microsoft Security Advisory CV...
updated 2026-05-12T18:16:58.947000
2 posts
Even .NET Framework has an update, with its own fixes for CVE-2026-32177 and CVE-2026-35433.
support.microsoft.com/en-us/topic/...
So, start your update engines :)
May 12, 2026-KB5087051 Cumulat...
CVE-2026-32177 – .NET Elevation of Privilege
github.com/dotnet/annou...
Microsoft Security Advisory CV...
updated 2026-05-12T18:16:58.737000
1 posts
CVE-2026-32175 – .NET Core Tampering
github.com/dotnet/annou...
Microsoft Security Advisory CV...
updated 2026-05-12T17:48:21.643000
2 posts
🚨 New security advisory:
CVE-2026-6722 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2026-6722-php-soap-unauthenticated-rce
🚩 CRITICAL: CVE-2026-6722 in PHP SOAP (8.2 – 8.5) allows unauthenticated RCE via use-after-free. No patch confirmed — restrict SOAP access or disable if not needed. Details: https://radar.offseq.com/threat/cve-2026-6722-cwe-416-use-after-free-in-php-group--8d881999 #OffSeq #PHP #Vuln #RCE #InfoSec
##updated 2026-05-12T17:16:21.240000
4 posts
🔴 CVE-2026-43992 - Critical (9.8)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-43992 - Critical (9.8)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-43992 - Critical (9.8)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-43992 - Critical (9.8)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T16:50:08.553000
2 posts
🟠 CVE-2026-42860 - High (8.5)
The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_sourc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42860 - High (8.5)
The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_sourc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T16:48:58.260000
2 posts
⚠️ HIGH severity: CVE-2026-5084 in WebDyne::Session ≤2.075 creates predictable session IDs (MD5, rand()). Risk: session hijacking. No patch yet — use secure session management & monitor vendor updates. https://radar.offseq.com/threat/cve-2026-5084-cwe-340-generation-of-predictable-nu-706ca625 #OffSeq #Infosec #CVE20265084 #Perl
##⚠️ HIGH severity: CVE-2026-5084 in WebDyne::Session ≤2.075 creates predictable session IDs (MD5, rand()). Risk: session hijacking. No patch yet — use secure session management & monitor vendor updates. https://radar.offseq.com/threat/cve-2026-5084-cwe-340-generation-of-predictable-nu-706ca625 #OffSeq #Infosec #CVE20265084 #Perl
##updated 2026-05-12T16:47:58.570000
4 posts
🟠 CVE-2026-2465 - High (8.8)
Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.
This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2465 - High (8.8)
Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.
This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2465 - High (8.8)
Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.
This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2465 - High (8.8)
Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.
This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T16:47:58.570000
2 posts
🟠 CVE-2026-6001 - High (8.8)
Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers.
This issue affects BAPSİS: before v.202604152042.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6001 - High (8.8)
Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers.
This issue affects BAPSİS: before v.202604152042.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T16:16:54.790000
2 posts
🟠 CVE-2026-42609 - High (8.1)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a business logic vulnerability in the Grav Admin Panel allows a low-privileged user (with only user creation permissions) to overwrite existing accounts, including the primary administrator...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42609/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42609 - High (8.1)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a business logic vulnerability in the Grav Admin Panel allows a low-privileged user (with only user creation permissions) to overwrite existing accounts, including the primary administrator...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42609/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T16:16:40.253000
2 posts
🟠 CVE-2026-42612 - High (8.5)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a stored Cross-Site Scripting (XSS) vulnerability in getgrav/grav allows publisher-level accounts to execute arbitrary JavaScript. The issue arises from a blacklist bypass in the detectXss(...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42612/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42612 - High (8.5)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a stored Cross-Site Scripting (XSS) vulnerability in getgrav/grav allows publisher-level accounts to execute arbitrary JavaScript. The issue arises from a blacklist bypass in the detectXss(...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42612/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T16:16:18.740000
2 posts
🟠 CVE-2026-43937 - High (8.8)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43937 - High (8.8)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:32:40
2 posts
Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
https://xint.io/blog/kernel-vulnerabilities-ios-ipados
Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
https://xint.io/blog/kernel-vulnerabilities-ios-ipados
updated 2026-05-12T15:31:52
2 posts
🟠 CVE-2026-8111 - High (8.8)
SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8111/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8111 - High (8.8)
SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8111/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:31:49
4 posts
🟠 CVE-2026-8110 - High (7.8)
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8110/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8110 - High (7.8)
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8110/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8110 - High (7.8)
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8110/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8110 - High (7.8)
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8110/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:31:49
4 posts
til that Ivanti doesn't just make insecure endpoint management software. they also make insecure reporting software :neobot_giggle:
##🔴 CVE-2026-8043 - Critical (9.6)
External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8043/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##til that Ivanti doesn't just make insecure endpoint management software. they also make insecure reporting software :neobot_giggle:
##🔴 CVE-2026-8043 - Critical (9.6)
External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8043/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:31:48
2 posts
🟠 CVE-2026-7432 - High (7.8)
A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7432 - High (7.8)
A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:31:19
2 posts
8 repos
https://github.com/p3Nt3st3r-sTAr/CVE-2026-0300-POC
https://github.com/qassam-315/PAN-OS-User-ID-Buffer-Overflow-PoC
https://github.com/shizuku198411/CVE-2026-0300
https://github.com/TailwindRG/cve-2026-0300-audit
https://github.com/ByteWraith1/CVE-2026-0300
https://github.com/bannned-bit/CVE-2026-0300-PANOS
📰 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE
🚨 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS
##🔵 THREAT INTELLIGENCE
Weekly Threat Roundup: 2026-05-04 to 2026-05-10
Roundup | CRITICAL
CVEs: CVE-2026-0300, CVE-2026-33587, CVE-2026-40281
Cybersecurity roundup for 2026-05-04 to 2026-05-10. 10 CVE advisories, 5 breach reports, 4 threat news stories.
Full analysis:
https://www.yazoul.net/news/article/2026-w19-weekly-threat-roundup
updated 2026-05-12T15:31:18
10 posts
100 repos
https://github.com/adysec/cve-2026-31431
https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation
https://github.com/Xerxes-2/CVE-2026-31431-rs
https://github.com/wvverez/CVE-2026-31431-Copy-Fail
https://github.com/mCub3/CVE-2026-31431
https://github.com/b5null/CVE-2026-31431-C
https://github.com/theori-io/copy-fail-CVE-2026-31431
https://github.com/rootsecdev/cve_2026_31431
https://github.com/gagaltotal/cve-2026-31431-copy-fail
https://github.com/0xShe/CVE-2026-31431
https://github.com/jbnetwork-git/copy-fail-check
https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite
https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431
https://github.com/abdullaabdullazade/CVE-2026-31431
https://github.com/Sl4cK0TH/CVE-2026-31431-PoC
https://github.com/Linux-zs/cve-2026-31431-mitigation
https://github.com/bootsareme/copyfail-deconstructed
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/diemoeve/copyfail-rs
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC
https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE
https://github.com/Dabbleam/CVE-2026-31431-mitigation
https://github.com/sgkdev/page_inject
https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail
https://github.com/mrunalp/block-copyfail
https://github.com/xn0kkx/CVE-2026-31431_CopyFail_LinuxKernel_LPE
https://github.com/freelabz/CVE-2026-31431
https://github.com/sammwyy/copyfail-rs
https://github.com/SeanRickerd/cve-2026-31431
https://github.com/pascal-gujer/CVE-2026-31431
https://github.com/malwarekid/CVE-2026-31431
https://github.com/ExploitEoom/CVE-2026-31431
https://github.com/JuanBindez/CVE-2026-31431
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://github.com/badsectorlabs/copyfail-go
https://github.com/ErdemOzgen/copy-fail-cve-2026-31431
https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit
https://github.com/samanzamani/copy-fail-checker
https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script
https://github.com/rfxn/copyfail
https://github.com/professional-slacker/alg_check
https://github.com/cozystack/copy-fail-blocker
https://github.com/poyea/CVE-2026-31431.c
https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431
https://github.com/AliHzSec/CVE-2026-31431
https://github.com/philfry/cve-2026-31431-ftrace
https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431
https://github.com/leelong2020/cve-2026-31431
https://github.com/pedromizz/copy-fail
https://github.com/darioomatos/cve-2026-31431-copyfail
https://github.com/aestechno/cve-2026-31431-ansible
https://github.com/sudoytang/copyfail-arm64
https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431
https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe
https://github.com/0xBlackash/CVE-2026-31431
https://github.com/desultory/CVE-2026-31431
https://github.com/wgnet/wg.copyfail.patch
https://github.com/bigwario/copy-fail-CVE-2026-31431-C
https://github.com/ben-slates/CVE-2026-31431-Exploit
https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit
https://github.com/kadir/copy-fail-CVE-2026-31431-IOC
https://github.com/rvizx/CVE-2026-31431
https://github.com/0xN7y/CVE-2026-31431
https://github.com/polyakovavv/copyfail
https://github.com/ncmprbll/copy-fail-rs
https://github.com/EynaExp/Copy-Fail-CVE-2026-31431-modernized
https://github.com/Smarttfoxx/copyfail
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC
https://github.com/pvpaulo01/cve-2026-31431
https://github.com/Boos4721/copyfail-rs
https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431
https://github.com/AdityaBhatt3010/CVE-2026-31431
https://github.com/ZephrFish/CopyFail-CVE-2026-31431
https://github.com/tgies/copy-fail-c
https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs
https://github.com/Alfredooe/CVE-2026-31431
https://github.com/H1d3r/copy-fail_LPE_Interactive
https://github.com/Dullpurple-sloop726/CVE-2026-31431-Linux-Copy-Fail
https://github.com/povzayd/CVE-2026-31431
https://github.com/XsanFlip/CVE-2026-31431-Patch
https://github.com/qi4L/CVE-2026-31431-Container-Escape
https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431
https://github.com/cyber-joker/copy-fail-python
https://github.com/yxdm02/CVE-2026-31431
https://github.com/lonelyor/CVE-2026-31431-exp
https://github.com/MartinPham/copy-fail-CVE-2026-31431-php
https://github.com/sec17br/CVE-2026-31431-Copy-Fail
https://github.com/suominen/CVE-2026-31431
https://github.com/Huchangzhi/autorootlinux
https://github.com/MrAriaNet/cPanel-Fix
https://github.com/atgreen/block-copyfail
https://github.com/G01d3nW01f/CVE-2026-31431
https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431
https://github.com/ashok523/cve-2026-31431
https://github.com/wesmar/CVE-2026-31431
https://github.com/krisiasty/vcheck
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/wuwu001/CVE-2026-31431-exploit
https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection
Copy Fail (CVE-2026-31431): A Technical Deep Dive https://github.com/fraynal/articles/tree/main/copy.fail
##I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.
Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).
I hope things calm down a bit now but I guess we shall see…
##GitHub - sgkdev/page_inject: CVE-2026-31431-killed page-cache exploit — code exec into containers sharing the same image layer
https://github.com/sgkdev/page_inject/
Read on HackerWorkspace: https://hackerworkspace.com/article/github-sgkdev-page-inject-cve-2026-31431-killed-page-cache-exploit-code-exec-into-containers-sharing-the-same-image-layer
##Copy Fail (CVE-2026-31431): A Technical Deep Dive https://github.com/fraynal/articles/tree/main/copy.fail
##I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.
Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).
I hope things calm down a bit now but I guess we shall see…
##GitHub - sgkdev/page_inject: CVE-2026-31431-killed page-cache exploit — code exec into containers sharing the same image layer
https://github.com/sgkdev/page_inject/
Read on HackerWorkspace: https://hackerworkspace.com/article/github-sgkdev-page-inject-cve-2026-31431-killed-page-cache-exploit-code-exec-into-containers-sharing-the-same-image-layer
##updated 2026-05-12T15:11:29.503000
2 posts
🟠 CVE-2026-7287 - High (7.5)
** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7287 - High (7.5)
** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:11:29.503000
2 posts
🟠 CVE-2026-7256 - High (8.8)
** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7256/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7256 - High (8.8)
** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7256/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:09:10
2 posts
🔴 CVE-2026-45091 - Critical (9.1)
sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45091/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-45091 - Critical (9.1)
sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45091/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:08:22.857000
4 posts
🟠 CVE-2026-8162 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8162 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8162 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8162 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:08:22.857000
2 posts
🟠 CVE-2026-8159 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8159/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8159 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8159/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:47:42.170000
2 posts
🟠 CVE-2026-45223 - High (8.8)
Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45223 - High (8.8)
Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:20:56.547000
2 posts
🟠 CVE-2026-45006 - High (8.8)
OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45006/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45006 - High (8.8)
OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45006/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
6 posts
🔴 CVE-2026-34263 - Critical (9.6)
Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34263/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws
SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.
**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-security-patch-day-may-2026-critical-rce-and-sql-injection-flaws-w-6-7-x-n/gD2P6Ple2L
🚨 CRITICAL (CVSS 9.6): CVE-2026-34263 hits SAP Commerce Cloud (HY_COM 2205, COM_CLOUD 2211/JDK21). Unauthenticated attackers can upload configs & inject code — full server compromise risk. Monitor & restrict config uploads! https://radar.offseq.com/threat/cve-2026-34263-cwe-459-incomplete-cleanup-in-sapse-30ad114e #OffSeq #SAP #Vuln
##🔴 CVE-2026-34263 - Critical (9.6)
Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34263/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws
SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.
**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-security-patch-day-may-2026-critical-rce-and-sql-injection-flaws-w-6-7-x-n/gD2P6Ple2L
🚨 CRITICAL (CVSS 9.6): CVE-2026-34263 hits SAP Commerce Cloud (HY_COM 2205, COM_CLOUD 2211/JDK21). Unauthenticated attackers can upload configs & inject code — full server compromise risk. Monitor & restrict config uploads! https://radar.offseq.com/threat/cve-2026-34263-cwe-459-incomplete-cleanup-in-sapse-30ad114e #OffSeq #SAP #Vuln
##updated 2026-05-12T14:19:41.400000
6 posts
🔴 CVE-2026-34260 - Critical (9.6)
SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws
SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.
**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-security-patch-day-may-2026-critical-rce-and-sql-injection-flaws-w-6-7-x-n/gD2P6Ple2L
🚨 CRITICAL: SQL injection (CVE-2026-34260, CVSS 9.6) in SAP S/4HANA (SAP_BASIS 751-816). Authenticated attackers can access sensitive data & crash apps. No patch yet — restrict access & monitor logs. https://radar.offseq.com/threat/cve-2026-34260-cwe-89-improper-neutralization-of-s-4864cd58 #OffSeq #SAP #Infosec #SQLInjection
##🔴 CVE-2026-34260 - Critical (9.6)
SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws
SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.
**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-security-patch-day-may-2026-critical-rce-and-sql-injection-flaws-w-6-7-x-n/gD2P6Ple2L
🚨 CRITICAL: SQL injection (CVE-2026-34260, CVSS 9.6) in SAP S/4HANA (SAP_BASIS 751-816). Authenticated attackers can access sensitive data & crash apps. No patch yet — restrict access & monitor logs. https://radar.offseq.com/threat/cve-2026-34260-cwe-89-improper-neutralization-of-s-4864cd58 #OffSeq #SAP #Infosec #SQLInjection
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2026-34259 - High (8.2)
Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34259 - High (8.2)
Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2025-40946 - High (8.3)
A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All ver...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40946/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-40946 - High (8.3)
A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All ver...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40946/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🔴 CVE-2025-40949 - Critical (9.1)
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGED...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40949/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-40949 - Critical (9.1)
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGED...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40949/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2025-40947 - High (7.5)
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGED...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40947/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-40947 - High (7.5)
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGED...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40947/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🔴 CVE-2026-25786 - Critical (9.1)
Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25786/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25786 - Critical (9.1)
Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25786/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2026-27662 - High (7.7)
Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place.
This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potenti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27662 - High (7.7)
Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place.
This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potenti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2026-44412 - High (7.8)
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.
This could allow an attacker to execut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44412 - High (7.8)
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.
This could allow an attacker to execut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:17:10.613000
2 posts
🟠 CVE-2026-32658 - High (8)
Dell Automation Platform versions prior to 2.0.0.0, contains a missing authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32658/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-32658 - High (8)
Dell Automation Platform versions prior to 2.0.0.0, contains a missing authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-32658/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:17:05.463000
2 posts
🚨 CVE-2026-42869 (CRITICAL): socfortress CoPilot <0.1.57 uses a hardcoded JWT secret, letting attackers forge admin tokens and seize control. Upgrade to 0.1.57+ and set JWT_SECRET securely! Details: https://radar.offseq.com/threat/cve-2026-42869-cwe-287-improper-authentication-in--a2c3bf34 #OffSeq #Vuln #CVE #InfoSec
##🚨 CVE-2026-42869 (CRITICAL): socfortress CoPilot <0.1.57 uses a hardcoded JWT secret, letting attackers forge admin tokens and seize control. Upgrade to 0.1.57+ and set JWT_SECRET securely! Details: https://radar.offseq.com/threat/cve-2026-42869-cwe-287-improper-authentication-in--a2c3bf34 #OffSeq #Vuln #CVE #InfoSec
##updated 2026-05-12T14:15:46.747000
2 posts
#OT #Advisory VDE-2026-042
CODESYS Modbus TCP Server - Improper resource management
CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35227
https://certvde.com/en/advisories/vde-2026-042/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-05_vde-2026-042.json
###OT #Advisory VDE-2026-042
CODESYS Modbus TCP Server - Improper resource management
CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35227
https://certvde.com/en/advisories/vde-2026-042/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-05_vde-2026-042.json
##updated 2026-05-12T14:15:46.747000
2 posts
🟠 CVE-2026-4890 - High (7.5)
A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4890 - High (7.5)
A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:10:27.343000
2 posts
🟠 CVE-2026-43441 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled
When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never
initialized because inet6_init() exits befo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43441/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43441 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled
When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never
initialized because inet6_init() exits befo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43441/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:10:27.343000
2 posts
🟠 CVE-2026-43437 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain()
In the drain loop, the local variable 'runtime' is reassigned to a
linked stream's runtime (runtime = s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43437/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43437 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain()
In the drain loop, the local variable 'runtime' is reassigned to a
linked stream's runtime (runtime = s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43437/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:10:27.343000
2 posts
🟠 CVE-2026-43456 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
bonding: fix type confusion in bond_setup_by_slave()
kernel BUG at net/core/skbuff.c:2306!
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
RIP: 0010:pskb_expand_head+0xa08/0xfe0...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43456/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43456 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
bonding: fix type confusion in bond_setup_by_slave()
kernel BUG at net/core/skbuff.c:2306!
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
RIP: 0010:pskb_expand_head+0xa08/0xfe0...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43456/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:10:27.343000
2 posts
🟠 CVE-2026-43466 - High (8.2)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery
In case of a TX error CQE, a recovery flow is triggered,
mlx5e_reset_txqsq_cc_pc() resets dma_fifo_cc to 0 but not dma_fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43466 - High (8.2)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery
In case of a TX error CQE, a recovery flow is triggered,
mlx5e_reset_txqsq_cc_pc() resets dma_fifo_cc to 0 but not dma_fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43466/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:10:27.343000
2 posts
🟠 CVE-2026-43464 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: RX, Fix XDP multi-buf frag counting for legacy RQ
XDP multi-buf programs can modify the layout of the XDP buffer when the
program calls bpf_xdp_pull_data() or bpf_xdp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43464 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: RX, Fix XDP multi-buf frag counting for legacy RQ
XDP multi-buf programs can modify the layout of the XDP buffer when the
program calls bpf_xdp_pull_data() or bpf_xdp...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43464/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:03:52.757000
4 posts
🟠 CVE-2026-39432 - High (8.2)
Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.
This issue affects Timetics: from n/a through 1.0.53.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔍 HIGH severity: CVE-2026-39432 in Arraytics Timetics ≤1.0.53 — Missing authorization (CWE-862) enables potential data exposure. No patch available yet. Restrict access, monitor advisories. https://radar.offseq.com/threat/cve-2026-39432-cwe-862-missing-authorization-in-ar-e310bf2a #OffSeq #Cybersecurity #Vuln #CVE202639432
##🟠 CVE-2026-39432 - High (8.2)
Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.
This issue affects Timetics: from n/a through 1.0.53.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔍 HIGH severity: CVE-2026-39432 in Arraytics Timetics ≤1.0.53 — Missing authorization (CWE-862) enables potential data exposure. No patch available yet. Restrict access, monitor advisories. https://radar.offseq.com/threat/cve-2026-39432-cwe-862-missing-authorization-in-ar-e310bf2a #OffSeq #Cybersecurity #Vuln #CVE202639432
##updated 2026-05-12T14:03:52.757000
2 posts
🟠 CVE-2026-42742 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through <= 3.4.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42742/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42742 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through <= 3.4.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42742/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:03:52.757000
2 posts
🟠 CVE-2026-42741 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views – Display & Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42741/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42741 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views – Display & Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42741/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:23
2 posts
🔴 CVE-2026-8072 (CRITICAL, 9.2): Ingeteam Ingecon Sun EMS Board uses weak hashing for SAT access credentials, risking privilege escalation. No mitigation yet — review access and monitor for updates. https://radar.offseq.com/threat/cve-2026-8072-cwe-327-use-of-a-broken-or-risky-cry-6e7aa5de #OffSeq #ICS #Vulnerability
##🔴 CVE-2026-8072 (CRITICAL, 9.2): Ingeteam Ingecon Sun EMS Board uses weak hashing for SAT access credentials, risking privilege escalation. No mitigation yet — review access and monitor for updates. https://radar.offseq.com/threat/cve-2026-8072-cwe-327-use-of-a-broken-or-risky-cry-6e7aa5de #OffSeq #ICS #Vulnerability
##updated 2026-05-12T12:32:22
2 posts
🔴 CVE-2026-25787 - Critical (9.1)
Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25787 - Critical (9.1)
Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-33893 - High (7.5)
A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.0014), Teamcenter V2406 (All versions < V2406.0012), Teamcenter V2412 (All versions < V2412.0009), Teamcenter V2506 (All versions < V2506.0005), Teamcenter V...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33893/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33893 - High (7.5)
A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.0014), Teamcenter V2406 (All versions < V2406.0012), Teamcenter V2412 (All versions < V2412.0009), Teamcenter V2506 (All versions < V2506.0005), Teamcenter V...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33893/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-44411 - High (7.8)
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44411/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44411 - High (7.8)
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44411/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🔴 CVE-2026-41551 - Critical (9.1)
A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized.
This could allow a remote attacker to access arbitrary files on the dev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41551 - Critical (9.1)
A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized.
This could allow a remote attacker to access arbitrary files on the dev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
4 posts
🟠 CVE-2026-45214 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45214 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45214 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45214 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
4 posts
🟠 CVE-2026-45213 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45213 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45213 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45213 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-41713 - High (8.2)
A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41713 - High (8.2)
A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-45211 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45211/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45211 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45211/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-45218 - High (7.7)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through <= 11.4.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45218 - High (7.7)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through <= 11.4.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:21
2 posts
🟠 CVE-2025-40833 - High (7.5)
The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-40833 - High (7.5)
The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:21
2 posts
🟠 CVE-2026-22925 - High (7.5)
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets
This could allow an attacker to render the service un...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22925/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22925 - High (7.5)
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets
This could allow an attacker to render the service un...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22925/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:14
2 posts
🔴 CVE-2026-22924 - Critical (9.1)
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.
This could allow an attacker to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-22924 - Critical (9.1)
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.
This could allow an attacker to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:14
2 posts
🔴 CVE-2025-6577 - Critical (9.8)
Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection.
This issue affects E-Commerce Website: before 4.5.001.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6577/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-6577 - Critical (9.8)
Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection.
This issue affects E-Commerce Website: before 4.5.001.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6577/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T09:31:33
2 posts
🟠 CVE-2026-2993 - High (7.5)
The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing S...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2993 - High (7.5)
The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing S...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T20:25:44.450000
2 posts
🚨 CVE-2026-42882 (CRITICAL): oxyno-zeta s3-proxy <5.0.0 has a path traversal bug, letting unauthenticated attackers bypass auth to access or modify protected S3 objects. Patch to v5.0.0 now! https://radar.offseq.com/threat/cve-2026-42882-cwe-22-improper-limitation-of-a-pat-5be1c7df #OffSeq #CVE202642882 #CloudSecurity #Vuln
##🚨 CVE-2026-42882 (CRITICAL): oxyno-zeta s3-proxy <5.0.0 has a path traversal bug, letting unauthenticated attackers bypass auth to access or modify protected S3 objects. Patch to v5.0.0 now! https://radar.offseq.com/threat/cve-2026-42882-cwe-22-improper-limitation-of-a-pat-5be1c7df #OffSeq #CVE202642882 #CloudSecurity #Vuln
##updated 2026-05-11T20:25:42.893000
2 posts
🟠 CVE-2026-42843 - High (8.8)
Grav API Plugin is a RESTful API for Grav CMS that provides full headless access to your site's content, media, configuration, users, and system management. Prior to 1.0.0-beta.15, an insecure direct object reference and logic flaw in the Grav API...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42843/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42843 - High (8.8)
Grav API Plugin is a RESTful API for Grav CMS that provides full headless access to your site's content, media, configuration, users, and system management. Prior to 1.0.0-beta.15, an insecure direct object reference and logic flaw in the Grav API...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42843/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T19:16:22.897000
2 posts
🟠 CVE-2026-41431 - High (8)
Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Application Resource (MAR) updater (org.mozilla.updater) that has had all MAR signature verification stripped from the Firefox codebase it was forked from. The MAR files...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41431/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41431 - High (8)
Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Application Resource (MAR) updater (org.mozilla.updater) that has had all MAR signature verification stripped from the Firefox codebase it was forked from. The MAR files...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41431/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:32:45
2 posts
🟠 CVE-2026-8177 - High (7.5)
XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences.
A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8177 - High (7.5)
XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences.
A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:32:45
2 posts
🚨 CRITICAL: CVE-2026-6433 in Custom css-js-php <=2.0.7 enables unauthenticated PHP code execution via flawed input handling. No patch or exploit in the wild yet. Disable/remove plugin now. https://radar.offseq.com/threat/cve-2026-6433-cwe-94-improper-control-of-generatio-3ad54b4b #OffSeq #WordPress #vuln #WebSecurity
##🚨 CRITICAL: CVE-2026-6433 in Custom css-js-php <=2.0.7 enables unauthenticated PHP code execution via flawed input handling. No patch or exploit in the wild yet. Disable/remove plugin now. https://radar.offseq.com/threat/cve-2026-6433-cwe-94-improper-control-of-generatio-3ad54b4b #OffSeq #WordPress #vuln #WebSecurity
##updated 2026-05-11T18:31:59
3 posts
📰 High-Severity Flaw in JetBrains TeamCity On-Premises Allows API Exposure (CVE-2026-44413)
PATCH NOW: A high-severity vulnerability (CVE-2026-44413) in JetBrains TeamCity On-Premises allows any authenticated user to expose server APIs. All versions up to 2025.11.4 are affected. Upgrade to 2026.1 immediately. 💻🔧 #TeamCity #JetBrains #CI/CD
##🟠 CVE-2026-44413 - High (8.2)
In JetBrains TeamCity before 2026.1
2025.11.5 authenticated users could expose server API to unauthorised access
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44413/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44413 - High (8.2)
In JetBrains TeamCity before 2026.1
2025.11.5 authenticated users could expose server API to unauthorised access
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44413/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:59
2 posts
🟠 CVE-2026-43639 - High (8)
Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43639/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43639 - High (8)
Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43639/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:59
2 posts
🟠 CVE-2026-45004 - High (7.8)
OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript unde...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45004/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45004 - High (7.8)
OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript unde...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45004/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:55
4 posts
🟠 CVE-2026-33357 - High (7.5)
In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label <= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33357/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33357 - High (7.5)
In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label <= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33357/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33357 - High (7.5)
In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label <= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33357/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33357 - High (7.5)
In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label <= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33357/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:55
4 posts
🟠 CVE-2026-33356 - High (7.7)
In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but doe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33356/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33356 - High (7.7)
In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but doe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33356/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33356 - High (7.7)
In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but doe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33356/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33356 - High (7.7)
In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but doe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33356/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:55
2 posts
🟠 CVE-2026-33362 - High (8.6)
In Meari IoT SDK builds embedded in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and white-label Android apps <= 1.8.x (latest observed), multiple security-critical secrets are hardcoded and shared, including API signing material, pas...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33362/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33362 - High (8.6)
In Meari IoT SDK builds embedded in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and white-label Android apps <= 1.8.x (latest observed), multiple security-critical secrets are hardcoded and shared, including API signing material, pas...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33362/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:54
2 posts
🟠 CVE-2026-33361 - High (7.5)
In Meari IoT SDK image handling (libmrplayer.so) as observed in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and related white-label apps (<= 1.8.x), baby monitor ".jpgx3" files use reversible XOR over only the first 1024 by...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33361/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33361 - High (7.5)
In Meari IoT SDK image handling (libmrplayer.so) as observed in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and related white-label apps (<= 1.8.x), baby monitor ".jpgx3" files use reversible XOR over only the first 1024 by...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33361/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:54
2 posts
🟠 CVE-2026-33359 - High (7.5)
In Meari IoT Cloud alert image storage on Alibaba OSS (latest observed; storage service version not disclosed), motion snapshots are retrievable without authentication, signed URLs, or expiry enforcement. URLs function as direct object references ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33359 - High (7.5)
In Meari IoT Cloud alert image storage on Alibaba OSS (latest observed; storage service version not disclosed), motion snapshots are retrievable without authentication, signed URLs, or expiry enforcement. URLs function as direct object references ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:54
2 posts
🟠 CVE-2026-7815 - High (8.8)
SQL injection vulnerability in pgAdmin 4 Maintenance Tool.
Four user-supplied JSON fields (buffer_usage_limit, vacuum_parallel, vacuum_index_cleanup, reindex_tablespace) were concatenated directly into the rendered VACUUM/ANALYZE/REINDEX command ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7815 - High (8.8)
SQL injection vulnerability in pgAdmin 4 Maintenance Tool.
Four user-supplied JSON fields (buffer_usage_limit, vacuum_parallel, vacuum_index_cleanup, reindex_tablespace) were concatenated directly into the rendered VACUUM/ANALYZE/REINDEX command ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7815/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:54
2 posts
🔴 CVE-2026-7813 - Critical (9.9)
Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Servers, Shared Servers, Background Processes, and Debugger modules.
Multiple endpoints fetched user-owned objects without filtering by the requesting user's identity. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7813/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-7813 - Critical (9.9)
Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Servers, Shared Servers, Background Processes, and Debugger modules.
Multiple endpoints fetched user-owned objects without filtering by the requesting user's identity. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7813/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:54
2 posts
🟠 CVE-2026-7819 - High (8.1)
Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager.
check_access_permission used os.path.abspath, which resolves '..' but does not resolve symbolic links, while the subsequent kernel write follows symlinks. An authenticated u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7819/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7819 - High (8.1)
Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager.
check_access_permission used os.path.abspath, which resolves '..' but does not resolve symbolic links, while the subsequent kernel write follows symlinks. An authenticated u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7819/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:16:37.110000
2 posts
🟠 CVE-2026-43640 - High (8.1)
Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43640/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43640 - High (8.1)
Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43640/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:16:35.887000
2 posts
🟠 CVE-2026-42603 - High (8.8)
OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Prior to 2.1.2, .github/workflows/pre-commit-fix.yaml uses pull_request_target (privileged trigger) but checks out and exe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42603/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42603 - High (8.8)
OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Prior to 2.1.2, .github/workflows/pre-commit-fix.yaml uses pull_request_target (privileged trigger) but checks out and exe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42603/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T17:16:35
2 posts
🟠 CVE-2026-7816 - High (8.8)
OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query export.
User-supplied input was interpolated directly into a psql \copy metacommand template without sanitization. An authenticated user could inject ") TO PROGRAM 'cmd'...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7816/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7816 - High (8.8)
OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query export.
User-supplied input was interpolated directly into a psql \copy metacommand template without sanitization. An authenticated user could inject ") TO PROGRAM 'cmd'...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7816/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T17:16:34.747000
2 posts
🟠 CVE-2026-44738 - High (7.7)
Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-list permits any user with the admin.pages role to call config.toArray() from within a page body, dumping the entire merged site configuration — including all plugin ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44738/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44738 - High (7.7)
Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-list permits any user with the admin.pages role to call config.toArray() from within a page body, dumping the entire merged site configuration — including all plugin ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44738/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T17:16:34.290000
13 posts
13 repos
https://github.com/XRSecCD/202605_dirty_frag
https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
https://github.com/vorkampfer/dirty_frag_mitigation
https://github.com/linnemanlabs/dirtyfrag-arm64
https://github.com/metalx1993/dirtyfrag-patches
https://github.com/haydenjames/dirty-frag-check
https://github.com/krisiasty/vcheck
https://github.com/liamromanis101/DirtyFrag-Detector
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/0xlane/pagecache-guard
https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
Load-Bearing Assumptions: the rxrpc case (CVE-2026-43500) and the constraint that was never there https://lobste.rs/s/tuiapt #linux #security
https://www.linkedin.com/pulse/load-bearing-assumptions-rxrpc-case-cve-2026-43500-never-oldani-uzyae
Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧
🔗 https://itsfoss.com/news/linux-fully-patches-dirty-frag-exploit/
#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech
##Dirty Frag: Linux Kernel Local Privilege Escalation via ESP and RxRPC
Unpatched kernel flaw chain (CVE-2026-43284, CVE-2026-43500) enables root escalation on major Linux distributions.
https://www.wiz.io/blog/dirty-frag-linux-kernel-local-privilege-escalation-via-esp-and-rxrpc
##🟠 CVE-2026-43500 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE
handler in rxrpc_verify_response() co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43500/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.
Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).
I hope things calm down a bit now but I guess we shall see…
##Load-Bearing Assumptions: the rxrpc case (CVE-2026-43500) and the constraint that was never there https://lobste.rs/s/tuiapt #linux #security
https://www.linkedin.com/pulse/load-bearing-assumptions-rxrpc-case-cve-2026-43500-never-oldani-uzyae
Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧
🔗 https://itsfoss.com/news/linux-fully-patches-dirty-frag-exploit/
#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech
##🟠 CVE-2026-43500 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present
The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE
handler in rxrpc_verify_response() co...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43500/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.
Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).
I hope things calm down a bit now but I guess we shall see…
##updated 2026-05-11T15:32:12
2 posts
🟠 CVE-2026-4802 - High (8)
A flaw was found in Cockpit. This vulnerability allows a remote attacker to achieve arbitrary command execution on the host by exploiting unsanitized user-controlled parameters within crafted links in the system logs user interface (UI). An attack...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4802/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4802 - High (8)
A flaw was found in Cockpit. This vulnerability allows a remote attacker to achieve arbitrary command execution on the host by exploiting unsanitized user-controlled parameters within crafted links in the system logs user interface (UI). An attack...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4802/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T15:08:09.893000
1 posts
⚠️ CVE-2026-8253: MEDIUM severity XSS in Devs Palace ERP Online v4.0.0 via /inventory/purchase_save. No patch; vendor unresponsive. Apply WAF rules & restrict access. Details: https://radar.offseq.com/threat/cve-2026-8253-cross-site-scripting-in-devs-palace--7f918dea #OffSeq #XSS #ERP #Vuln
##updated 2026-05-11T14:46:07.127000
1 posts
1 repos
🔵 THREAT INTELLIGENCE
Weekly Threat Roundup: 2026-05-04 to 2026-05-10
Roundup | CRITICAL
CVEs: CVE-2026-0300, CVE-2026-33587, CVE-2026-40281
Cybersecurity roundup for 2026-05-04 to 2026-05-10. 10 CVE advisories, 5 breach reports, 4 threat news stories.
Full analysis:
https://www.yazoul.net/news/article/2026-w19-weekly-threat-roundup
updated 2026-05-11T12:32:39
4 posts
🔴 CVE-2026-40636 - Critical (9.8)
Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains a use of hard-coded credentials vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-40636 in Dell ECS & ObjectScale (CVSS 9.8) exposes systems via hard-coded credentials. Local attackers may gain full access. Restrict local access & monitor logs. Await vendor patch. Details: https://radar.offseq.com/threat/cve-2026-40636-cwe-798-use-of-hard-coded-credentia-8faf08fe #OffSeq #Dell #Vuln #InfoSec
##🔴 CVE-2026-40636 - Critical (9.8)
Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains a use of hard-coded credentials vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40636/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-40636 in Dell ECS & ObjectScale (CVSS 9.8) exposes systems via hard-coded credentials. Local attackers may gain full access. Restrict local access & monitor logs. Await vendor patch. Details: https://radar.offseq.com/threat/cve-2026-40636-cwe-798-use-of-hard-coded-credentia-8faf08fe #OffSeq #Dell #Vuln #InfoSec
##updated 2026-05-11T12:32:39
2 posts
🟠 CVE-2025-10470 - High (8.6)
The Magic Link authentication flow accepts multiple invalid authentication requests without adequate rate limiting or resource control, leading to uncontrolled memory usage growth.
This vulnerability can result in a denial-of-service condition, c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-10470 - High (8.6)
The Magic Link authentication flow accepts multiple invalid authentication requests without adequate rate limiting or resource control, leading to uncontrolled memory usage growth.
This vulnerability can result in a denial-of-service condition, c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-10470/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:35
2 posts
🟠 CVE-2026-43438 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
sched_ext: Remove redundant css_put() in scx_cgroup_init()
The iterator css_for_each_descendant_pre() walks the cgroup hierarchy
under cgroup_lock(). It does not increment the r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43438/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43438 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
sched_ext: Remove redundant css_put() in scx_cgroup_init()
The iterator css_for_each_descendant_pre() walks the cgroup hierarchy
under cgroup_lock(). It does not increment the r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43438/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:35
2 posts
🟠 CVE-2026-43452 - High (8.2)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: x_tables: guard option walkers against 1-byte tail reads
When the last byte of options is a non-single-byte option kind, walkers
that advance with i += op[i + 1] ? : ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43452/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43452 - High (8.2)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: x_tables: guard option walkers against 1-byte tail reads
When the last byte of options is a non-single-byte option kind, walkers
that advance with i += op[i + 1] ? : ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43452/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:35
2 posts
🟠 CVE-2026-43447 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
iavf: fix PTP use-after-free during reset
Commit 7c01dbfc8a1c5f ("iavf: periodically cache PHC time") introduced a
worker to cache PHC time, but failed to stop it during reset o...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43447 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
iavf: fix PTP use-after-free during reset
Commit 7c01dbfc8a1c5f ("iavf: periodically cache PHC time") introduced a
worker to cache PHC time, but failed to stop it during reset o...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43447/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:35
2 posts
🟠 CVE-2026-43461 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
spi: amlogic: spifc-a4: Fix DMA mapping error handling
Fix three bugs in aml_sfc_dma_buffer_setup() error paths:
1. Unnecessary goto: When the first DMA mapping (sfc->daddr) fai...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43461 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
spi: amlogic: spifc-a4: Fix DMA mapping error handling
Fix three bugs in aml_sfc_dma_buffer_setup() error paths:
1. Unnecessary goto: When the first DMA mapping (sfc->daddr) fai...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43461/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:35
2 posts
🟠 CVE-2026-43462 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
net: spacemit: Fix error handling in emac_tx_mem_map()
The DMA mappings were leaked on mapping error. Free them with the
existing emac_free_tx_buf() function.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43462/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43462 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
net: spacemit: Fix error handling in emac_tx_mem_map()
The DMA mappings were leaked on mapping error. Free them with the
existing emac_free_tx_buf() function.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43462/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:34
2 posts
🟠 CVE-2026-43434 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: check ownership before using vma
When installing missing pages (or zapping them), Rust Binder will look
up the vma in the mm by address, and then call vm_insert_pag...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43434/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43434 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: check ownership before using vma
When installing missing pages (or zapping them), Rust Binder will look
up the vma in the mm by address, and then call vm_insert_pag...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43434/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:34
2 posts
🟠 CVE-2026-43433 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: avoid reading the written value in offsets array
When sending a transaction, its offsets array is first copied into the
target proc's vma, and then the values are r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43433/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43433 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: avoid reading the written value in offsets array
When sending a transaction, its offsets array is first copied into the
target proc's vma, and then the values are r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43433/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:34
2 posts
🟠 CVE-2026-43454 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: Fix for duplicate device in netdev hooks
When handling NETDEV_REGISTER notification, duplicate device
registration must be avoided since the device may hav...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43454/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43454 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: nf_tables: Fix for duplicate device in netdev hooks
When handling NETDEV_REGISTER notification, duplicate device
registration must be avoided since the device may hav...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43454/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:34
2 posts
🟠 CVE-2026-43469 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
xprtrdma: Decrement re_receiving on the early exit paths
In the event that rpcrdma_post_recvs() fails to create a work request
(due to memory allocation failure, say) or otherwi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43469 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
xprtrdma: Decrement re_receiving on the early exit paths
In the event that rpcrdma_post_recvs() fails to create a work request
(due to memory allocation failure, say) or otherwi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43469/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:34
2 posts
🔴 CVE-2026-43465 - Critical (9.8)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: RX, Fix XDP multi-buf frag counting for striding RQ
XDP multi-buf programs can modify the layout of the XDP buffer when the
program calls bpf_xdp_pull_data() or bpf_x...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-43465 - Critical (9.8)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5e: RX, Fix XDP multi-buf frag counting for striding RQ
XDP multi-buf programs can modify the layout of the XDP buffer when the
program calls bpf_xdp_pull_data() or bpf_x...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T06:31:33
6 posts
20 repos
https://github.com/XRSecCD/202605_dirty_frag
https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
https://github.com/6abc/Copy-Fail-CVE-2026-31431-dirty-frag-CVE-2026-43284
https://github.com/linnemanlabs/dirtyfrag-arm64
https://github.com/AK777177/Dirty-Frag-Analysis
https://github.com/scriptzteam/Paranoid-Dirty-Frag-CVE-2026-43284
https://github.com/metalx1993/dirtyfrag-patches
https://github.com/liamromanis101/DirtyFrag-Detector
https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
https://github.com/haydenjames/dirty-frag-check
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/dixyes/dirtypatch
https://github.com/krisiasty/vcheck
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/0xlane/pagecache-guard
https://github.com/0xBlackash/CVE-2026-43284
https://github.com/ryan2929/CVE-2026-43284-
Dirty Frag: Linux Kernel Local Privilege Escalation via ESP and RxRPC
Unpatched kernel flaw chain (CVE-2026-43284, CVE-2026-43500) enables root escalation on major Linux distributions.
https://www.wiz.io/blog/dirty-frag-linux-kernel-local-privilege-escalation-via-esp-and-rxrpc
##I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.
Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).
I hope things calm down a bit now but I guess we shall see…
##I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.
Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).
I hope things calm down a bit now but I guess we shall see…
##updated 2026-05-11T05:16:16.580000
2 posts
MEDIUM severity: CVE-2026-8274 in npitre cramfs-tools (v2.0/2.1) enables local path traversal via cramfsck.c. Exploitation requires local access, no interaction. Patch in v2.2. Upgrade now! https://radar.offseq.com/threat/cve-2026-8274-path-traversal-in-npitre-cramfs-tool-1c0c3b74 #OffSeq #Vulnerability #Linux #Security
##MEDIUM severity: CVE-2026-8274 in npitre cramfs-tools (v2.0/2.1) enables local path traversal via cramfsck.c. Exploitation requires local access, no interaction. Patch in v2.2. Upgrade now! https://radar.offseq.com/threat/cve-2026-8274-path-traversal-in-npitre-cramfs-tool-1c0c3b74 #OffSeq #Vulnerability #Linux #Security
##updated 2026-05-11T03:31:32
3 posts
1 repos
🟠 CVE-2026-8260 - High (8.8)
A vulnerability was found in D-Link DCS-935L up to 1.10.01. The impacted element is the function SetDeviceSettings of the file /web/cgi-bin/hnap/hnap_service of the component HNAP Service. The manipulation of the argument AdminPassword results in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8260 - High (8.8)
A vulnerability was found in D-Link DCS-935L up to 1.10.01. The impacted element is the function SetDeviceSettings of the file /web/cgi-bin/hnap/hnap_service of the component HNAP Service. The manipulation of the argument AdminPassword results in ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔎 HIGH severity: D-Link DCS-935L (≤1.10.01) is affected by CVE-2026-8260 — remote buffer overflow in HNAP Service via AdminPassword. Public exploit available. Urgent: segment/monitor impacted devices. https://radar.offseq.com/threat/cve-2026-8260-buffer-overflow-in-d-link-dcs-935l-917cd231 #OffSeq #DLink #Vuln #Cybersecurity
##updated 2026-05-10T15:31:26
1 posts
🟠 New security advisory:
CVE-2021-47930 affects multiple systems.
• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2021-47930-joomla-forms-builder-sqli-leaks-data
updated 2026-05-10T15:31:19
1 posts
🔴 New security advisory:
CVE-2021-47932 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2021-47932-wordpress-thecartpress-creates-admin-accounts
updated 2026-05-10T15:31:19
1 posts
🚨 New security advisory:
CVE-2021-47936 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2021-47936-opencats-unauthenticated-rce
updated 2026-05-10T15:31:19
1 posts
🔴 New security advisory:
CVE-2021-47933 affects multiple systems.
• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems
Full breakdown:
https://www.yazoul.net/advisory/cve/cve-2021-47933-wordpress-mstore-api-unauth-rce
updated 2026-05-10T08:16:08.693000
1 posts
1 repos
@wezm The writeup from the AIs sense is kind of 'fun':
https://blog.calif.io/p/cve-2026-7270-how-i-get-root-on-freebsd
updated 2026-05-10T07:16:08.740000
2 posts
🟠 CVE-2026-8234 - High (8.8)
A security vulnerability has been detected in EFM ipTIME A8004T 14.18.2. This vulnerability affects the function formWifiBasicSet of the file /goform/WifiBasicSet. The manipulation of the argument security_5g leads to stack-based buffer overflow. ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8234/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##HIGH severity alert: CVE-2026-8234 stack buffer overflow in EFM ipTIME A8004T (v14.18.2) — remote, unauthenticated exploit possible. No patch yet; restrict remote access now. Details: https://radar.offseq.com/threat/cve-2026-8234-stack-based-buffer-overflow-in-efm-i-fc36030f #OffSeq #CVE20268234 #RouterSecurity #Infosec
##updated 2026-05-09T09:31:45
1 posts
🟠 CVE-2025-66172 - High (8.1)
The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and have access to specific APIs can rest...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-66172/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-09T09:31:45
1 posts
🟠 CVE-2026-25077 - High (8.8)
Account users are allowed by default to register templates to be downloaded directly to the primary storage for deploying instances using the KVM hypervisor. Due to missing file name sanitization, an attacker can register malicious templates to ex...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25077/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-08T20:04:50.543000
1 posts
🟠 CVE-2026-42271 - High (8.8)
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.74.2 to before version 1.83.7, two endpoints used to preview an MCP server before saving it — POST /mcp-rest/test/connection and POST /mcp-rest/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42271/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-08T19:19:34.537000
4 posts
4 repos
https://github.com/rootdirective-sec/cve-2026-42208-Lab
https://github.com/Zeltoc/threat-intel-brief-cve-2026-42208-litellm
CISA has updated the KEV catalogue.
- CVE-2026-42208: BerriAI LiteLLM SQL Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-42208 #CISA #infosec #vulnerability
##CISA has updated the KEV catalogue.
- CVE-2026-42208: BerriAI LiteLLM SQL Injection Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-42208 #CISA #infosec #vulnerability
##🚨 [CISA-2026:0508] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0508)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-42208 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42208)
- Name: BerriAI LiteLLM SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: BerriAI
- Product: LiteLLM
- Notes: https://github.com/BerriAI/litellm/security/advisories/GHSA-r75f-5x8p-qvmc ; https://nvd.nist.gov/vuln/detail/CVE-2026-42208
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260508 #cisa20260508 #cve_2026_42208 #cve202642208
##🔴 CVE-2026-42208 - Critical (9.8)
LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42208/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-08T17:26:03
3 posts
4 repos
https://github.com/kaleth4/CVE-2026-7482
https://github.com/0x0OZ/CVE-2026-7482-PoC
Geopolitical tensions persist around the Strait of Hormuz as Iran responds to a US peace proposal amidst continued flare-ups (May 10-11, 2026). In cybersecurity, a critical "Bleeding Llama" vulnerability (CVE-2026-7482) in Ollama threatens over 300,000 servers (May 10, 2026). Australia urges urgent action on cyber risks from frontier AI systems. CISA also launched "CI Fortify" to bolster critical infrastructure resilience.
##Geopolitical tensions persist around the Strait of Hormuz as Iran responds to a US peace proposal amidst continued flare-ups (May 10-11, 2026). In cybersecurity, a critical "Bleeding Llama" vulnerability (CVE-2026-7482) in Ollama threatens over 300,000 servers (May 10, 2026). Australia urges urgent action on cyber risks from frontier AI systems. CISA also launched "CI Fortify" to bolster critical infrastructure resilience.
##Geopolitical tensions persist, notably the ongoing US-Iran conflict with recent flare-ups, as US President Trump and Chinese President Xi Jinping are set to meet, discussing the Iran war and AI (May 9-10).
In cybersecurity, the ShinyHunters group breached Canvas, an online learning system, impacting thousands of schools globally and potentially 275 million individuals (May 9). CISA launched "CI Fortify" to enhance critical infrastructure resilience against cyber threats, and a critical vulnerability (CVE-2026-7482) was disclosed in Ollama, an open-source LLM framework (May 10).
Technology-wise, AI advancements continue rapidly, with reports of OpenAI-Apple integration talks for iOS (May 9) and Anthropic's explosive growth and significant AI chip investments by SpaceX (May 10).
##updated 2026-05-07T21:30:27
1 posts
🔵 THREAT INTELLIGENCE
Weekly Threat Roundup: 2026-05-04 to 2026-05-10
Roundup | CRITICAL
CVEs: CVE-2026-0300, CVE-2026-33587, CVE-2026-40281
Cybersecurity roundup for 2026-05-04 to 2026-05-10. 10 CVE advisories, 5 breach reports, 4 threat news stories.
Full analysis:
https://www.yazoul.net/news/article/2026-w19-weekly-threat-roundup
updated 2026-05-07T19:18:39.910000
2 posts
🛡️ Nuova zero-day in Ivanti: aggiornare subito è essenziale per ridurre il rischio di attacchi e proteggere sistemi e dati aziendali. #Cybersecurity #Ivanti
🔗 https://www.tomshw.it/hardware/ivanti-epmm-zero-day-cve-2026-6973
##🛡️ Nuova zero-day in Ivanti: aggiornare subito è essenziale per ridurre il rischio di attacchi e proteggere sistemi e dati aziendali. #Cybersecurity #Ivanti
🔗 https://www.tomshw.it/hardware/ivanti-epmm-zero-day-cve-2026-6973
##updated 2026-05-05T21:36:29
2 posts
🟠 CVE-2026-42611 - High (8.9)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a low-privileged (with the ability to create a page) user can cause XSS with the injection of svg element. The XSS can further be escalated to dump the entire system information available u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42611/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42611 - High (8.9)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a low-privileged (with the ability to create a page) user can cause XSS with the injection of svg element. The XSS can further be escalated to dump the entire system information available u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42611/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-05T21:26:07
4 posts
⚠️ CRITICAL: Grav CMS Login plugin (<2.0.0-beta.2) has a flaw in input validation — unauthenticated attackers can self-register as admin.super if registration is enabled. Patch to 2.0.0-beta.2+ or disable registration! CVE-2026-42613 https://radar.offseq.com/threat/cve-2026-42613-cwe-20-improper-input-validation-in-0960c87a #OffSeq #Grav #Infosec
##🔴 CVE-2026-42613 - Critical (9.4)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, the Login::register() method in the Login plugin accepts attacker-controlled groups and access fields from the registration POST data without server-side validation. When registration is en...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: Grav CMS Login plugin (<2.0.0-beta.2) has a flaw in input validation — unauthenticated attackers can self-register as admin.super if registration is enabled. Patch to 2.0.0-beta.2+ or disable registration! CVE-2026-42613 https://radar.offseq.com/threat/cve-2026-42613-cwe-20-improper-input-validation-in-0960c87a #OffSeq #Grav #Infosec
##🔴 CVE-2026-42613 - Critical (9.4)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, the Login::register() method in the Login plugin accepts attacker-controlled groups and access fields from the registration POST data without server-side validation. When registration is en...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42613/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-05T21:21:13
2 posts
🔴 CVE-2026-42607 - Critical (9.1)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, an authenticated user with administrative privileges can achieve Remote Code Execution (RCE) by uploading a specially crafted ZIP file through the "Direct Install" tool. While the system at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42607/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-42607 - Critical (9.1)
Grav is a file-based Web platform. Prior to 2.0.0-beta.2, an authenticated user with administrative privileges can achieve Remote Code Execution (RCE) by uploading a specially crafted ZIP file through the "Direct Install" tool. While the system at...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42607/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-05T21:18:20
2 posts
🟠 CVE-2026-42315 - High (8.1)
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_folder", there is no sanitization at all, allowi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42315/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42315 - High (8.1)
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_folder", there is no sanitization at all, allowi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42315/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-05T20:51:46
4 posts
🟠 CVE-2026-42260 - High (8.2)
Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42260 - High (8.2)
Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42260 - High (8.2)
Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42260 - High (8.2)
Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-05T20:31:36
4 posts
🟠 CVE-2026-43938 - High (8.1)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43938 - High (8.1)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43938 - High (8.1)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43938 - High (8.1)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-05T18:21:19
4 posts
🔥 CVE-2026-42864: CRITICAL vuln in ManoManoTech firefighter-incident (<0.0.54). Missing auth lets attackers fetch arbitrary URLs & exfil AWS creds if IMDSv2 not enforced. Update to 0.0.54+ & check your cloud configs! https://radar.offseq.com/threat/cve-2026-42864-cwe-306-missing-authentication-for--60c5ba57 #OffSeq #CVE202642864 #CloudSecurity
##🔴 CVE-2026-42864 - Critical (9.9)
FireFighter is an incident management application. Prior to 0.0.54, the POST /api/v2/firefighter/raid/jira_bot endpoint (CreateJiraBotView) is reachable without authentication (permission_classes = [permissions.AllowAny]). Its attachments payload ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42864/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 CVE-2026-42864: CRITICAL vuln in ManoManoTech firefighter-incident (<0.0.54). Missing auth lets attackers fetch arbitrary URLs & exfil AWS creds if IMDSv2 not enforced. Update to 0.0.54+ & check your cloud configs! https://radar.offseq.com/threat/cve-2026-42864-cwe-306-missing-authentication-for--60c5ba57 #OffSeq #CVE202642864 #CloudSecurity
##🔴 CVE-2026-42864 - Critical (9.9)
FireFighter is an incident management application. Prior to 0.0.54, the POST /api/v2/firefighter/raid/jira_bot endpoint (CreateJiraBotView) is reachable without authentication (permission_classes = [permissions.AllowAny]). Its attachments payload ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42864/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-04T22:08:27
2 posts
🟠 CVE-2026-42313 - High (8.3)
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, the set_config_value() API method (@Permission(Perms.SETTINGS)) in src/pyload/core/api/__init__.py gates security-sensitive options behind a hand-maintai...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42313/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42313 - High (8.3)
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, the set_config_value() API method (@Permission(Perms.SETTINGS)) in src/pyload/core/api/__init__.py gates security-sensitive options behind a hand-maintai...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42313/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-04T20:53:02
1 posts
🛡️ HIGH severity in SignalK signalk-server <2.25.0 (CVE-2026-41893): WebSocket login bypasses rate limits, enabling fast brute force attacks. Patch to 2.25.0+ ASAP. Details: https://radar.offseq.com/threat/cve-2026-41893-cwe-307-improper-restriction-of-exc-a656937b #OffSeq #infosec #vuln #bruteforce
##updated 2026-05-04T18:31:33
7 posts
67 repos
https://github.com/Lutfifakee-Project/CVE-2026-41940
https://github.com/AmirrezaMarzban/portscan-CVE-2026-41940
https://github.com/sebinxavi/cve-checker-2026
https://github.com/44pie/cpsniper
https://github.com/SreejaPuthan/cpanel-control-plane-exposure-check
https://github.com/unteikyou/CVE-2026-41940-AuthBypass-Detector
https://github.com/linko-iheb/cve-2026-41940-scanner
https://github.com/shahidmallaofficial/cpanel-cve-2026-41940-fix
https://github.com/ilmndwntr/CVE-2026-41940-MASS-EXPLOIT
https://github.com/Ap0dexMe0/CVE-2026-41940
https://github.com/tfawnies/CVE-2026-41940-next
https://github.com/rfxn/cpanel-sessionscribe
https://github.com/itsismarcos/CVE-2026-41940
https://github.com/zycoder0day/CVE-2026-41940
https://github.com/george1-adel/CVE-2026-41940_exploit
https://github.com/acuciureanu/cpanel2shell-honeypot
https://github.com/0xBlackash/CVE-2026-41940
https://github.com/bughunt4me/cpanelCVE-2026-41940
https://github.com/devtint/CVE-2026-41940
https://github.com/MrOplus/CVE-2026-41940
https://github.com/imbas007/POC_CVE-2026-41940
https://github.com/Ishanoshada/CVE-2026-41940-Exploit-PoC
https://github.com/merdw/cPanel-CVE-2026-41940-Scanner
https://github.com/habibkaratas/sorry-ransomware-analysis
https://github.com/nickpaulsec/2026-41940-poc
https://github.com/assetnote/cpanel2shell-scanner
https://github.com/adriyansyah-mf/cve-2026-41940-poc
https://github.com/YudaSamuel/cpanel-vuln-scanner
https://github.com/murrez/CVE-2026-41940
https://github.com/cy3erm/CVE-2026-41940-POC
https://github.com/Sachinart/CVE-2026-41940-cpanel-0day
https://github.com/tc4dy/CVE-2026-41940-POC-Exploit
https://github.com/kmaruthisrikar/CVE-2026-41940-cPanel-Auth-Bypass-Exploit
https://github.com/OhmGun/whmxploit---CVE-2026-41940
https://github.com/3tternp/CVE-2026-41940---cPanel-WHM-check
https://github.com/rdyprtmx/poc-cve-2026-41940
https://github.com/Kagantua/cPanelWHM-AuthBypass
https://github.com/realawaisakbar/CVE-2026-41940-Exploit-PoC
https://github.com/sercanokur/CVE-2026-41940-cPanel-WHM-Verification-Tool
https://github.com/Defacto-ridgepole254/CVE-2026-41940-Exploit-PoC
https://github.com/Jenderal92/CVE-2026-41940
https://github.com/0xabdoulaye/CPANEL-CVE-2026-41940
https://github.com/tahaXafous/CVE_2026_41940_scan_exploit
https://github.com/anach-ai/CVE-2026-41940
https://github.com/MrAriaNet/cPanel-Fix
https://github.com/Richflexpix/cpanel-pwn
https://github.com/iSee857/cPanel-WHM-CVE-2026-41940-AuthBypass
https://github.com/Underh0st/CPanel-Audit-Remediation-Tool
https://github.com/0xF55/cve-2026-41940-exploit
https://github.com/Christian93111/CVE-2026-41940
https://github.com/ynsmroztas/cPanelSniper
https://github.com/ZildanZ/CVE-2026-41940
https://github.com/Unfold-Security/CVE-2026-41940-Detection
https://github.com/vineet7800/cpanel-malware-cleaner-cve-2026
https://github.com/XsanFlip/poc-cpanel-cve-2026-41940
https://github.com/thekawix/CVE-2026-41940
https://github.com/zedxod/CVE-2026-41940-POC
https://github.com/ngksiva/cpanel-forensics
https://github.com/senyx122/CVE-2026-41940
https://github.com/0dev1337/cpanelscanner
https://github.com/branixsolutions/Security-CVE-2026-41940-cPanel-WHM-WP2
https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker
https://github.com/mahfuzreham/cpanel-cve-2026-41940
https://github.com/dennisec/CVE-2026-41940
https://github.com/Andrei-Dr/cpanel-cve-2026-41940-ioc
Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment
#CVE_2026_41940 #Mr_Rot13
https://blog.xlab.qianxin.com/mr_rot13-the-elusive-6-year-hacker-group-weaponizing-critical-cpanel-flaws-for-backdoor-deployment/
CVE-2026-41940 is under active mass exploitation.
Researchers say threat group “Mr_Rot13” is exploiting the critical cPanel flaw to steal credentials, deploy webshells, and gain persistent access across hosting infrastructure.
2,000+ attacking IPs observed globally.
##Critical cPanel Vulnerability CVE-2026-41940 Sparks Global Cyberattacks and Backdoor Infections
Massive Exploitation Campaign Targets cPanel Servers Worldwide A dangerous cyberattack campaign is rapidly spreading across the internet after hackers began exploiting the critical cPanel vulnerability identified as CVE-2026-41940. Security researchers have assigned the flaw a CVSS severity score of 9.3, placing it among the most dangerous web hosting vulnerabilities…
##cPanel Flaw Exploited to Deploy Filemanager Backdoor
Over 2,000 attacker source IPs worldwide are currently involved in automated attacks exploiting a critical cPanel vulnerability, CVE-2026-41940, which allows remote attackers to gain elevated control and deploy malicious backdoors. This flaw has been targeted by multiple actors for a range of malicious outcomes, including…
#CpanelVulnerability #Cve202641940 #AuthenticationBypass #EmergingThreats #MalwareOperations
##Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment
#CVE_2026_41940 #Mr_Rot13
https://blog.xlab.qianxin.com/mr_rot13-the-elusive-6-year-hacker-group-weaponizing-critical-cpanel-flaws-for-backdoor-deployment/
CVE-2026-41940 is under active mass exploitation.
Researchers say threat group “Mr_Rot13” is exploiting the critical cPanel flaw to steal credentials, deploy webshells, and gain persistent access across hosting infrastructure.
2,000+ attacking IPs observed globally.
##updated 2026-05-04T18:20:39.803000
1 posts
📰 MOVEit Automation Hit with Critical 9.8 CVSS Auth Bypass Flaw (CVE-2026-4670)
🚨 URGENT PATCH: A critical 9.8 CVSS auth bypass (CVE-2026-4670) is found in MOVEit Automation. Attacker could gain admin control. Given MOVEit's history, this is a major risk. Upgrade immediately! #MOVEit #CyberSecurity #Vulnerability #PatchNow
##updated 2026-04-30T15:31:40
2 posts
AISLE scopre CVE-2026-42511: una vulnerabilità di esecuzione di comandi remoti in FreeBSD vecchia di 21 anni.
La vulnerabilità è entrata per la prima volta in FreeBSD nella versione 2005 di FreeBSD-6.0, quando dhclientè stato importato il file di OpenBSD, ed è rimasta latente fino alla scoperta da parte di AISLE. Nel 2012, quando tale sistema operativo è stato dhclient-scriptcompletamente deprecato, è stata di fatto risolta la vulnerabilità.
##The FreeBSD team has patched a remote code execution in its operating system that impacts all versions released since 2005
Tracked as CVE-2026-42511, the vulnerability resides in the FreeBSD DHCP client and is extremely easy to exploit
##updated 2025-10-22T00:34:26
1 posts
📢 CVE-2025-20362 : Contournement d'authentification VPN activement exploité sur Cisco ASA et FTD
📝 ## 🔍 Contexte
Cet article est publié le 11 mai 2026 par CrowdSec sur sa platefo...
📖 cyberveille : https://cyberveille.ch/posts/2026-05-11-cve-2025-20362-contournement-d-authentification-vpn-activement-exploite-sur-cisco-asa-et-ftd/
🌐 source : https://www.crowdsec.net/vulntracking-report/cve-2025-20362-cisco-asa-vpn-authentication-bypass?
#CVE_2025_20362 #Cisco_ASA #Cyberveille
updated 2025-10-22T00:32:22
2 posts
21 repos
https://github.com/MedX267/EternalBlue-Vulnerability-Scanner
https://github.com/Mitsu-bis/Eternal-Blue-CVE-2017-0144-THM-Write-Up
https://github.com/sethwhy/BlueDoor
https://github.com/klairmanraj/Multi-VLAN-Enterprise-Network-Security-Infrastructure
https://github.com/quynhold/Detect-CVE-2017-0144-attack
https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144
https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint
https://github.com/dannic145/EternalBlue-Exploit-Demonstration
https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework-
https://github.com/ichhyak22/EternalBlue-Exploit-Demonstration-MS17-010
https://github.com/AtithKhawas/autoblue
https://github.com/FireTemple/Blackash-CVE-2017-0144
https://github.com/AnugiArrawwala/CVE-Research
https://github.com/klairmanraj/Multi-VLAN-Enterprise-Network-Vulnerability-Assessment
https://github.com/peterpt/eternal_scanner
https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution
https://github.com/denuwanjayasekara/CVE-Exploitation-Reports
https://github.com/kimocoder/eternalblue
https://github.com/klairmanraj/Vulnerability-Risk-Assessment-TVRA-Enterprise-Network
https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144
https://dfarq.homeip.net/why-the-wannacry-outbreak-was-so-bad-2/
##https://dfarq.homeip.net/why-the-wannacry-outbreak-was-so-bad/
##updated 2025-09-15T17:17:49.997000
2 posts
🟠 CVE-2026-44167 - High (7.5)
phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44167 - High (7.5)
phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43989 - High (8.5)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43989 - High (8.5)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43989 - High (8.5)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43989 - High (8.5)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43991 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43991 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43991 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43991 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43990 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell me...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43990/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43990 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell me...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43990/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43993 - High (8.2)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. Thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43993 - High (8.2)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. Thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8161 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8161/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8161 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8161/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42858 - High (8.5)
Open edX Platform enables the authoring and delivery of online learning at any scale. The sync_provider_data endpoint in SAMLProviderDataViewSet allows authenticated Enterprise Admin users to supply an arbitrary URL via the metadata_url POST param...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42858 - High (8.5)
Open edX Platform enables the authoring and delivery of online learning at any scale. The sync_provider_data endpoint in SAMLProviderDataViewSet allows authenticated Enterprise Admin users to supply an arbitrary URL via the metadata_url POST param...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Critical Rancher Fleet Vulnerability Allows Full Kubernetes Cluster Takeover
SUSE Rancher Fleet contains a critical vulnerability (CVE-2026-41050) that allows attackers to bypass multi-tenant isolation and gain cluster-admin privileges by exploiting the Helm deployer's failure to enforce ServiceAccount impersonation.
**If you're using Rancher Fleet to manage Kubernetes clusters, update ASAP to a patched version (Fleet 0.11.13/0.12.14/0.13.10/0.14.5, or Rancher 2.10.11/2.11.13/2.12.9/2.13.5/2.14.1). If you can't patch right away, disable Fleet-monitored repositories for untrusted tenants, audit your Helm charts for use of the lookup function, and rotate any secrets that may have been exposed.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-rancher-fleet-vulnerability-allows-full-kubernetes-cluster-takeover-v-a-d-8-y/gD2P6Ple2L
⚠️ HIGH-severity XSS (CVE-2026-6735) impacts PHP 8.2 – 8.5: improper input handling on PHP-FPM status page enables JavaScript injection via crafted URLs. Restrict access & watch for updates. https://radar.offseq.com/threat/cve-2026-6735-cwe-79-improper-neutralization-of-in-fbc11f41 #OffSeq #PHP #XSS #AppSec
##🟠 CVE-2026-42562 - High (8.3)
Plainpad is a self hosted note taking app. Prior to version 1.1.1, Plainpad allows a low-privilege authenticated user to self-escalate to administrator by submitting admin=true in PUT /api.php/v1/users/{id}. The endpoint directly persists the admi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42562/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##