## Updated at UTC 2026-05-17T21:38:47.804053

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-43500 7.8 0.01% 3 13 2026-05-17T18:31:33 In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also
CVE-2026-8739 5.3 0.03% 2 0 2026-05-17T09:30:29 A vulnerability was detected in Sanluan PublicCMS 5.202506.d. The affected eleme
CVE-2026-8737 5.3 0.05% 2 0 2026-05-17T09:30:23 A weakness has been identified in Sanluan PublicCMS 5.202506.d. This issue affec
CVE-2026-8719 8.8 0.04% 4 0 2026-05-17T06:30:32 The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPre
CVE-2026-8733 6.3 0.03% 2 0 2026-05-17T06:30:32 A vulnerability was found in Investintech SlimPDFReader up to 2.0.13. Affected b
CVE-2026-8724 4.7 0.01% 2 0 2026-05-17T03:30:25 A security flaw has been discovered in Dataease 2.10.20. Impacted is the functio
CVE-2026-8725 7.3 0.04% 2 0 2026-05-17T02:16:45.487000 A weakness has been identified in CoreWorxLab CAAL up to 1.6.0. The affected ele
CVE-2026-46728 8.2 0.00% 4 0 2026-05-17T00:31:39 Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification by
CVE-2020-17103 7.0 0.35% 2 2 2026-05-16T15:31:13 , aka 'Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerabili
CVE-2026-46333 0 0.03% 16 4 2026-05-16T13:16:16.810000 In the Linux kernel, the following vulnerability has been resolved: ptrace: sli
CVE-2026-8657 8.2 0.05% 4 0 2026-05-16T06:30:40 Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype P
CVE-2026-27886 7.5 0.11% 2 0 2026-05-16T03:16:47.733000 Strapi is an open source headless content management system. Strapi versions sta
CVE-2026-45369 8.3 0.04% 4 0 2026-05-16T01:16:17.233000 python-utcp is the python implementation of UTCP. Prior to 1.1.3, the _substitut
CVE-2026-35194 8.1 0.05% 2 0 2026-05-16T00:32:14 Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and
CVE-2026-45672 8.8 0.06% 2 1 2026-05-15T23:55:55 ### Summary The `/api/v1/utils/code/execute` endpoint executes arbitrary Python
CVE-2026-45398 7.5 0.04% 4 0 2026-05-15T23:55:25 # IDOR: Retrieval API Bypasses Knowledge Base Access Controls **Author:** Andre
CVE-2026-45331 8.5 0.03% 2 0 2026-05-15T23:53:50 # SSRF Bypass via IPv6/IPv4-mapped IPv6/IPv4-reserved-ranges in `validate_url()`
CVE-2026-44552 8.7 0.03% 2 0 2026-05-15T23:52:30 # Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Ena
CVE-2026-44551 9.1 0.04% 2 0 2026-05-15T23:52:14 # LDAP Empty Password Authentication Bypass ## Affected Component LDAP authent
CVE-2026-44714 7.5 0.03% 2 0 2026-05-15T23:49:54 ### Summary `ScriptExecution.correctlySpends()` contains two fast-path verificat
CVE-2026-42155 None 0.04% 2 0 2026-05-15T23:48:44 Affected Version: OpenMage LTS ≤ 20.16.0 (confirmed on `20.16.0`) Affected File
CVE-2026-41258 9.1 0.04% 4 0 2026-05-15T23:48:39 ### Impact The `ConceptReferenceRangeUtility.evaluateCriteria()` method in Open
CVE-2026-44671 7.5 0.25% 2 0 2026-05-15T23:47:19 ## Summary A vulnerability was discovered in Zitadel's LDAP identity provider i
CVE-2026-45370 7.7 0.03% 2 0 2026-05-15T23:47:03 ## Summary `_prepare_environment()` in `cli_communication_protocol.py` passes a
CVE-2026-45375 9.0 0.04% 2 0 2026-05-15T23:45:28 ### Summary SiYuan's Bazaar (community marketplace) renders the `name` and `ver
CVE-2026-44523 10.0 0.01% 2 0 2026-05-15T23:45:08 #### Summary No minimum length or entropy is enforced on the `JWT_SECRET` confi
CVE-2026-45402 8.1 0.03% 2 0 2026-05-15T23:16:21.470000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45010 9.1 0.12% 4 0 2026-05-15T23:16:20.927000 phpMyFAQ before 4.1.2 contains an improper restriction of excessive authenticati
CVE-2026-45671 8.0 0.04% 2 0 2026-05-15T22:16:56.327000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45665 8.1 0.03% 2 0 2026-05-15T22:16:55.920000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45400 8.5 0.03% 2 0 2026-05-15T22:16:55.820000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45303 7.7 0.03% 2 0 2026-05-15T22:16:53.977000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45301 8.1 0.03% 2 0 2026-05-15T22:16:53.837000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-44826 7.5 0.04% 2 0 2026-05-15T22:16:53.610000 Vvveb is a powerful and easy to use CMS with page builder to build websites, blo
CVE-2026-46366 7.5 0.06% 2 0 2026-05-15T21:31:45 phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the ge
CVE-2026-46367 7.6 0.01% 2 0 2026-05-15T21:31:45 phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Ut
CVE-2026-46364 9.8 0.05% 4 0 2026-05-15T21:31:44 phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in
CVE-2026-46359 7.5 0.03% 2 0 2026-05-15T21:31:42 phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::set
CVE-2026-8696 7.5 0.23% 2 0 2026-05-15T21:16:39.360000 radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() fu
CVE-2026-8558 8.8 0.08% 2 0 2026-05-15T21:16:39.133000 Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-45675 8.1 0.05% 2 0 2026-05-15T21:16:38.647000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-45401 8.5 0.03% 2 0 2026-05-15T21:16:38.140000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-44555 7.6 0.04% 2 0 2026-05-15T21:16:35.913000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-44553 8.1 0.03% 2 0 2026-05-15T21:16:35.810000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-46408 7.6 0.03% 2 0 2026-05-15T20:16:49.503000 Vvveb is a powerful and easy to use CMS with page builder to build websites, blo
CVE-2026-44554 8.1 0.04% 2 0 2026-05-15T20:16:46.840000 Open WebUI is a self-hosted artificial intelligence platform designed to operate
CVE-2026-42897 8.1 12.34% 33 1 2026-05-15T19:35:52.963000 Improper neutralization of input during web page generation ('cross-site scripti
CVE-2026-41615 9.6 0.10% 2 0 2026-05-15T18:39:39.933000 Exposure of sensitive information to an unauthorized actor in Microsoft Authenti
CVE-2026-34253 8.2 0.07% 2 0 2026-05-15T18:31:42 A buffer underflow vulnerability has been identified in the ogg123 utility from
CVE-2026-8695 7.5 0.26% 2 0 2026-05-15T18:16:26.160000 radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list()
CVE-2026-44542 9.1 0.64% 2 0 2026-05-15T18:09:04.607000 FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3
CVE-2026-23998 7.5 0.02% 2 0 2026-05-15T18:08:13.130000 Fleet is open source device management software. Prior to version 4.81.0, a vuln
CVE-2026-44717 9.8 0.25% 4 0 2026-05-15T17:16:48.073000 MCP Calculate Server is a mathematical calculation service based on MCP protocol
CVE-2026-38728 7.5 0.10% 2 0 2026-05-15T16:16:14.463000 An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to c
CVE-2026-8585 7.5 0.09% 2 0 2026-05-15T15:31:47 Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.777
CVE-2026-8634 9.1 0.12% 2 0 2026-05-15T15:16:56.913000 Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability
CVE-2026-44673 7.5 0.05% 2 0 2026-05-15T15:16:53.830000 libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_s
CVE-2026-2652 8.6 0.09% 1 0 2026-05-15T14:56:18.253000 A vulnerability in mlflow/mlflow versions 3.9.0 and earlier allows unauthenticat
CVE-2026-8398 9.8 0.03% 2 0 2026-05-15T14:56:18.253000 A supply chain attack compromised the official installation packages of DAEMON T
CVE-2026-44633 8.1 0.03% 2 0 2026-05-15T14:44:49.877000 Live Helper Chat is an open-source application that enables live support website
CVE-2026-44592 9.4 0.02% 2 0 2026-05-15T14:44:49.877000 Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_D
CVE-2026-44212 9.3 0.06% 2 0 2026-05-15T14:30:03.170000 PrestaShop is an open source e-commerce web application. Prior to 8.2.6 and 9.1.
CVE-2026-41702 7.8 0.01% 2 0 2026-05-15T14:11:57.190000 VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that o
CVE-2026-0481 0 0.20% 1 0 2026-05-15T14:10:17.083000 Unrestricted IP address binding in the AMD Device Metrics Exporter (ROCm ecosyst
CVE-2026-4094 8.1 0.04% 2 0 2026-05-15T14:09:15.910000 The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is
CVE-2026-6228 8.8 0.11% 1 0 2026-05-15T14:09:15.910000 The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege
CVE-2026-41964 8.4 0.01% 1 0 2026-05-15T12:30:37 Permission control vulnerability in the web. Impact: Successful exploitation of
CVE-2026-6403 7.5 0.27% 1 0 2026-05-15T09:31:43 The Quick Playground plugin for WordPress is vulnerable to Path Traversal in ver
CVE-2026-5229 9.8 0.35% 2 0 2026-05-15T09:31:43 The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in v
CVE-2026-28761 8.1 0.02% 2 0 2026-05-15T06:30:40 Cross-site request forgery vulnerability exists in Musetheque V4 Information Dis
CVE-2026-8526 8.8 0.07% 2 0 2026-05-15T00:31:37 Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8575 8.3 0.07% 2 0 2026-05-15T00:31:37 Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote a
CVE-2026-8573 8.3 0.07% 2 0 2026-05-15T00:31:37 Integer overflow in Codecs in Google Chrome on Windows prior to 148.0.7778.168 a
CVE-2026-8569 8.3 0.07% 2 0 2026-05-15T00:31:37 Out of bounds write in Codecs in Google Chrome on Mac prior to 148.0.7778.168 al
CVE-2026-8513 8.3 0.07% 2 0 2026-05-15T00:31:36 Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allo
CVE-2026-8510 7.5 0.07% 2 0 2026-05-15T00:31:36 Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 all
CVE-2026-8519 8.8 0.07% 2 0 2026-05-15T00:31:36 Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 al
CVE-2026-8531 8.8 0.06% 2 0 2026-05-15T00:31:36 Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.16
CVE-2026-8530 8.3 0.07% 2 0 2026-05-15T00:31:36 Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 al
CVE-2026-8524 8.8 0.07% 2 0 2026-05-15T00:31:36 Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed
CVE-2026-8534 8.3 0.07% 2 0 2026-05-15T00:31:36 Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.77
CVE-2026-8533 8.3 0.07% 2 0 2026-05-15T00:31:36 Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed
CVE-2026-8548 8.3 0.07% 2 0 2026-05-15T00:31:36 Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8542 8.3 0.07% 2 0 2026-05-15T00:30:30 Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allow
CVE-2026-8515 8.3 0.07% 2 0 2026-05-15T00:30:29 Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote
CVE-2026-8574 8.3 0.07% 2 0 2026-05-14T22:16:50.903000 Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allow
CVE-2026-8571 8.3 0.09% 2 0 2026-05-14T22:16:50.597000 Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148.
CVE-2026-8527 8.8 0.08% 2 0 2026-05-14T22:16:46.997000 Insufficient validation of untrusted input in Downloads in Google Chrome prior t
CVE-2026-8525 8.3 0.06% 2 0 2026-05-14T22:16:46.700000 Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 al
CVE-2026-8523 8.3 0.07% 2 0 2026-05-14T22:16:46.400000 Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote
CVE-2026-8520 8.3 0.06% 2 0 2026-05-14T22:16:46.260000 Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attac
CVE-2026-8514 8.3 0.07% 2 0 2026-05-14T22:16:45.703000 Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote
CVE-2026-8512 8.3 0.07% 2 0 2026-05-14T22:16:45.417000 Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8581 8.8 0.13% 2 0 2026-05-14T21:30:58 Use after free in GPU in Google Chrome prior to 148.0.7778.168 allowed a remote
CVE-2026-8577 8.8 0.08% 2 0 2026-05-14T21:30:58 Integer overflow in Fonts in Google Chrome prior to 148.0.7778.168 allowed a rem
CVE-2026-8629 8.1 0.02% 2 0 2026-05-14T21:30:58 Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allo
CVE-2026-8587 8.8 0.02% 2 0 2026-05-14T21:30:58 Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 all
CVE-2026-8557 7.5 0.07% 2 0 2026-05-14T21:30:55 Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed
CVE-2026-8522 8.8 0.08% 2 0 2026-05-14T21:30:54 Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allo
CVE-2026-8521 7.5 0.03% 2 0 2026-05-14T21:30:54 Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8529 8.8 0.07% 2 0 2026-05-14T21:30:54 Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed
CVE-2026-8540 8.8 0.08% 2 0 2026-05-14T21:30:54 Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote a
CVE-2026-8532 8.8 0.08% 2 0 2026-05-14T21:30:54 Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remot
CVE-2026-8549 8.8 0.08% 2 0 2026-05-14T21:30:54 Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remot
CVE-2026-8544 8.8 0.08% 2 0 2026-05-14T21:30:54 Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remot
CVE-2026-8551 8.8 0.08% 2 0 2026-05-14T21:30:54 Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a r
CVE-2026-8621 8.8 0.08% 2 0 2026-05-14T21:30:53 Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that al
CVE-2026-8511 9.6 0.07% 3 0 2026-05-14T21:30:53 Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote a
CVE-2026-8517 8.8 0.07% 2 0 2026-05-14T21:30:53 Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.1
CVE-2026-44586 8.3 0.05% 2 0 2026-05-14T21:22:56.313000 SiYuan is an open-source personal knowledge management system. From 2.1.12 to be
CVE-2026-8509 8.8 0.06% 2 0 2026-05-14T21:19:23.923000 Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a
CVE-2026-8518 8.8 0.08% 2 0 2026-05-14T21:19:23.923000 Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remot
CVE-2026-8547 7.5 0.07% 2 0 2026-05-14T21:19:23.923000 Insufficient policy enforcement in Passwords in Google Chrome on Windows prior t
CVE-2026-8555 8.8 0.08% 2 0 2026-05-14T21:19:23.923000 Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowe
CVE-2026-8580 9.6 0.07% 3 0 2026-05-14T21:19:23.923000 Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote
CVE-2026-45338 7.7 0.03% 2 0 2026-05-14T20:19:57 ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in `_proce
CVE-2026-45315 8.7 0.02% 2 0 2026-05-14T20:18:01 ## Summary
CVE-2026-42945 8.1 0.15% 21 21 2026-05-14T20:17:05.413000 NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo
CVE-2026-43284 7.8 0.01% 3 25 2026-05-14T18:33:53 In the Linux kernel, the following vulnerability has been resolved: xfrm: esp:
CVE-2026-20182 10.0 31.70% 16 1 2026-05-14T18:33:03 May 2026: This security advisory provides the details and fix information for a
CVE-2026-6473 8.8 0.06% 1 0 2026-05-14T15:32:05 Integer wraparound in multiple PostgreSQL server features allows an unprivileged
CVE-2026-8181 9.8 0.26% 2 5 2026-05-14T14:28:41.283000 The Burst Statistics – Privacy-Friendly WordPress Analytics (Google Analytics Al
CVE-2026-43660 7.5 0.12% 1 0 2026-05-13T21:33:06 A validation issue was addressed with improved logic. This issue is fixed in iOS
CVE-2026-28883 7.5 0.05% 1 0 2026-05-13T21:33:04 A use-after-free issue was addressed with improved memory management. This issue
CVE-2026-40003 5.1 0.03% 1 1 2026-05-13T19:19:26.713000 ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory wri
CVE-2026-0265 0 0.08% 2 1 2026-05-13T18:17:47.830000 An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en
CVE-2026-45091 9.1 0.01% 2 1 2026-05-13T16:24:39 In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embe
CVE-2026-40361 8.4 0.06% 2 0 2026-05-13T15:34:52.573000 Use after free in Microsoft Office Word allows an unauthorized attacker to execu
CVE-2026-4798 7.5 0.06% 1 0 2026-05-13T14:43:46.717000 The Avada Builder plugin for WordPress is vulnerable to time-based SQL Injection
CVE-2026-28993 5.5 0.01% 2 0 2026-05-13T14:07:29.720000 This issue was addressed by adding an additional prompt for user consent. This i
CVE-2026-42898 9.9 0.08% 1 0 2026-05-12T18:30:54 Improper control of generation of code ('code injection') in Microsoft Dynamics
CVE-2026-40369 7.8 0.02% 4 1 2026-05-12T18:30:50 Untrusted pointer dereference in Windows Kernel allows an authorized attacker to
CVE-2026-8043 9.6 0.09% 1 0 2026-05-12T15:31:49 External control of a file name in Ivanti Xtraction before version 2026.2 allows
CVE-2026-31431 7.8 2.57% 1 100 2026-05-12T15:31:18 In the Linux kernel, the following vulnerability has been resolved: crypto: alg
CVE-2026-7411 10.0 0.13% 1 1 2026-05-11T16:22:43 In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequat
CVE-2026-44570 8.3 0.04% 2 0 2026-05-11T14:25:50 ### Summary Authorization controls surrounding the memories API were inconsiste
CVE-2026-44565 8.1 0.06% 2 0 2026-05-11T14:03:27 ** CONFIDENTIAL ** Vulnerability Disclosure Analysis Documentation ------------
CVE-2026-7412 8.6 0.03% 1 0 2026-05-06T16:16:12.510000 In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, the Opera
CVE-2026-41940 9.8 78.29% 1 67 template 2026-05-04T18:31:33 cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0
CVE-2026-4289 7.3 0.04% 2 1 2026-04-29T01:00:01.613000 A security vulnerability has been detected in Tiandy Easy7 Integrated Management
CVE-2026-40478 9.0 0.05% 2 1 2026-04-24T20:53:27 ### Impact A security bypass vulnerability exists in the expression execution me
CVE-2026-34197 8.8 75.81% 2 10 template 2026-04-16T21:49:17 Improper Input Validation, Improper Control of Generation of Code ('Code Injecti
CVE-2026-32201 6.5 8.71% 1 1 2026-04-14T18:30:55 Improper input validation in Microsoft Office SharePoint allows an unauthorized
CVE-2026-24154 7.6 0.03% 2 0 2026-04-03T19:04:33.083000 NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker
CVE-2018-4063 8.8 1.88% 2 0 2025-12-15T15:18:49.987000 An exploitable remote code execution vulnerability exists in the upload.cgi func
CVE-2023-22518 9.8 94.38% 2 9 template 2025-10-24T13:38:59.063000 All versions of Confluence Data Center and Server are affected by this unexploit
CVE-2017-9841 9.8 94.21% 2 17 template 2025-10-22T17:32:08 Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as we
CVE-2025-6793 9.4 87.03% 2 0 2025-07-07T15:30:41 Marvell QConvergeConsole QLogicDownloadImpl Directory Traversal Arbitrary File D
CVE-2024-48760 9.8 66.58% 2 0 2025-01-23T18:32:22 An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code v
CVE-2023-30253 8.8 90.43% 2 8 2025-01-14T17:15:11.487000 Dolibarr before 17.0.1 allows remote code execution by an authenticated user via
CVE-2024-49767 7.5 1.09% 2 0 2025-01-03T12:15:26.257000 Werkzeug is a Web Server Gateway Interface web application library. Applications
CVE-2022-21894 4.4 42.69% 2 6 2024-11-21T06:45:39.280000 Secure Boot Security Feature Bypass Vulnerability
CVE-2023-24932 6.7 0.58% 2 4 2024-08-01T15:32:23 Secure Boot Security Feature Bypass Vulnerability
CVE-2026-43908 0 0.04% 2 0 N/A
CVE-2026-43907 0 0.04% 2 0 N/A
CVE-2026-43906 0 0.01% 2 0 N/A
CVE-2026-43905 0 0.01% 2 0 N/A
CVE-2026-43904 0 0.01% 2 0 N/A
CVE-2026-43903 0 0.01% 2 0 N/A
CVE-2026-43909 0 0.04% 2 0 N/A
CVE-2026-46300 0 0.00% 5 5 N/A
CVE-2026-46407 0 0.03% 2 0 N/A
CVE-2026-8686 0 0.03% 2 0 N/A
CVE-2026-44699 0 0.04% 2 0 N/A
CVE-2026-45035 0 0.05% 2 0 N/A
CVE-2026-4782 0 0.04% 1 0 N/A

CVE-2026-43500
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-17T18:31:33

3 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-o

13 repos

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan

https://github.com/vorkampfer/dirty_frag_mitigation

https://github.com/liamromanis101/DirtyFrag-Detector

https://github.com/krisiasty/vcheck

https://github.com/0xlane/pagecache-guard

https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4

https://github.com/XRSecCD/202605_dirty_frag

https://github.com/linnemanlabs/dirtyfrag-arm64

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/metalx1993/dirtyfrag-patches

https://github.com/haydenjames/dirty-frag-check

https://github.com/AK777177/Dirty-Frag-Analysis

ghostwriter@phpc.social at 2026-05-17T11:57:53.000Z ##

#DirtyFrag #vulnerability: Universal Linux LPE

Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.

github.com/V4bel/dirtyfrag

#CVE

##

sourceware@fosstodon.org at 2026-05-17T11:05:36.000Z ##

To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).

Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.

##

PC_Fluesterer@social.tchncs.de at 2026-05-17T06:57:38.000Z ##

Ist die Aufregung um die neuen Linux-Fehler berechtigt?

Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:

CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").

Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).

Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen

##

CVE-2026-8739
(5.3 MEDIUM)

EPSS: 0.03%

updated 2026-05-17T09:30:29

2 posts

A vulnerability was detected in Sanluan PublicCMS 5.202506.d. The affected element is the function getSignKey of the file publiccms-core/src/main/java/com/publiccms/logic/component/config/SafeConfigComponent.java. The manipulation of the argument privatefile_key results in use of hard-coded cryptographic key . The attack can be executed remotely. The exploit is now public and may be used. The ven

offseq at 2026-05-17T09:00:27.402Z ##

🔒 MEDIUM severity: Sanluan PublicCMS 5.202506.d suffers from a hard-coded cryptographic key (CVE-2026-8739), enabling remote exploitation. No patch yet — restrict access, monitor for updates. Exploit code public. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T09:00:27.000Z ##

🔒 MEDIUM severity: Sanluan PublicCMS 5.202506.d suffers from a hard-coded cryptographic key (CVE-2026-8739), enabling remote exploitation. No patch yet — restrict access, monitor for updates. Exploit code public. radar.offseq.com/threat/cve-20 #OffSeq #Vuln #PublicCMS

##

CVE-2026-8737
(5.3 MEDIUM)

EPSS: 0.05%

updated 2026-05-17T09:30:23

2 posts

A weakness has been identified in Sanluan PublicCMS 5.202506.d. This issue affects the function execute of the file publiccms-trade/src/main/java/com/publiccms/views/directive/trade/TradeAddressListDirective.java of the component Trade Address Query Handler. Executing a manipulation of the argument userId/id can lead to missing authentication. The attack may be launched remotely. The exploit has b

offseq at 2026-05-17T07:30:23.742Z ##

🔎 MEDIUM severity: CVE-2026-8737 affects Sanluan PublicCMS 5.202506.d — missing authentication in Trade Address Query Handler. Public exploit is out. Restrict access & monitor for abuse. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T07:30:23.000Z ##

🔎 MEDIUM severity: CVE-2026-8737 affects Sanluan PublicCMS 5.202506.d — missing authentication in Trade Address Query Handler. Public exploit is out. Restrict access & monitor for abuse. radar.offseq.com/threat/cve-20 #OffSeq #Sanluan #Vulnerability #InfoSec

##

CVE-2026-8719
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-17T06:30:32

4 posts

The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, where any valid OAuth token causes MCP access to be granted without verifying administrator privileges. This makes it possible for authenticated (Subscribe

offseq at 2026-05-17T10:30:27.355Z ##

⚠️ CVE-2026-8719 (HIGH, CVSS 8.8): AI Engine for WordPress v3.4.9 lets any OAuth token holder with Subscriber+ escalate to admin via MCP tools. Restrict OAuth, monitor for fixes. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-17T06:59:49.000Z ##

🟠 CVE-2026-8719 - High (8.8)

The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-17T10:30:27.000Z ##

⚠️ CVE-2026-8719 (HIGH, CVSS 8.8): AI Engine for WordPress v3.4.9 lets any OAuth token holder with Subscriber+ escalate to admin via MCP tools. Restrict OAuth, monitor for fixes. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #Vuln #PrivilegeEscalation

##

thehackerwire@mastodon.social at 2026-05-17T06:59:49.000Z ##

🟠 CVE-2026-8719 - High (8.8)

The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8733
(6.3 MEDIUM)

EPSS: 0.03%

updated 2026-05-17T06:30:32

2 posts

A vulnerability was found in Investintech SlimPDFReader up to 2.0.13. Affected by this vulnerability is the function sub_3B4610 of the file SlimPDFReader.exe. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been made public and could be used. The vendor responded to the initial vulnerability report by the researcher with a note

offseq at 2026-05-17T06:00:27.085Z ##

MEDIUM severity: CVE-2026-8733 in Investintech SlimPDFReader v2.0.0 – 2.0.13 allows stack-based buffer overflow. Product is discontinued, no patch available. Public exploit code is out, but not actively exploited. Migrate now. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T06:00:27.000Z ##

MEDIUM severity: CVE-2026-8733 in Investintech SlimPDFReader v2.0.0 – 2.0.13 allows stack-based buffer overflow. Product is discontinued, no patch available. Public exploit code is out, but not actively exploited. Migrate now. radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #PDF

##

CVE-2026-8724
(4.7 MEDIUM)

EPSS: 0.01%

updated 2026-05-17T03:30:25

2 posts

A security flaw has been discovered in Dataease 2.10.20. Impacted is the function SqlparserUtils.transFilter of the file SqlparserUtils.java of the component Data Dashboard. The manipulation results in sql injection. The attack may be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure.

offseq at 2026-05-17T04:30:26.818Z ##

MEDIUM severity: CVE-2026-8724 in Dataease 2.10.20 allows SQL injection via SqlparserUtils.transFilter. Exploit requires high-priv user. No patch yet — restrict access & monitor for suspicious queries. More: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T04:30:26.000Z ##

MEDIUM severity: CVE-2026-8724 in Dataease 2.10.20 allows SQL injection via SqlparserUtils.transFilter. Exploit requires high-priv user. No patch yet — restrict access & monitor for suspicious queries. More: radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #InfoSec

##

CVE-2026-8725
(7.3 HIGH)

EPSS: 0.04%

updated 2026-05-17T02:16:45.487000

2 posts

A weakness has been identified in CoreWorxLab CAAL up to 1.6.0. The affected element is an unknown function of the file src/caal/webhooks.py of the component test-hass Endpoint. This manipulation causes server-side request forgery. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about thi

offseq at 2026-05-17T03:00:29.747Z ##

🛡️ CVE-2026-8725: SSRF in CoreWorxLab CAAL v1.0 – 1.6.0 (MEDIUM). Remote, unauthenticated attackers can trigger server requests. No patch; restrict outbound traffic & monitor logs. Exploit is public. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-17T03:00:29.000Z ##

🛡️ CVE-2026-8725: SSRF in CoreWorxLab CAAL v1.0 – 1.6.0 (MEDIUM). Remote, unauthenticated attackers can trigger server requests. No patch; restrict outbound traffic & monitor logs. Exploit is public. radar.offseq.com/threat/cve-20 #OffSeq #SSRF #Vuln #BlueTeam

##

CVE-2026-46728
(8.2 HIGH)

EPSS: 0.00%

updated 2026-05-17T00:31:39

4 posts

Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.

offseq at 2026-05-17T00:00:36.044Z ##

🔒 CVE-2026-46728 (HIGH, CVSS 8.2) in denx U-Boot <2026.04 lets local privileged attackers bypass FIT signature checks due to hashed-nodes omission. Restrict local access & watch for patches. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-16T22:59:52.000Z ##

🟠 CVE-2026-46728 - High (8.2)

Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-17T00:00:36.000Z ##

🔒 CVE-2026-46728 (HIGH, CVSS 8.2) in denx U-Boot <2026.04 lets local privileged attackers bypass FIT signature checks due to hashed-nodes omission. Restrict local access & watch for patches. radar.offseq.com/threat/cve-20 #OffSeq #Uboot #Infosec #Firmware

##

thehackerwire@mastodon.social at 2026-05-16T22:59:52.000Z ##

🟠 CVE-2026-46728 - High (8.2)

Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2020-17103
(7.0 None)

EPSS: 0.35%

updated 2026-05-16T15:31:13

2 posts

, aka 'Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-17134, CVE-2020-17136.

2 repos

https://github.com/Nightmare-Eclipse/MiniPlasma

https://github.com/0xDimas/MiniPlasma

campuscodi@mastodon.social at 2026-05-16T23:52:23.000Z ##

Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft

github.com/Nightmare-Eclipse/M

##

campuscodi@mastodon.social at 2026-05-16T23:52:23.000Z ##

Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft

github.com/Nightmare-Eclipse/M

##

CVE-2026-46333
(0 None)

EPSS: 0.03%

updated 2026-05-16T13:16:16.810000

16 posts

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointe

4 repos

https://github.com/0xBlackash/CVE-2026-46333

https://github.com/studiogangster/CVE-2026-46333

https://github.com/KaraZajac/CHARON

https://github.com/Aurillium/public-passwd

jon@domum.social at 2026-05-17T18:22:10.000Z ##

#Ubuntu still doesn't have a patch or even a security notice for #sshkeysignpwn ...

How is this everyone else has been patched for days!

#Debian had a fix Friday morning...#DomumSocial is running on Debian, but in my day job I'm stuck with Ubuntu.

If you're also stuck with Ubuntu there is a mitigation:

`sudo sysctl -w kernel.yama.ptrace_scope=3`

I've tested this against the know exploit code at github.com/0xdeadbeefnetwork/s

This will disable the vulnerable ptrace call until the next reboot

Seeking confirmation of my theory I was able to find:
almalinux.org/blog/2026-05-15-

you can also set "yama.ptrace_scope" to "2" which will only allow root to use ptrace (and will also allow resetting it w/o reboot). The link above has more explanations and directions for setting it persistently across reboot for now.

This will break `strace` and `gdb`!

#Linux #sysadmin #security

##

secdb at 2026-05-17T13:03:45.762Z ##

🚨 CVE-2026-46333 (ssh-keysign-pwn)

In the Linux kernel, the following vulnerability has been resolved:

ptrace: slightly saner 'get_dumpable()' logic

The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.

And almost all users do in fact use it only for the case where the task
has a mm pointer.

But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).

It's not what this flag was designed for, but it is what it is.

The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.

Make it all make a bit more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/


##

sourceware@fosstodon.org at 2026-05-17T11:05:36.000Z ##

To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).

Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.

##

beyondmachines1 at 2026-05-17T08:01:08.315Z ##

Linux Kernel Race Condition 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords

A six-year-old Linux kernel race condition (CVE-2026-46333) allows local attackers to steal SSH private keys and password hashes by hijacking file descriptors during process termination. The flaw affects major distributions including Ubuntu and Debian, and a public exploit is available.

**Apply the latest Linux kernel patches ASAP to all affected systems (Ubuntu 22.04/24.04/26.04, Debian 13, Arch, CentOS 9, Raspberry Pi OS, CloudLinux 8/9/10), and rotate all SSH host keys on systems that allowed shell access to untrusted users. Until patched, restrict local shell access to trusted users only and monitor for suspicious use of pidfd_getfd or SUID binaries like ssh-keysign and chage.**

beyondmachines.net/event_detai

##

alpinelinux@fosstodon.org at 2026-05-16T11:50:43.000Z ##

New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)

- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207

These have been backported all the way down to Alpine Linux 3.16.

Edit: These versions fix ssh-keysign-pwn, not Fragnesia

##

sebastian@abshoff.social at 2026-05-16T05:41:23.000Z ##

Kernel-Updates am Morgen vertreiben Kummer und Sorgen. 😇

security-tracker.debian.org/tr

##

letoams@defcon.social at 2026-05-15T21:51:08.000Z ##

If you are changing sysctl kernel.yama.ptrace_scope because of the ssh-keygen-pwn exploit almalinux.org/blog/2026-05-15- on fedora/rhel, be aware that your sysctl will be competing with /usr/lib/sysctl.d/10-default-yama-scope.conf so better change it in that file.

##

harrysintonen at 2026-05-15T18:57:54.782Z ##

has released kernel update that fixes the CVE-2026-46333 (ssh-keysign-pwn) vulnerability.

Debian stable (trixie) kernel update: lists.debian.org/debian-securi

Debian oldstable (bookworm) kernel update: lists.debian.org/debian-securi

##

lwn@lwn.net at 2026-05-15T13:34:36.000Z ##

Seven new stable kernels with patches for CVE-2026-46333

lwn.net/Articles/1073060/ #LWN #Linux #kernel

##

secdb@infosec.exchange at 2026-05-17T13:03:45.000Z ##

🚨 CVE-2026-46333 (ssh-keysign-pwn)

In the Linux kernel, the following vulnerability has been resolved:

ptrace: slightly saner 'get_dumpable()' logic

The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.

And almost all users do in fact use it only for the case where the task
has a mm pointer.

But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).

It's not what this flag was designed for, but it is what it is.

The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.

Make it all make a bit more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#sshkeysignpwn #cve202646333 #linux #kernel

##

beyondmachines1@infosec.exchange at 2026-05-17T08:01:08.000Z ##

Linux Kernel Race Condition 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords

A six-year-old Linux kernel race condition (CVE-2026-46333) allows local attackers to steal SSH private keys and password hashes by hijacking file descriptors during process termination. The flaw affects major distributions including Ubuntu and Debian, and a public exploit is available.

**Apply the latest Linux kernel patches ASAP to all affected systems (Ubuntu 22.04/24.04/26.04, Debian 13, Arch, CentOS 9, Raspberry Pi OS, CloudLinux 8/9/10), and rotate all SSH host keys on systems that allowed shell access to untrusted users. Until patched, restrict local shell access to trusted users only and monitor for suspicious use of pidfd_getfd or SUID binaries like ssh-keysign and chage.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

alpinelinux@fosstodon.org at 2026-05-16T11:50:43.000Z ##

New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)

- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207

These have been backported all the way down to Alpine Linux 3.16.

Edit: These versions fix ssh-keysign-pwn, not Fragnesia

##

letoams@defcon.social at 2026-05-15T21:51:08.000Z ##

If you are changing sysctl kernel.yama.ptrace_scope because of the ssh-keygen-pwn exploit almalinux.org/blog/2026-05-15- on fedora/rhel, be aware that your sysctl will be competing with /usr/lib/sysctl.d/10-default-yama-scope.conf so better change it in that file.

##

harrysintonen@infosec.exchange at 2026-05-15T18:57:54.000Z ##

#Debian has released kernel update that fixes the CVE-2026-46333 (ssh-keysign-pwn) vulnerability.

Debian stable (trixie) kernel update: lists.debian.org/debian-securi

Debian oldstable (bookworm) kernel update: lists.debian.org/debian-securi

##

lwn@lwn.net at 2026-05-15T13:34:36.000Z ##

Seven new stable kernels with patches for CVE-2026-46333

lwn.net/Articles/1073060/ #LWN #Linux #kernel

##

harrysintonen@infosec.exchange at 2026-05-15T08:27:06.000Z ##

Local file exposure #vulnerability in linux kernels (CVE-2026-46333):

github.com/0xdeadbeefnetwork/s

Apparently this issue was already identified in 2020 but wasn't fixed back then.

Mitigation:
- runtime:
sudo sysctl -w kernel.yama.ptrace_scope=2
- To make the mitigation persistent:
echo "kernel.yama.ptrace_scope=2" | sudo tee /etc/sysctl.d/01-harden-ptrace.conf

WARNING: This mitigation may break existing functionality. Test before deploying.

WARNING 2: While this mitigation does block the currently existing PoC, it may not prevent other attack vectors exploiting this vulnerability.

#infosec #cybersecurity #CVE_2026_46333

##

CVE-2026-8657
(8.2 HIGH)

EPSS: 0.05%

updated 2026-05-16T06:30:40

4 posts

Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or JSON Patch documents, as attacker-controlled property names and path segments are used to traverse and modify objects without restricting access to specia

offseq at 2026-05-17T01:30:26.459Z ##

⚠️ HIGH severity: CVE-2026-8657 in jsondiffpatch <0.7.6 enables remote prototype pollution via patch APIs. Patch status unconfirmed — avoid untrusted input & monitor vendor updates. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-16T13:00:14.000Z ##

🟠 CVE-2026-8657 - High (8.2)

Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or J...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-17T01:30:26.000Z ##

⚠️ HIGH severity: CVE-2026-8657 in jsondiffpatch <0.7.6 enables remote prototype pollution via patch APIs. Patch status unconfirmed — avoid untrusted input & monitor vendor updates. Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #NodeJS #vuln

##

thehackerwire@mastodon.social at 2026-05-16T13:00:14.000Z ##

🟠 CVE-2026-8657 - High (8.2)

Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or J...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27886
(7.5 HIGH)

EPSS: 0.11%

updated 2026-05-16T03:16:47.733000

2 posts

Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use the `where` query parameter on any publicly-accessible content-type with an `updatedBy` (or other admin-relation) field to perform a boolean-oracle attack

thehackerwire@mastodon.social at 2026-05-17T18:59:59.000Z ##

🟠 CVE-2026-27886 - High (7.5)

Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:59:59.000Z ##

🟠 CVE-2026-27886 - High (7.5)

Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45369
(8.3 HIGH)

EPSS: 0.04%

updated 2026-05-16T01:16:17.233000

4 posts

python-utcp is the python implementation of UTCP. Prior to 1.1.3, the _substitute_utcp_args method in cli_communication_protocol.py inserts user-controlled tool_args values directly into shell command strings without any sanitization or escaping. These commands are then executed via /bin/bash -c (Unix) or powershell.exe -Command (Windows), allowing an attacker to inject arbitrary shell commands. T

thehackerwire@mastodon.social at 2026-05-15T14:00:19.000Z ##

🟠 CVE-2026-45370 - High (7.7)

python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T14:00:06.000Z ##

🟠 CVE-2026-45369 - High (8.3)

python-utcp is the python implementation of UTCP. Prior to 1.1.3, the _substitute_utcp_args method in cli_communication_protocol.py inserts user-controlled tool_args values directly into shell command strings without any sanitization or escaping. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T14:00:19.000Z ##

🟠 CVE-2026-45370 - High (7.7)

python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T14:00:06.000Z ##

🟠 CVE-2026-45369 - High (8.3)

python-utcp is the python implementation of UTCP. Prior to 1.1.3, the _substitute_utcp_args method in cli_communication_protocol.py inserts user-controlled tool_args values directly into shell command strings without any sanitization or escaping. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-35194
(8.1 HIGH)

EPSS: 0.05%

updated 2026-05-16T00:32:14

2 posts

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulnerability affects JSON functions (1.15.0+) and LIKE expressions with ESCAPE clauses (1.17.0+). User-controlled strings are interpolated into generated Java

thehackerwire@mastodon.social at 2026-05-17T00:00:02.000Z ##

🟠 CVE-2026-35194 - High (8.1)

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulner...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T00:00:02.000Z ##

🟠 CVE-2026-35194 - High (8.1)

Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulner...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45672
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-15T23:55:55

2 posts

### Summary The `/api/v1/utils/code/execute` endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has set `ENABLE_CODE_EXECUTION=false`. The feature gate is not enforced on the API endpoint — the configuration says "disabled" but code still executes. ### Details The admin configuration correctly shows `ENABLE_CODE_EXECUTION: false`. However, the code ex

1 repos

https://github.com/CryptReaper12/CVE-2026-45672

thehackerwire@mastodon.social at 2026-05-16T15:59:51.000Z ##

🟠 CVE-2026-45672 - High (8.8)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T15:59:51.000Z ##

🟠 CVE-2026-45672 - High (8.8)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45398
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-15T23:55:25

4 posts

# IDOR: Retrieval API Bypasses Knowledge Base Access Controls **Author:** Andrew Orr <aorr@tenable.com> ## Summary `_validate_collection_access()` ([PR #22109](https://github.com/open-webui/open-webui/pull/22109)) checks the `user-memory-*` and `file-*` collection name prefixes but does not check knowledge base collections, which use raw UUIDs as collection names. Any authenticated user who kno

thehackerwire@mastodon.social at 2026-05-16T16:00:00.000Z ##

🟠 CVE-2026-45398 - High (7.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collect...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL at 2026-05-15T16:43:22.555Z ##

Tenable Research Advisories listed these two items yesterday.

- Microsoft Foundry Toolkit for VS Code: Command Injection via Python Interpreter Path Leading to Arbitrary Code Execution tenable.com/security/research/

- CVE-2026-45398 - IDOR: Retrieval API Bypasses Knowledge Base Access Controls tenable.com/security/research/ @tenable

##

thehackerwire@mastodon.social at 2026-05-16T16:00:00.000Z ##

🟠 CVE-2026-45398 - High (7.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collect...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

AAKL@infosec.exchange at 2026-05-15T16:43:22.000Z ##

Tenable Research Advisories listed these two items yesterday.

- Microsoft Foundry Toolkit for VS Code: Command Injection via Python Interpreter Path Leading to Arbitrary Code Execution tenable.com/security/research/ #Linux #macOS #Microsoft #Python

- CVE-2026-45398 - IDOR: Retrieval API Bypasses Knowledge Base Access Controls tenable.com/security/research/ @tenable #infosec #vulnerability #threatresearch

##

CVE-2026-45331
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-15T23:53:50

2 posts

# SSRF Bypass via IPv6/IPv4-mapped IPv6/IPv4-reserved-ranges in `validate_url()` ## Summary `validate_url()` in `backend/open_webui/retrieval/web/utils.py` calls `validators.ipv6(ip, private=True)`, but the `validators` library does NOT implement the `private` keyword for IPv6 — the call raises a `ValidationError` (which is falsy in a boolean context), so every IPv6 address passes the filter. In

thehackerwire@mastodon.social at 2026-05-16T17:00:01.000Z ##

🟠 CVE-2026-45331 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T17:00:01.000Z ##

🟠 CVE-2026-45331 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44552
(8.7 HIGH)

EPSS: 0.03%

updated 2026-05-15T23:52:30

2 posts

# Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Enable Cross-Instance Cache Poisoning ## Affected Component Tool server and terminal server Redis cache: - `backend/open_webui/utils/tools.py` (line 841, tool_servers SET) - `backend/open_webui/utils/tools.py` (line 850, tool_servers GET) - `backend/open_webui/utils/tools.py` (line 976, terminal_servers SET) - `backend/

thehackerwire@mastodon.social at 2026-05-16T17:59:51.000Z ##

🟠 CVE-2026-44552 - High (8.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis da...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T17:59:51.000Z ##

🟠 CVE-2026-44552 - High (8.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis da...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44551
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-15T23:52:14

2 posts

# LDAP Empty Password Authentication Bypass ## Affected Component LDAP authentication endpoint: - `backend/open_webui/routers/auths.py` (lines 468-477, user bind with empty password) - `backend/open_webui/models/auths.py` (lines 58-60, `LdapForm` model) ## Affected Versions Current main branch (commit `6fdd19bf1`) and likely all versions with LDAP authentication support. ## Description The L

thehackerwire@mastodon.social at 2026-05-16T17:00:11.000Z ##

🔴 CVE-2026-44551 - Critical (9.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T17:00:11.000Z ##

🔴 CVE-2026-44551 - Critical (9.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44714
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-15T23:49:54

2 posts

### Summary `ScriptExecution.correctlySpends()` contains two fast-path verification bugs for standard `P2PKH` and native `P2WPKH` spends in `core/src/main/java/org/bitcoinj/script/ScriptExecution.java`. In both branches, bitcoinj verifies an attacker-controlled signature/public-key pair but fails to verify that the public key is the one committed to by the output being spent. As a result, any att

thehackerwire@mastodon.social at 2026-05-15T17:36:40.000Z ##

🟠 CVE-2026-44714 - High (7.5)

The bitcoinj library is a Java implementation of the Bitcoin protocol. Prior to 0.17.1, ScriptExecution.correctlySpends() contains two fast-path verification bugs for standard P2PKH and native P2WPKH spends in core/src/main/java/org/bitcoinj/scrip...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:36:40.000Z ##

🟠 CVE-2026-44714 - High (7.5)

The bitcoinj library is a Java implementation of the Bitcoin protocol. Prior to 0.17.1, ScriptExecution.correctlySpends() contains two fast-path verification bugs for standard P2PKH and native P2WPKH spends in core/src/main/java/org/bitcoinj/scrip...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42155(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-05-15T23:48:44

2 posts

Affected Version: OpenMage LTS ≤ 20.16.0 (confirmed on `20.16.0`) Affected File: `https://github.com/OpenMage/magento-lts/blob/main/app/code/core/Mage/Api/Model/Session.php` – `start()` method ## Summary The XML-RPC / SOAP API session ID is generated using an outdated, time-based construction rather than a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG): ```php The XML-RPC /

offseq at 2026-05-16T03:00:26.714Z ##

🚨 CRITICAL: CVE-2026-42155 in OpenMage magento-lts (<20.18.0). Insecure, time-based session ID generation enables API session hijacking via brute-force attacks. Upgrade to 20.18.0+ ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-16T03:00:26.000Z ##

🚨 CRITICAL: CVE-2026-42155 in OpenMage magento-lts (<20.18.0). Insecure, time-based session ID generation enables API session hijacking via brute-force attacks. Upgrade to 20.18.0+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #Magento #Vuln #APIsecurity

##

CVE-2026-41258
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-15T23:48:39

4 posts

### Impact The `ConceptReferenceRangeUtility.evaluateCriteria()` method in OpenMRS Core evaluates database-stored criteria strings as Apache Velocity templates without any sandbox configuration. The `VelocityEngine` is initialized with only logging properties and no`SecureUberspector`, leaving the default `UberspectImpl` in place, which allows unrestricted Java reflection through template express

offseq at 2026-05-16T07:30:26.862Z ##

🚨 CRITICAL: CVE-2026-41258 impacts OpenMRS Core 2.7.0-2.7.8 & 2.8.0-2.8.5. Privileged users can inject Java via Velocity templates, risking full system compromise. Patch to 2.7.9/2.8.6 now. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-15T17:37:58.000Z ##

🔴 CVE-2026-41258 - Critical (9.1)

OpenMRS is an open source electronic medical record system platform. From 2.7.0 to before 2.7.9 and 2.8.6, the ConceptReferenceRangeUtility.evaluateCriteria() method in OpenMRS Core evaluates database-stored criteria strings as Apache Velocity tem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-16T07:30:26.000Z ##

🚨 CRITICAL: CVE-2026-41258 impacts OpenMRS Core 2.7.0-2.7.8 & 2.8.0-2.8.5. Privileged users can inject Java via Velocity templates, risking full system compromise. Patch to 2.7.9/2.8.6 now. Details: radar.offseq.com/threat/cve-20 #OffSeq #OpenMRS #vuln #healthcare

##

thehackerwire@mastodon.social at 2026-05-15T17:37:58.000Z ##

🔴 CVE-2026-41258 - Critical (9.1)

OpenMRS is an open source electronic medical record system platform. From 2.7.0 to before 2.7.9 and 2.8.6, the ConceptReferenceRangeUtility.evaluateCriteria() method in OpenMRS Core evaluates database-stored criteria strings as Apache Velocity tem...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44671
(7.5 HIGH)

EPSS: 0.25%

updated 2026-05-15T23:47:19

2 posts

## Summary A vulnerability was discovered in Zitadel's LDAP identity provider implementation, which fails to properly escape user-provided usernames before incorporating them into LDAP search filters. This allows unauthenticated attackers to perform LDAP Filter Injection during the login process. ## Impact While this vulnerability does not allow for a full authentication bypass, an attacker can

thehackerwire@mastodon.social at 2026-05-15T13:59:54.000Z ##

🟠 CVE-2026-44671 - High (7.5)

ZITADEL is an open source identity management platform. From 2.71.11 to before 3.4.10 and 4.15.0, a vulnerability was discovered in Zitadel's LDAP identity provider implementation, which fails to properly escape user-provided usernames before inco...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T13:59:54.000Z ##

🟠 CVE-2026-44671 - High (7.5)

ZITADEL is an open source identity management platform. From 2.71.11 to before 3.4.10 and 4.15.0, a vulnerability was discovered in Zitadel's LDAP identity provider implementation, which fails to properly escape user-provided usernames before inco...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45370
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-15T23:47:03

2 posts

## Summary `_prepare_environment()` in `cli_communication_protocol.py` passes a full copy of `os.environ` to every CLI subprocess. When combined with the Command Injection vulnerability (CWE-78) in `_substitute_utcp_args()` tracked as GHSA-33p6-5jxp-p3x4, an attacker can exfiltrate all process-level secrets in a single tool call. ## Vulnerable Code ```python # cli_communication_protocol.py def

thehackerwire@mastodon.social at 2026-05-15T14:00:19.000Z ##

🟠 CVE-2026-45370 - High (7.7)

python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T14:00:19.000Z ##

🟠 CVE-2026-45370 - High (7.7)

python-utcp is the python implementation of UTCP. Prior to 1.1.3, _prepare_environment() in cli_communication_protocol.py passes a full copy of os.environ to every CLI subprocess. When combined with CVE-2026-45369, an attacker can exfiltrate all p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45375
(9.0 None)

EPSS: 0.04%

updated 2026-05-15T23:45:28

2 posts

### Summary SiYuan's Bazaar (community marketplace) renders the `name` and `version` fields of a package's `plugin.json` (and the equivalent `theme.json` / `template.json` / `widget.json` / `icon.json`) into the Settings → Marketplace UI without HTML escaping. The kernel-side helper `sanitizePackageDisplayStrings` in `kernel/bazaar/package.go` HTML-escapes only `Author`, `DisplayName`, and `Descr

thehackerwire@mastodon.social at 2026-05-17T17:00:29.000Z ##

🔴 CVE-2026-45375 - Critical (9)

SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / ic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T17:00:29.000Z ##

🔴 CVE-2026-45375 - Critical (9)

SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / ic...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44523
(10.0 CRITICAL)

EPSS: 0.01%

updated 2026-05-15T23:45:08

2 posts

#### Summary No minimum length or entropy is enforced on the `JWT_SECRET` configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as short as 1 byte. HS256 secrets below 32 bytes are brute-forceable offline, allowing attackers to recover the signing key and forge valid JWTs for arbitrary users. --- #### Impact An attacker who captures a s

thehackerwire@mastodon.social at 2026-05-17T18:00:46.000Z ##

🔴 CVE-2026-44523 - Critical (10)

Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as shor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:00:46.000Z ##

🔴 CVE-2026-44523 - Critical (10)

Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as shor...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45402
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-15T23:16:21.470000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge, knowledge-base contents) without verifying that the caller owns or has been granted access to the file. The file's content then becomes reachable throu

thehackerwire@mastodon.social at 2026-05-16T15:00:12.000Z ##

🟠 CVE-2026-45402 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T15:00:12.000Z ##

🟠 CVE-2026-45402 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45010
(9.1 CRITICAL)

EPSS: 0.12%

updated 2026-05-15T23:16:20.927000

4 posts

phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers can brute-force any user's six-digit TOTP code by submitting POST requests with sequential token values, bypassing two-factor authentication to gain full

thehackerwire@mastodon.social at 2026-05-16T21:01:27.000Z ##

🔴 CVE-2026-45010 - Critical (9.1)

phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-16T01:30:24.815Z ##

🚨 CVE-2026-45010 (CRITICAL): phpMyFAQ <4.1.2 lets unauthenticated attackers brute-force TOTP codes at /admin/check — no rate limiting or session binding. Full admin access risk. Restrict endpoint & monitor now! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-16T21:01:27.000Z ##

🔴 CVE-2026-45010 - Critical (9.1)

phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-16T01:30:24.000Z ##

🚨 CVE-2026-45010 (CRITICAL): phpMyFAQ <4.1.2 lets unauthenticated attackers brute-force TOTP codes at /admin/check — no rate limiting or session binding. Full admin access risk. Restrict endpoint & monitor now! radar.offseq.com/threat/cve-20 #OffSeq #infosec #phpMyFAQ #CVE

##

CVE-2026-45671
(8.0 HIGH)

EPSS: 0.04%

updated 2026-05-15T22:16:56.327000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is referenced in any shared chat. The has_access_to_file() authorization gate unconditionally grants access through its shared-chat branch. It checks neither the

thehackerwire@mastodon.social at 2026-05-16T16:00:11.000Z ##

🟠 CVE-2026-45671 - High (8)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is refer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T16:00:11.000Z ##

🟠 CVE-2026-45671 - High (8)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is refer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45665
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-15T22:16:55.920000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically, DOMPurify is executed before the marked library). This vulnerability allows a compromised or malicious administrator to plant a malicious payload in th

thehackerwire@mastodon.social at 2026-05-16T13:00:24.000Z ##

🟠 CVE-2026-45665 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:00:24.000Z ##

🟠 CVE-2026-45665 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45400
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-15T22:16:55.820000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in 0.9.5.

thehackerwire@mastodon.social at 2026-05-16T14:59:51.000Z ##

🟠 CVE-2026-45400 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T14:59:51.000Z ##

🟠 CVE-2026-45400 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45303
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-15T22:16:53.977000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML content of a current chat. The content is embedded in an iFrame with the allow-scripts allow-forms allow-same-origin sandbox directive. This means that the con

thehackerwire@mastodon.social at 2026-05-16T14:00:48.000Z ##

🟠 CVE-2026-45303 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML conten...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T14:00:48.000Z ##

🟠 CVE-2026-45303 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML conten...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45301
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-15T22:16:53.837000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file uploaded by every user to the platform. This vulnerability is fixed in 0.3.16.

thehackerwire@mastodon.social at 2026-05-16T13:01:07.000Z ##

🟠 CVE-2026-45301 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:01:07.000Z ##

🟠 CVE-2026-45301 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44826
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-15T22:16:53.610000

2 posts

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is accepted by the server and treated as a normal positive line-item, but with the sign carried through into every downstream computation: line total, sub-tota

thehackerwire@mastodon.social at 2026-05-16T23:59:52.000Z ##

🟠 CVE-2026-44826 - High (7.5)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is acc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T23:59:52.000Z ##

🟠 CVE-2026-44826 - High (7.5)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is acc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46366
(7.5 HIGH)

EPSS: 0.06%

updated 2026-05-15T21:31:45

2 posts

phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solution_id_{id}.html endpoint. Attackers can sequentially iterate solution IDs to discover all FAQs including those restricted to specific users or groups, l

thehackerwire@mastodon.social at 2026-05-16T21:01:18.000Z ##

🟠 CVE-2026-46366 - High (7.5)

phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T21:01:18.000Z ##

🟠 CVE-2026-46366 - High (7.5)

phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46367
(7.6 HIGH)

EPSS: 0.01%

updated 2026-05-15T21:31:45

2 posts

phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event handlers, stealing admin session cookies and achieving full application takeover when visitors view affected FAQ pages.

thehackerwire@mastodon.social at 2026-05-16T19:00:10.000Z ##

🟠 CVE-2026-46367 - High (7.6)

phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event han...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T19:00:10.000Z ##

🟠 CVE-2026-46367 - High (7.6)

phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event han...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46364
(9.8 CRITICAL)

EPSS: 0.05%

updated 2026-05-15T21:31:44

4 posts

phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthenticated attackers can exploit the public GET /api/captcha endpoint by crafting malicious User-Agent headers to perform time-based blind SQL injection, ext

thehackerwire@mastodon.social at 2026-05-16T21:01:08.000Z ##

🔴 CVE-2026-46364 - Critical (9.8)

phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-16T00:00:36.687Z ##

🚨 CRITICAL: CVE-2026-46364 in phpMyFAQ <4.1.2 allows unauthenticated SQL injection via /api/captcha. Attackers can exfiltrate user creds, admin tokens, and SMTP info. Restrict endpoint & use WAF until patch is confirmed. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-16T21:01:08.000Z ##

🔴 CVE-2026-46364 - Critical (9.8)

phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthent...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-16T00:00:36.000Z ##

🚨 CRITICAL: CVE-2026-46364 in phpMyFAQ <4.1.2 allows unauthenticated SQL injection via /api/captcha. Attackers can exfiltrate user creds, admin tokens, and SMTP info. Restrict endpoint & use WAF until patch is confirmed. radar.offseq.com/threat/cve-20 #OffSeq #SQLInjection #Infosec

##

CVE-2026-46359
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-15T21:31:42

2 posts

phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metacharacters in display names or JWT claims can break out of string literals and execute arbitrary database queries.

thehackerwire@mastodon.social at 2026-05-16T20:00:17.000Z ##

🟠 CVE-2026-46359 - High (7.5)

phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T20:00:17.000Z ##

🟠 CVE-2026-46359 - High (7.5)

phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metac...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8696
(7.5 HIGH)

EPSS: 0.23%

updated 2026-05-15T21:16:39.360000

2 posts

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread information responses. Attackers can trigger the vulnerability by causing qsThreadInfo to fail after qfThreadInfo successfully allocates RDebugPid structures, res

thehackerwire@mastodon.social at 2026-05-16T14:01:07.000Z ##

🟠 CVE-2026-8696 - High (7.5)

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread informati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T14:01:07.000Z ##

🟠 CVE-2026-8696 - High (7.5)

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread informati...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8558
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-15T21:16:39.133000

2 posts

Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-17T00:00:13.000Z ##

🟠 CVE-2026-8558 - High (8.8)

Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T00:00:13.000Z ##

🟠 CVE-2026-8558 - High (8.8)

Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45675
(8.1 HIGH)

EPSS: 0.05%

updated 2026-05-15T21:16:38.647000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The regular signup handler (signup_handler in auths.py, line 663) was explicitly patched to prevent this race with the comment "Insert with default role first

thehackerwire@mastodon.social at 2026-05-16T16:59:51.000Z ##

🟠 CVE-2026-45675 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T16:59:51.000Z ##

🟠 CVE-2026-45675 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45401
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-15T21:16:38.140000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The HTTP clients used downstream (sync requests, async aiohttp, langchain's WebBaseLoader) follow HTTP 3xx redirects by default and do not re-validate the r

thehackerwire@mastodon.social at 2026-05-16T15:00:02.000Z ##

🟠 CVE-2026-45401 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T15:00:02.000Z ##

🟠 CVE-2026-45401 - High (8.5)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44555
(7.6 HIGH)

EPSS: 0.04%

updated 2026-05-15T21:16:35.913000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing base model (e.g., "gpt-4-turbo-restricted") that provides the actual inference capability. When a user queries the composed model, the access control pipel

thehackerwire@mastodon.social at 2026-05-16T18:59:51.000Z ##

🟠 CVE-2026-44555 - High (7.6)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T18:59:51.000Z ##

🟠 CVE-2026-44555 - High (7.6)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing ba...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44553
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-15T21:16:35.810000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whose admin role has been revoked retains admin privileges within their existing Socket.IO session for as long as they keep the connection alive (via automat

thehackerwire@mastodon.social at 2026-05-16T18:00:01.000Z ##

🟠 CVE-2026-44553 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T18:00:01.000Z ##

🟠 CVE-2026-44553 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whos...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-46408
(7.6 HIGH)

EPSS: 0.03%

updated 2026-05-15T20:16:49.503000

2 posts

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownership. A logged-in attacker can therefore reuse another user's cart data in their own checkout session. This vulnerability is fixed in 1.0.8.3.

thehackerwire@mastodon.social at 2026-05-16T20:00:06.000Z ##

🟠 CVE-2026-46408 - High (7.6)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T20:00:06.000Z ##

🟠 CVE-2026-46408 - High (7.6)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownershi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44554
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-15T20:16:46.840000

2 posts

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: True). It performs no authorization check on whether the calling user owns or has write access to the target collection. When overwrite=True, save_docs_to

thehackerwire@mastodon.social at 2026-05-16T18:00:10.000Z ##

🟠 CVE-2026-44554 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T18:00:10.000Z ##

🟠 CVE-2026-44554 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: T...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42897
(8.1 HIGH)

EPSS: 12.34%

updated 2026-05-15T19:35:52.963000

33 posts

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

1 repos

https://github.com/atiilla/CVE-2026-42897

thehackerwire@mastodon.social at 2026-05-17T20:00:44.000Z ##

🟠 CVE-2026-42897 - High (8.1)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thecybermind at 2026-05-17T08:16:10.482Z ##

This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.

thecybermind.co/2026/05/17/wee

##

youranonnewsirc@nerdculture.de at 2026-05-17T02:49:16.000Z ##

**Global Briefing: May 17, 2026**

Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.

Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.

Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.

#AnonNews_irc #Cybersecurity #News

##

doener@chaos.social at 2026-05-16T20:10:02.000Z ##

Microsoft Exchange Server Spoofing Vulnerability

msrc.microsoft.com/update-guid

##

youranonnewsirc@nerdculture.de at 2026-05-16T18:57:15.000Z ##

Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).

#Cybersecurity #AnonNews_irc #News

##

guardingpearsoftware@mastodon.social at 2026-05-16T13:29:41.000Z ##

techcommunity.microsoft.com/bl

##

guardingpearsoftware@mastodon.social at 2026-05-16T13:29:41.000Z ##

Microsoft has released mitigations for a high-severity Microsoft Exchange Server vulnerability that is being actively exploited in attacks.

The flaw enables threat actors to execute arbitrary code through a cross-site scripting (XSS) attack targeting Outlook on the web users.

Tracked as CVE-2026-42897, the vulnerability affects Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE).

##

CapTechGroup@mastodon.social at 2026-05-16T12:53:38.000Z ##

CVE-2026-42897 exploits improper HTML sanitization in OWA, allowing JavaScript execution within the email rendering context. The script inherits authentication tokens, accesses the full DOM, and can read emails, harvest...

captechgroup.com/about-us/thre

##

allaboutsecurity@mastodon.social at 2026-05-16T08:38:50.000Z ##

CVE-2026-42897: CISA warnt vor aktiv ausgenutzter XSS-Lücke in Microsoft Exchange Server

all-about-security.de/cve-2026

#cve #microsoft #itsecurity

##

Matchbook3469@mastodon.social at 2026-05-15T23:32:48.000Z ##

🟠 New security advisory:

CVE-2026-42897 affects Microsoft Exchange Server.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #VulnerabilityManagement #CyberSec

##

secdb at 2026-05-15T20:00:14.333Z ##

🚨 [CISA-2026:0515] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-42897 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Cross-Site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Microsoft
- Notes: msrc.microsoft.com/update-guid ; learn.microsoft.com/en-us/exch ; nvd.nist.gov/vuln/detail/CVE-2

##

netsecio@mastodon.social at 2026-05-15T18:58:18.000Z ##

📰 Microsoft Exchange Zero-Day Under Active Attack, Mitigations Deployed Automatically

📢 Microsoft confirms a new Exchange Server zero-day (CVE-2026-42897) is actively exploited! The XSS flaw in OWA affects on-prem servers. Mitigations are being deployed automatically via the EM service. Check your systems! 🛡️ #Exchange #Zeroday

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/mi

##

cisakevtracker@mastodon.social at 2026-05-15T18:00:44.000Z ##

CVE ID: CVE-2026-42897
Vendor: Microsoft
Product: Microsoft
Date Added: 2026-05-15
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

rogeragrimes at 2026-05-15T17:49:54.804Z ##

High critical cross-site scripting (CSS) vuln in Microsoft Exchange Server 2016 being used in the wild

cve.org/CVERecord?id=CVE-2026-

##

AAKL at 2026-05-15T17:33:14.958Z ##

CISA has updated the KEV catalogue.

- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2026-

##

beyondmachines1 at 2026-05-15T17:01:07.011Z ##

Microsoft Warns of Actively Exploited Zero-Day in Exchange Server OWA

Microsoft is warning of an actively exploited spoofing vulnerability (CVE-2026-42897) in on-premises Exchange Server that allows attackers to execute arbitrary JavaScript via Outlook Web Access XSS.

**If you run on-premises Microsoft Exchange Server (2016, 2019, or Subscription Edition), make sure the Exchange Emergency Mitigation Service (EEMS) is enabled so the M2.1.x mitigation for CVE-2026-42897 is active, or run the Exchange on-premises Mitigation Tool manually if your network is air-gapped. Keep the mitigation on even if it breaks OWA Print Calendar or inline images, and check if you can apply the permanent patch once Microsoft releases it.**

beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-05-15T15:40:03.000Z ##

Exchange Server – CVE-2026-42897 : cette faille zero-day est déjà exploitée ! it-connect.fr/exchange-server- #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Exchange

##

AAKL at 2026-05-15T15:17:18.277Z ##

Microsoft posted this new vulnerability yesterday, if you missed it:

Microsoft Exchange Server Spoofing Vulnerability msrc.microsoft.com/update-guid

More:

The Hacker News: On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email thehackernews.com/2026/05/on-p @thehackernews

##

threatcodex at 2026-05-15T13:57:31.292Z ##

Addressing Exchange Server May 2026 vulnerability CVE-2026-42897

techcommunity.microsoft.com/bl

##

thehackerwire@mastodon.social at 2026-05-17T20:00:44.000Z ##

🟠 CVE-2026-42897 - High (8.1)

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thecybermind@infosec.exchange at 2026-05-17T08:16:10.000Z ##

This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.

thecybermind.co/2026/05/17/wee

##

youranonnewsirc@nerdculture.de at 2026-05-17T02:49:16.000Z ##

**Global Briefing: May 17, 2026**

Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.

Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.

Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.

#AnonNews_irc #Cybersecurity #News

##

youranonnewsirc@nerdculture.de at 2026-05-16T18:57:15.000Z ##

Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).

#Cybersecurity #AnonNews_irc #News

##

secdb@infosec.exchange at 2026-05-15T20:00:14.000Z ##

🚨 [CISA-2026:0515] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-42897 (secdb.nttzen.cloud/cve/detail/)
- Name: Microsoft Exchange Server Cross-Site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Microsoft
- Notes: msrc.microsoft.com/update-guid ; learn.microsoft.com/en-us/exch ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260515 #cisa20260515 #cve_2026_42897 #cve202642897

##

cisakevtracker@mastodon.social at 2026-05-15T18:00:44.000Z ##

CVE ID: CVE-2026-42897
Vendor: Microsoft
Product: Microsoft
Date Added: 2026-05-15
CVE URL: nvd.nist.gov/vuln/detail/CVE-2

##

rogeragrimes@infosec.exchange at 2026-05-15T17:49:54.000Z ##

High critical cross-site scripting (CSS) vuln in Microsoft Exchange Server 2016 being used in the wild

cve.org/CVERecord?id=CVE-2026-

##

AAKL@infosec.exchange at 2026-05-15T17:33:14.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2026- #Microsoft #CISA #zeroday #infosec #vulnerability

##

beyondmachines1@infosec.exchange at 2026-05-15T17:01:07.000Z ##

Microsoft Warns of Actively Exploited Zero-Day in Exchange Server OWA

Microsoft is warning of an actively exploited spoofing vulnerability (CVE-2026-42897) in on-premises Exchange Server that allows attackers to execute arbitrary JavaScript via Outlook Web Access XSS.

**If you run on-premises Microsoft Exchange Server (2016, 2019, or Subscription Edition), make sure the Exchange Emergency Mitigation Service (EEMS) is enabled so the M2.1.x mitigation for CVE-2026-42897 is active, or run the Exchange on-premises Mitigation Tool manually if your network is air-gapped. Keep the mitigation on even if it breaks OWA Print Calendar or inline images, and check if you can apply the permanent patch once Microsoft releases it.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

benzogaga33@mamot.fr at 2026-05-15T15:40:03.000Z ##

Exchange Server – CVE-2026-42897 : cette faille zero-day est déjà exploitée ! it-connect.fr/exchange-server- #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Exchange

##

AAKL@infosec.exchange at 2026-05-15T15:17:18.000Z ##

Microsoft posted this new vulnerability yesterday, if you missed it:

Microsoft Exchange Server Spoofing Vulnerability msrc.microsoft.com/update-guid

More:

The Hacker News: On-Prem Microsoft Exchange Server CVE-2026-42897 Exploited via Crafted Email thehackernews.com/2026/05/on-p @thehackernews #Microsoft #infosec #vulnerability #zeroday

##

threatcodex@infosec.exchange at 2026-05-15T13:57:31.000Z ##

Addressing Exchange Server May 2026 vulnerability CVE-2026-42897
#CVE_2026_42897
techcommunity.microsoft.com/bl

##

jbhall56@infosec.exchange at 2026-05-15T12:27:23.000Z ##

Microsoft describes this security flaw (CVE-2026-42897) as a spoofing vulnerability affecting up-to-date Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE) software. bleepingcomputer.com/news/micr

##

cert_fr@social.numerique.gouv.fr at 2026-05-15T12:26:05.000Z ##

⚠️Alerte CERT-FR⚠️

La vulnérabilité CVE-2026-42897 affecte Microsoft Exchange et permet une injection de code indirecte à distance (XSS) ainsi qu'un contournement de la politique de sécurité.

Elle est activement exploitée.

cert.ssi.gouv.fr/alerte/CERTFR

##

CVE-2026-41615
(9.6 CRITICAL)

EPSS: 0.10%

updated 2026-05-15T18:39:39.933000

2 posts

Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.

thehackerwire@mastodon.social at 2026-05-17T20:00:53.000Z ##

🔴 CVE-2026-41615 - Critical (9.6)

Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T20:00:53.000Z ##

🔴 CVE-2026-41615 - Critical (9.6)

Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34253
(8.2 HIGH)

EPSS: 0.07%

updated 2026-05-15T18:31:42

2 posts

A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, leading to a stack buffer underflow that can cause application crashes and potentially allow code execution.

thehackerwire@mastodon.social at 2026-05-15T16:27:43.000Z ##

🟠 CVE-2026-34253 - High (8.2)

A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, lea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T16:27:43.000Z ##

🟠 CVE-2026-34253 - High (8.2)

A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, lea...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8695
(7.5 HIGH)

EPSS: 0.26%

updated 2026-05-15T18:16:26.160000

2 posts

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers can exploit this vulnerability through GDB remote debugging to cause a denial of service or potentially achieve code execution by manipulating thread list

thehackerwire@mastodon.social at 2026-05-15T17:36:22.000Z ##

🟠 CVE-2026-8695 - High (7.5)

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:36:22.000Z ##

🟠 CVE-2026-8695 - High (7.5)

radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44542
(9.1 CRITICAL)

EPSS: 0.64%

updated 2026-05-15T18:09:04.607000

2 posts

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape the intended shared directory. As a result, an unauthenticated attacker possessing a valid public share hash with delete permissions enabled can delete ar

thehackerwire@mastodon.social at 2026-05-17T20:00:35.000Z ##

🔴 CVE-2026-44542 - Critical (9.1)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T20:00:35.000Z ##

🔴 CVE-2026-44542 - Critical (9.1)

FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-23998
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-15T18:08:13.130000

2 posts

Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, this could allow an attacker to impersonate an enrolled Windows device and retrieve sensitive configuration data. Fleet’s Windows MDM management endpoint reli

thehackerwire@mastodon.social at 2026-05-17T19:00:10.000Z ##

🟠 CVE-2026-23998 - High (7.5)

Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T19:00:10.000Z ##

🟠 CVE-2026-23998 - High (7.5)

Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44717
(9.8 CRITICAL)

EPSS: 0.25%

updated 2026-05-15T17:16:48.073000

4 posts

MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulnerability is fixed in 0.1.1.

offseq at 2026-05-16T04:30:28.787Z ##

🛡️ CRITICAL RCE: CVE-2026-44717 impacts 611711Dark mcp_calculate_server <0.1.1. Unsanitized eval() use enables remote code execution. Upgrade to 0.1.1 immediately to mitigate. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-15T17:36:31.000Z ##

🔴 CVE-2026-44717 - Critical (9.8)

MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-16T04:30:28.000Z ##

🛡️ CRITICAL RCE: CVE-2026-44717 impacts 611711Dark mcp_calculate_server <0.1.1. Unsanitized eval() use enables remote code execution. Upgrade to 0.1.1 immediately to mitigate. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE #infosec #security

##

thehackerwire@mastodon.social at 2026-05-15T17:36:31.000Z ##

🔴 CVE-2026-44717 - Critical (9.8)

MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulne...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-38728
(7.5 HIGH)

EPSS: 0.10%

updated 2026-05-15T16:16:14.463000

2 posts

An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to cause a denial of service via the SMTPStream._write, lib/smtp-stream.js components

thehackerwire@mastodon.social at 2026-05-15T16:27:52.000Z ##

🟠 CVE-2026-38728 - High (7.5)

An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to cause a denial of service via the SMTPStream._write, lib/smtp-stream.js components

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T16:27:52.000Z ##

🟠 CVE-2026-38728 - High (7.5)

An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to cause a denial of service via the SMTPStream._write, lib/smtp-stream.js components

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8585
(7.5 HIGH)

EPSS: 0.09%

updated 2026-05-15T15:31:47

2 posts

Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T15:39:02.000Z ##

🟠 CVE-2026-8585 - High (7.5)

Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T15:39:02.000Z ##

🟠 CVE-2026-8585 - High (7.5)

Inappropriate implementation in Media in Google Chrome on iOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8634
(9.1 CRITICAL)

EPSS: 0.12%

updated 2026-05-15T15:16:56.913000

2 posts

Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability that allows attackers with access to a malicious or compromised repository to forward local secrets such as API tokens, cloud credentials, and broker tokens into the remote command environment. Attackers can exploit overly permissive environment variable allowlisting in repo-local Crabbox configuration to serialize se

thehackerwire@mastodon.social at 2026-05-15T15:00:08.000Z ##

🔴 CVE-2026-8634 - Critical (9.1)

Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability that allows attackers with access to a malicious or compromised repository to forward local secrets such as API tokens, cloud credentials, and broker tokens into the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T15:00:08.000Z ##

🔴 CVE-2026-8634 - Critical (9.1)

Crabbox prior to v0.12.0 contains an environment variable exposure vulnerability that allows attackers with access to a malicious or compromised repository to forward local secrets such as API tokens, cloud credentials, and broker tokens into the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44673
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-15T15:16:53.830000

2 posts

libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_string() in src/parser_lyb.c contains an integer overflow that results in a heap buffer overflow when parsing a maliciously crafted LYB binary blob. An attacker who can supply LYB data to any libyang consumer (NETCONF server, sysrepo, etc.) can trigger a crash or potential heap corruption. This vulnerability is fixed in

thehackerwire@mastodon.social at 2026-05-15T14:26:13.000Z ##

🟠 CVE-2026-44673 - High (7.5)

libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_string() in src/parser_lyb.c contains an integer overflow that results in a heap buffer overflow when parsing a maliciously crafted LYB binary blob. An attacker who can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T14:26:13.000Z ##

🟠 CVE-2026-44673 - High (7.5)

libyang is a YANG data modeling language library. Prior to SO 5.2.15, lyb_read_string() in src/parser_lyb.c contains an integer overflow that results in a heap buffer overflow when parsing a maliciously crafted LYB binary blob. An attacker who can...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2652
(8.6 HIGH)

EPSS: 0.09%

updated 2026-05-15T14:56:18.253000

1 posts

A vulnerability in mlflow/mlflow versions 3.9.0 and earlier allows unauthenticated access to certain FastAPI routes when the server is started with authentication enabled (`--app-name basic-auth`) and served via uvicorn (ASGI). The FastAPI permission middleware only enforces authentication on `/gateway/` routes, leaving other routes such as the Job API (`/ajax-api/3.0/jobs/*`) and the OpenTelemetr

thehackerwire@mastodon.social at 2026-05-15T13:10:09.000Z ##

🟠 CVE-2026-2652 - High (8.6)

A vulnerability in mlflow/mlflow versions 3.9.0 and earlier allows unauthenticated access to certain FastAPI routes when the server is started with authentication enabled (`--app-name basic-auth`) and served via uvicorn (ASGI). The FastAPI permiss...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8398
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-05-15T14:56:18.253000

2 posts

A supply chain attack compromised the official installation packages of DAEMON Tools Lite (Windows versions 12.5.0.2421 through 12.5.0.2434), distributed from the legitimate website daemon-tools.cc between approximately April 8, 2026, and May 5, 2026. Attackers gained unauthorized access to the vendor's (AVB Disc Soft) build or distribution infrastructure and trojanized three binaries: DTHelper.ex

thehackerwire@mastodon.social at 2026-05-15T12:51:05.000Z ##

🔴 CVE-2026-8398 - Critical (9.8)

A supply chain attack compromised the official installation packages of DAEMON Tools Lite (Windows versions 12.5.0.2421 through 12.5.0.2434), distributed from the legitimate website daemon-tools.cc between approximately April 8, 2026, and May 5, 2...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-15T10:30:26.000Z ##

🚨 CRITICAL: CVE-2026-8398 in DAEMON Tools Lite (Windows 12.5.0.2421 – 12.5.0.2434). Installers from April 8 – May 5, 2026, were trojanized with signed malicious code. Avoid affected versions, check vendor updates. Details: radar.offseq.com/threat/cve-20 #OffSeq #SupplyChain #InfoSec

##

CVE-2026-44633
(8.1 HIGH)

EPSS: 0.03%

updated 2026-05-15T14:44:49.877000

2 posts

Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint accepts arbitrary chat object fields, so the user can change the chat hash and status and then access or tamper with the chat through visitor/widget paths. T

thehackerwire@mastodon.social at 2026-05-17T18:00:36.000Z ##

🟠 CVE-2026-44633 - High (8.1)

Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint acce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:00:36.000Z ##

🟠 CVE-2026-44633 - High (8.1)

Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint acce...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44592
(9.4 CRITICAL)

EPSS: 0.02%

updated 2026-05-15T14:44:49.877000

2 posts

Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-registered worker UUID. The resulting session has PeerAuth::Open, i.e. it sees jobs from every organisation, and can immediately NarPush/NarUploaded arbitr

thehackerwire@mastodon.social at 2026-05-17T18:00:26.000Z ##

🔴 CVE-2026-44592 - Critical (9.4)

Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:00:26.000Z ##

🔴 CVE-2026-44592 - Critical (9.4)

Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-re...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44212
(9.3 CRITICAL)

EPSS: 0.06%

updated 2026-05-15T14:30:03.170000

2 posts

PrestaShop is an open source e-commerce web application. Prior to 8.2.6 and 9.1.1, there is a stored Cross-Site Scripting (XSS) vulnerability in the PrestaShop back-office Customer Service view. An unauthenticated attacker can submit the public Contact Us form with a malicious email address. The payload is stored in the database and executed when a back-office employee opens the affected customer

thehackerwire@mastodon.social at 2026-05-15T14:26:23.000Z ##

🔴 CVE-2026-44212 - Critical (9.3)

PrestaShop is an open source e-commerce web application. Prior to 8.2.6 and 9.1.1, there is a stored Cross-Site Scripting (XSS) vulnerability in the PrestaShop back-office Customer Service view. An unauthenticated attacker can submit the public Co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T14:26:23.000Z ##

🔴 CVE-2026-44212 - Critical (9.3)

PrestaShop is an open source e-commerce web application. Prior to 8.2.6 and 9.1.1, there is a stored Cross-Site Scripting (XSS) vulnerability in the PrestaShop back-office Customer Service view. An unauthenticated attacker can submit the public Co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41702
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-15T14:11:57.190000

2 posts

VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during an operation performed by a SETUID binary. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed.

allaboutsecurity@mastodon.social at 2026-05-16T08:56:39.000Z ##

VMware Fusion: Schwachstelle CVE-2026-41702 ermöglicht Root-Eskalation auf macOS

all-about-security.de/vmware-f

#vmware

##

thehackerwire@mastodon.social at 2026-05-15T13:09:49.000Z ##

🟠 CVE-2026-41702 - High (7.8)

VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that occurs during an operation performed by a SETUID binary. A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate pr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0481
(0 None)

EPSS: 0.20%

updated 2026-05-15T14:10:17.083000

1 posts

Unrestricted IP address binding in the AMD Device Metrics Exporter (ROCm ecosystem) could allow a remote attacker to perform unauthorized changes to the GPU configuration, potentially resulting in loss of availability

offseq@infosec.exchange at 2026-05-15T04:30:27.000Z ##

⚠️ CRITICAL: CVE-2026-0481 in AMD Instinct™ MI210 (ROCm). Unrestricted IP binding allows remote attackers to modify GPU configs — could cause availability loss. Awaiting mitigation. Details: radar.offseq.com/threat/cve-20 #OffSeq #AMD #Vuln #ROCm #GPUsecurity

##

CVE-2026-4094
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-15T14:09:15.910000

2 posts

The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the 'admin_head' function in all versions up to, and including, 1.4.5. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete the entire multi-currency configuration by visiting any wp-admin page w

thehackerwire@mastodon.social at 2026-05-15T13:06:07.000Z ##

🟠 CVE-2026-4094 - High (8.1)

The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the 'admin_head' function in all versions up to, and including, 1.4.5. This makes it possi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-15T07:30:26.000Z ##

🚨 HIGH severity: FOX – Currency Switcher Professional for WooCommerce ≤1.4.5 has a missing auth check (CVE-2026-4094). Authenticated users can wipe multi-currency configs; CSRF risk too! Restrict wp-admin, block 'woocs_reset'. More: radar.offseq.com/threat/cve-20 #OffSeq #WooCommerce #infosec

##

CVE-2026-6228
(8.8 HIGH)

EPSS: 0.11%

updated 2026-05-15T14:09:15.910000

1 posts

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 3.28.36. This is due to insufficient authorization checks in the role field update mechanism combined with overly permissive capabilities for the admin_form post type. The admin_form custom post type uses 'capability_type' => 'page', which grants editors the ability to create

thehackerwire@mastodon.social at 2026-05-15T13:05:47.000Z ##

🟠 CVE-2026-6228 - High (8.8)

The Frontend Admin by DynamiApps plugin for WordPress is vulnerable to Privilege Escalation in versions up to and including 3.28.36. This is due to insufficient authorization checks in the role field update mechanism combined with overly permissiv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41964
(8.4 HIGH)

EPSS: 0.01%

updated 2026-05-15T12:30:37

1 posts

Permission control vulnerability in the web. Impact: Successful exploitation of this vulnerability may affect availability.

thehackerwire@mastodon.social at 2026-05-15T12:50:56.000Z ##

🟠 CVE-2026-41964 - High (8.4)

Permission control vulnerability in the web. Impact: Successful exploitation of this vulnerability may affect availability.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6403
(7.5 HIGH)

EPSS: 0.27%

updated 2026-05-15T09:31:43

1 posts

The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trig

thehackerwire@mastodon.social at 2026-05-15T13:05:57.000Z ##

🟠 CVE-2026-6403 - High (7.5)

The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5229
(9.8 CRITICAL)

EPSS: 0.35%

updated 2026-05-15T09:31:43

2 posts

The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.1.10. This is due to the plugin trusting user-controlled cookie data to determine which WordPress account to authenticate after a LINE OAuth login. When LINE doesn't provide an email address (which is common), the plugin falls back to reading the 'form_notify_line_email' cookie value witho

thehackerwire@mastodon.social at 2026-05-15T12:51:14.000Z ##

🔴 CVE-2026-5229 - Critical (9.8)

The Form Notify plugin for WordPress is vulnerable to Authentication Bypass in versions up to and including 1.1.10. This is due to the plugin trusting user-controlled cookie data to determine which WordPress account to authenticate after a LINE OA...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-15T09:00:28.000Z ##

🚨 CRITICAL: Form Notify for WordPress (≤1.1.10) lets attackers bypass auth via malicious cookies in LINE OAuth — any account, even admin, at risk. CVE-2026-5229. Update or disable now! radar.offseq.com/threat/cve-20 #OffSeq #WordPress #CVE20265229 #Infosec

##

CVE-2026-28761
(8.1 HIGH)

EPSS: 0.02%

updated 2026-05-15T06:30:40

2 posts

Cross-site request forgery vulnerability exists in Musetheque V4 Information Disclosure for IPKNOWLEDGE V4L1 rev2203.0 and earlier. If a user views a malicious page while logged-in to the affected product, unexpected operations may be done.

thehackerwire@mastodon.social at 2026-05-15T13:09:59.000Z ##

🟠 CVE-2026-28761 - High (8.1)

Cross-site request forgery vulnerability exists in Musetheque V4 Information Disclosure for IPKNOWLEDGE V4L1 rev2203.0 and earlier. If a user views a malicious page while logged-in to the affected product, unexpected operations may be done.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-15T06:00:28.000Z ##

⚠️ HIGH severity: CVE-2026-28761 impacts Fujitsu Musetheque V4 for IPKNOWLEDGE (≤V4L1 rev2203.0). CSRF flaw allows unwanted actions if logged-in users visit malicious pages. Patch status unknown. radar.offseq.com/threat/cve-20 #OffSeq #CSRF #Fujitsu #Vuln

##

CVE-2026-8526
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:37

2 posts

Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:34.000Z ##

🟠 CVE-2026-8526 - High (8.8)

Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:37:34.000Z ##

🟠 CVE-2026-8526 - High (8.8)

Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8575
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:37

2 posts

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T17:00:04.000Z ##

🟠 CVE-2026-8575 - High (8.3)

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:00:04.000Z ##

🟠 CVE-2026-8575 - High (8.3)

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8573
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:37

2 posts

Integer overflow in Codecs in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T16:00:17.000Z ##

🟠 CVE-2026-8573 - High (8.3)

Integer overflow in Codecs in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T16:00:17.000Z ##

🟠 CVE-2026-8573 - High (8.3)

Integer overflow in Codecs in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8569
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:37

2 posts

Out of bounds write in Codecs in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T15:59:57.000Z ##

🟠 CVE-2026-8569 - High (8.3)

Out of bounds write in Codecs in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T15:59:57.000Z ##

🟠 CVE-2026-8569 - High (8.3)

Out of bounds write in Codecs in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted video file. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8513
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T10:00:15.000Z ##

🟠 CVE-2026-8513 - High (8.3)

Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T10:00:15.000Z ##

🟠 CVE-2026-8513 - High (8.3)

Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8510
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T09:00:13.000Z ##

🟠 CVE-2026-8510 - High (7.5)

Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T09:00:13.000Z ##

🟠 CVE-2026-8510 - High (7.5)

Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8519
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T07:59:50.000Z ##

🟠 CVE-2026-8519 - High (8.8)

Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T07:59:50.000Z ##

🟠 CVE-2026-8519 - High (8.8)

Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8531
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-15T00:31:36

2 posts

Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-17T01:00:43.000Z ##

🟠 CVE-2026-8531 - High (8.8)

Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T01:00:43.000Z ##

🟠 CVE-2026-8531 - High (8.8)

Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8530
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-17T01:00:34.000Z ##

🟠 CVE-2026-8530 - High (8.3)

Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T01:00:34.000Z ##

🟠 CVE-2026-8530 - High (8.3)

Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8524
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:07.000Z ##

🟠 CVE-2026-8524 - High (8.8)

Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:37:07.000Z ##

🟠 CVE-2026-8524 - High (8.8)

Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8534
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:03:50.000Z ##

🟠 CVE-2026-8534 - High (8.3)

Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity:...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:03:50.000Z ##

🟠 CVE-2026-8534 - High (8.3)

Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity:...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8533
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:03:40.000Z ##

🟠 CVE-2026-8533 - High (8.3)

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:03:40.000Z ##

🟠 CVE-2026-8533 - High (8.3)

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8548
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:31:36

2 posts

Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:39:45.000Z ##

🟠 CVE-2026-8548 - High (8.3)

Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:39:45.000Z ##

🟠 CVE-2026-8548 - High (8.3)

Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8542
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:30:30

2 posts

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:05:17.000Z ##

🟠 CVE-2026-8542 - High (8.3)

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:05:17.000Z ##

🟠 CVE-2026-8542 - High (8.3)

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8515
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-15T00:30:29

2 posts

Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T01:59:53.000Z ##

🟠 CVE-2026-8515 - High (8.3)

Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T01:59:53.000Z ##

🟠 CVE-2026-8515 - High (8.3)

Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8574
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-14T22:16:50.903000

2 posts

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T16:59:54.000Z ##

🟠 CVE-2026-8574 - High (8.3)

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T16:59:54.000Z ##

🟠 CVE-2026-8574 - High (8.3)

Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8571
(8.3 HIGH)

EPSS: 0.09%

updated 2026-05-14T22:16:50.597000

2 posts

Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T16:00:06.000Z ##

🟠 CVE-2026-8571 - High (8.3)

Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security sever...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T16:00:06.000Z ##

🟠 CVE-2026-8571 - High (8.3)

Insufficient policy enforcement in GPU in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security sever...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8527
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T22:16:46.997000

2 posts

Insufficient validation of untrusted input in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:44.000Z ##

🟠 CVE-2026-8527 - High (8.8)

Insufficient validation of untrusted input in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:37:44.000Z ##

🟠 CVE-2026-8527 - High (8.8)

Insufficient validation of untrusted input in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8525
(8.3 HIGH)

EPSS: 0.06%

updated 2026-05-14T22:16:46.700000

2 posts

Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:16.000Z ##

🟠 CVE-2026-8525 - High (8.3)

Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:37:16.000Z ##

🟠 CVE-2026-8525 - High (8.3)

Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8523
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-14T22:16:46.400000

2 posts

Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:36:57.000Z ##

🟠 CVE-2026-8523 - High (8.3)

Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:36:57.000Z ##

🟠 CVE-2026-8523 - High (8.3)

Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8520
(8.3 HIGH)

EPSS: 0.06%

updated 2026-05-14T22:16:46.260000

2 posts

Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T08:00:00.000Z ##

🟠 CVE-2026-8520 - High (8.3)

Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T08:00:00.000Z ##

🟠 CVE-2026-8520 - High (8.3)

Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8514
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-14T22:16:45.703000

2 posts

Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T01:00:54.000Z ##

🟠 CVE-2026-8514 - High (8.3)

Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T01:00:54.000Z ##

🟠 CVE-2026-8514 - High (8.3)

Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8512
(8.3 HIGH)

EPSS: 0.07%

updated 2026-05-14T22:16:45.417000

2 posts

Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T10:00:04.000Z ##

🟠 CVE-2026-8512 - High (8.3)

Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T10:00:04.000Z ##

🟠 CVE-2026-8512 - High (8.3)

Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8581
(8.8 HIGH)

EPSS: 0.13%

updated 2026-05-14T21:30:58

2 posts

Use after free in GPU in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T15:38:52.000Z ##

🟠 CVE-2026-8581 - High (8.8)

Use after free in GPU in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T15:38:52.000Z ##

🟠 CVE-2026-8581 - High (8.8)

Use after free in GPU in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8577
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:58

2 posts

Integer overflow in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T15:00:18.000Z ##

🟠 CVE-2026-8577 - High (8.8)

Integer overflow in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T15:00:18.000Z ##

🟠 CVE-2026-8577 - High (8.8)

Integer overflow in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8629
(8.1 HIGH)

EPSS: 0.02%

updated 2026-05-14T21:30:58

2 posts

Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insufficient access control checks on the /v1/leases/:id/code/ticket, /v1/leases/:id/webvnc/ticket, and /v1/leases/:id/egress/ticket endpoints to obtain bridge

thehackerwire@mastodon.social at 2026-05-15T14:59:58.000Z ##

🟠 CVE-2026-8629 - High (8.1)

Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insuff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T14:59:58.000Z ##

🟠 CVE-2026-8629 - High (8.1)

Crabbox prior to v0.12.0 contains a privilege escalation vulnerability that allows users with shared visibility-only access to obtain Code, WebVNC, and Egress agent tickets by sending POST requests to ticket endpoints. Attackers can exploit insuff...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8587
(8.8 HIGH)

EPSS: 0.02%

updated 2026-05-14T21:30:58

2 posts

Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T14:26:33.000Z ##

🟠 CVE-2026-8587 - High (8.8)

Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T14:26:33.000Z ##

🟠 CVE-2026-8587 - High (8.8)

Use after free in Extensions in Google Chrome on Mac prior to 148.0.7778.168 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8557
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-14T21:30:55

2 posts

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:04:57.000Z ##

🟠 CVE-2026-8557 - High (7.5)

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:04:57.000Z ##

🟠 CVE-2026-8557 - High (7.5)

Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8522
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

2 posts

Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T08:59:51.000Z ##

🟠 CVE-2026-8522 - High (8.8)

Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T08:59:51.000Z ##

🟠 CVE-2026-8522 - High (8.8)

Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8521
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-14T21:30:54

2 posts

Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T08:00:10.000Z ##

🟠 CVE-2026-8521 - High (7.5)

Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T08:00:10.000Z ##

🟠 CVE-2026-8521 - High (7.5)

Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8529
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-14T21:30:54

2 posts

Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted video file. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:37:53.000Z ##

🟠 CVE-2026-8529 - High (8.8)

Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted video file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:37:53.000Z ##

🟠 CVE-2026-8529 - High (8.8)

Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted video file. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8540
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

2 posts

Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T18:04:00.000Z ##

🟠 CVE-2026-8540 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T18:04:00.000Z ##

🟠 CVE-2026-8540 - High (8.8)

Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8532
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

2 posts

Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:40:05.000Z ##

🟠 CVE-2026-8532 - High (8.8)

Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:40:05.000Z ##

🟠 CVE-2026-8532 - High (8.8)

Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8549
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

2 posts

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:39:55.000Z ##

🟠 CVE-2026-8549 - High (8.8)

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:39:55.000Z ##

🟠 CVE-2026-8549 - High (8.8)

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8544
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

2 posts

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:38:08.000Z ##

🟠 CVE-2026-8544 - High (8.8)

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:38:08.000Z ##

🟠 CVE-2026-8544 - High (8.8)

Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8551
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:54

2 posts

Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:05:07.000Z ##

🟠 CVE-2026-8551 - High (8.8)

Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:05:07.000Z ##

🟠 CVE-2026-8551 - High (8.8)

Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8621
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:30:53

2 posts

Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Crabbox-Org headers in requests authenticated with a shared token to bypass authorization checks and access owner/org-scoped lease operations belonging to v

thehackerwire@mastodon.social at 2026-05-17T17:00:39.000Z ##

🟠 CVE-2026-8621 - High (8.8)

Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Cra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T17:00:39.000Z ##

🟠 CVE-2026-8621 - High (8.8)

Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Cra...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8511
(9.6 CRITICAL)

EPSS: 0.07%

updated 2026-05-14T21:30:53

3 posts

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T09:59:54.000Z ##

🔴 CVE-2026-8511 - Critical (9.6)

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T09:59:54.000Z ##

🔴 CVE-2026-8511 - Critical (9.6)

Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-15T03:00:28.000Z ##

⚠️ CRITICAL vuln: CVE-2026-8511 in Google Chrome (pre-148.0.7778.168) — use-after-free in UI may enable remote sandbox escape via crafted HTML. Patch status unclear. Update ASAP once confirmed! radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Infosec #Vuln

##

CVE-2026-8517
(8.8 HIGH)

EPSS: 0.07%

updated 2026-05-14T21:30:53

2 posts

Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T02:00:02.000Z ##

🟠 CVE-2026-8517 - High (8.8)

Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Cri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T02:00:02.000Z ##

🟠 CVE-2026-8517 - High (8.8)

Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Cri...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44586
(8.3 HIGH)

EPSS: 0.05%

updated 2026-05-14T21:22:56.313000

2 posts

SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes stored XSS, and because SiYuan's Electron windows are created with nodeIntegration: true and contextIsolation: false, a successful payload can call Node.j

thehackerwire@mastodon.social at 2026-05-17T18:59:50.000Z ##

🟠 CVE-2026-44586 - High (8.3)

SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T18:59:50.000Z ##

🟠 CVE-2026-44586 - High (8.3)

SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8509
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-14T21:19:23.923000

2 posts

Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T09:00:01.000Z ##

🟠 CVE-2026-8509 - High (8.8)

Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T09:00:01.000Z ##

🟠 CVE-2026-8509 - High (8.8)

Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8518
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:19:23.923000

2 posts

Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

thehackerwire@mastodon.social at 2026-05-17T02:00:11.000Z ##

🟠 CVE-2026-8518 - High (8.8)

Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T02:00:11.000Z ##

🟠 CVE-2026-8518 - High (8.8)

Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8547
(7.5 HIGH)

EPSS: 0.07%

updated 2026-05-14T21:19:23.923000

2 posts

Insufficient policy enforcement in Passwords in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:38:19.000Z ##

🟠 CVE-2026-8547 - High (7.5)

Insufficient policy enforcement in Passwords in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:38:19.000Z ##

🟠 CVE-2026-8547 - High (7.5)

Insufficient policy enforcement in Passwords in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severit...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8555
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-14T21:19:23.923000

2 posts

Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

thehackerwire@mastodon.social at 2026-05-15T17:00:14.000Z ##

🟠 CVE-2026-8555 - High (8.8)

Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T17:00:14.000Z ##

🟠 CVE-2026-8555 - High (8.8)

Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8580
(9.6 CRITICAL)

EPSS: 0.07%

updated 2026-05-14T21:19:23.923000

3 posts

Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

thehackerwire@mastodon.social at 2026-05-15T15:38:43.000Z ##

🔴 CVE-2026-8580 - Critical (9.6)

Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-15T15:38:43.000Z ##

🔴 CVE-2026-8580 - Critical (9.6)

Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-15T01:30:25.000Z ##

CRITICAL: CVE-2026-8580 (CVSS 9.6) — Use after free in Chrome Mojo could enable sandbox escape via HTML. Patch to 148.0.7778.168+ now. No active exploits yet. radar.offseq.com/threat/cve-20 #OffSeq #Chrome #Vuln #PatchTuesday

##

CVE-2026-45338
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-14T20:19:57

2 posts

## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in `_process_picture_url()` in `backend/open_webui/utils/oauth.py` (line ~1338). The function fetches arbitrary URLs from OAuth `picture` claims without applying `validate_url()`, allowing an attacker to force the server to make HTTP requests to internal resources and exfiltrate the full response. ## Vulnerable Code ```python #

thehackerwire@mastodon.social at 2026-05-16T13:00:48.000Z ##

🟠 CVE-2026-45338 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:00:48.000Z ##

🟠 CVE-2026-45338 - High (7.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45315
(8.7 HIGH)

EPSS: 0.02%

updated 2026-05-14T20:18:01

2 posts

## Summary The audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/audio/transcriptions/<uuid>.<ext>. The /cache/{path} route serves these files via FileResponse, which sets Con

thehackerwire@mastodon.social at 2026-05-16T13:00:34.000Z ##

🟠 CVE-2026-45315 - High (8.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:00:34.000Z ##

🟠 CVE-2026-45315 - High (8.7)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42945
(8.1 HIGH)

EPSS: 0.15%

updated 2026-05-14T20:17:05.413000

21 posts

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond it

21 repos

https://github.com/ChamsBouzaiene/ai-vuln-rediscovery-nginx-cve-2026-42945

https://github.com/iammerrida-source/nginx-rift-detect

https://github.com/p3Nt3st3r-sTAr/CVE-2026-42945-POC

https://github.com/rheodev/CVE-2026-42945

https://github.com/DepthFirstDisclosures/Nginx-Rift

https://github.com/cipherspy/CVE-2026-42945-POC

https://github.com/chenqin231/CVE-2026-42945

https://github.com/0xBlackash/CVE-2026-42945

https://github.com/Renison-Gohel/CVE-2026-42945-NGINX-Rift

https://github.com/dinosn/cve-2026-42945-nginx32-lab

https://github.com/friparia/NGINX_RIFT_SCAN_CVE_2026_42945

https://github.com/soksofos/wazuh-nginx-cve-2026-42945-sca-lab

https://github.com/MateusVerass/nGixshell

https://github.com/sibersan/web-server-audit_CVE-2026-42945

https://github.com/tal7aouy/nginx-cve-2026-42945

https://github.com/byezero/nginx-cve-2026-42945-check

https://github.com/forxiucn/nginx-cve-2026-42945-poc

https://github.com/jelasin/CVE-2026-42945

https://github.com/oseasfr/Scanner_CVE_2026-42945

https://github.com/realityone/cve-2026-42945-scan

https://github.com/nanwinata/nginxrift-CVE-2026-42945

cyberveille@mastobot.ping.moi at 2026-05-17T20:43:54.000Z ##

📢 NGINX Rift : RCE critique via un heap overflow vieux de 18 ans (CVE-2026-42945)
📝 ## 🔍 Contexte

Publié le 13 mai 2026 par Zhenpeng (Leo) Lin, chercheur chez DepthFirst AI, cet article prése...
📖 cyberveille : cyberveille.ch/posts/2026-05-1
🌐 source : depthfirst.com/research/nginx-
#CVE_2026_40701 #CVE_2026_42934 #Cyberveille

##

Analyst207@mastodon.social at 2026-05-17T15:14:56.000Z ##

NGINX Flaw CVE-2026-42945 Actively Exploited, Threatens Worker Crashes and RCE

A newly discovered NGINX flaw, CVE-2026-42945, is being actively exploited, posing a significant threat of worker crashes and remote code execution (RCE) through specially crafted HTTP requests. This high-severity vulnerability, with a CVSS score of 9.2, has been lurking in NGINX versions since 2008,…

osintsights.com/nginx-flaw-cve

#Nginx #Cve202642945 #RemoteCodeExecution #HeapBufferOverflow #VulnerabilityExploitation

##

secdb at 2026-05-17T13:10:26.317Z ##

🚨 CVE-2026-42945 (NGINX Rift)

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/


##

youranonnewsirc@nerdculture.de at 2026-05-16T18:49:19.000Z ##

Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.

#Cybersecurity #Geopolitics #TechNews

##

nomaakip@sk.nomaakip.xyz at 2026-05-16T10:43:07.062Z ##

https://nvd.nist.gov/vuln/detail/CVE-2026-42945

##

offseq at 2026-05-16T10:30:26.124Z ##

🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. radar.offseq.com/threat/poc-co

##

Sempf at 2026-05-16T03:11:18.797Z ##

And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??

discourse.ifin.network/t/cve-2

##

fbinin@mastodon.fbin.in at 2026-05-15T17:34:26.000Z ##

@beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: security-tracker.debian.org/tr

##

fbinin@mastodon.fbin.in at 2026-05-15T17:32:48.000Z ##

@securestep9 @beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: security-tracker.debian.org/tr

##

AAKL at 2026-05-15T16:14:02.995Z ##

New.

Picus: NGINX Rift: CVE-2026-42945 Critical Heap Buffer Overflow Vulnerability Explained picussecurity.com/resource/blo

##

Analyst207@mastodon.social at 2026-05-17T15:14:56.000Z ##

NGINX Flaw CVE-2026-42945 Actively Exploited, Threatens Worker Crashes and RCE

A newly discovered NGINX flaw, CVE-2026-42945, is being actively exploited, posing a significant threat of worker crashes and remote code execution (RCE) through specially crafted HTTP requests. This high-severity vulnerability, with a CVSS score of 9.2, has been lurking in NGINX versions since 2008,…

osintsights.com/nginx-flaw-cve

#Nginx #Cve202642945 #RemoteCodeExecution #HeapBufferOverflow #VulnerabilityExploitation

##

secdb@infosec.exchange at 2026-05-17T13:10:26.000Z ##

🚨 CVE-2026-42945 (NGINX Rift)

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

ℹ️ Additional info on ZEN SecDB secdb.nttzen.cloud/cve/detail/

#nttdata #zen #secdb #infosec
#nginxrift #cve202642945 #nginx

##

youranonnewsirc@nerdculture.de at 2026-05-16T18:49:19.000Z ##

Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.

#Cybersecurity #Geopolitics #TechNews

##

offseq@infosec.exchange at 2026-05-16T10:30:26.000Z ##

🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. radar.offseq.com/threat/poc-co #OffSeq #NGINX #Vuln #InfoSec

##

Sempf@infosec.exchange at 2026-05-16T03:11:18.000Z ##

And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??

discourse.ifin.network/t/cve-2

##

fbinin@mastodon.fbin.in at 2026-05-15T17:34:26.000Z ##

@beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: security-tracker.debian.org/tr

##

AAKL@infosec.exchange at 2026-05-15T16:14:02.000Z ##

New.

Picus: NGINX Rift: CVE-2026-42945 Critical Heap Buffer Overflow Vulnerability Explained picussecurity.com/resource/blo #infosec #vulnerability #threatresearch #opensource

##

GossiTheDog@cyberplace.social at 2026-05-15T10:03:29.000Z ##

Regarding CVE-2026-42945 in nginx - no modern (or even old) Linux distribution runs nginx without ASLR.

The way the PoC exploit works is they spawn nginx like this:

> exec setarch x86_64 -R /nginx-src/build/nginx -p /app -c /app/nginx.conf

Setarch -R disables ASLR. I've had a look through Github and I can't find any other software which actually does this for nginx either.

So, cool, sweet technical vuln - it's valid - but the RCE apocalypse ain't coming.

##

bearstech@mamot.fr at 2026-05-15T08:31:19.000Z ##

🚨 Nouvelle faille critique sur NGINX : CVE-2026-42945 (Z)

Une vulnérabilité dans ngx_http_rewrite_module peut provoquer un crash des workers NGINX, voire une exécution de code si l’ASLR est désactivé.

👉 security-tracker.debian.org/tr

##

foudreclair@piaille.fr at 2026-05-15T07:16:02.000Z ##

Une faille vieille de 18 ans dans Nginx, un PoC public, beaucoup de bruit… mais qui est vraiment concerné ?

cryptolab.re/posts/2026/nginx-

#nginx #linux #devops #sysadmin #cybersecurity

##

obivan@infosec.exchange at 2026-05-15T06:47:16.000Z ##

Nginx RCE PoC (CVE-2026-42945) github.com/DepthFirstDisclosur

##

CVE-2026-43284
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-14T18:33:53

3 posts

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when

25 repos

https://github.com/whosfault/CVE-2026-43284

https://github.com/grabesec/XCP_ng_CVE-2026-43284_tester

https://github.com/XRSecCD/202605_dirty_frag

https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag

https://github.com/metalx1993/dirtyfrag-patches

https://github.com/AK777177/Dirty-Frag-Analysis

https://github.com/0xlane/pagecache-guard

https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4

https://github.com/Percivalll/Dirty-Frag-Kubernetes-PoC

https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan

https://github.com/haydenjames/dirty-frag-check

https://github.com/dixyes/dirtypatch

https://github.com/ChernStepanov/DirtyFrag-for-dummies

https://github.com/liamromanis101/DirtyFrag-Detector

https://github.com/scriptzteam/Paranoid-Dirty-Frag-CVE-2026-43284

https://github.com/linnemanlabs/dirtyfrag-arm64

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/ryan2929/CVE-2026-43284-

https://github.com/0xBlackash/CVE-2026-43284

https://github.com/6abc/Copy-Fail-CVE-2026-31431-dirty-frag-CVE-2026-43284

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/suominen/CVE-2026-43284

https://github.com/FrosterDL/CVE-2026-43284

https://github.com/krisiasty/vcheck

https://github.com/xd20111/CVE-2026-43284

ghostwriter@phpc.social at 2026-05-17T11:57:53.000Z ##

#DirtyFrag #vulnerability: Universal Linux LPE

Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.

github.com/V4bel/dirtyfrag

#CVE

##

sourceware@fosstodon.org at 2026-05-17T11:05:36.000Z ##

To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).

Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.

##

PC_Fluesterer@social.tchncs.de at 2026-05-17T06:57:38.000Z ##

Ist die Aufregung um die neuen Linux-Fehler berechtigt?

Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:

CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").

Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).

Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen

##

CVE-2026-20182
(10.0 CRITICAL)

EPSS: 31.70%

updated 2026-05-14T18:33:03

16 posts

May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.&nbsp; A vulnerability in the peering authentica

1 repos

https://github.com/fangbarristerbar/CVE-2026-20182-POC

thecybermind at 2026-05-17T08:16:10.482Z ##

This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.

thecybermind.co/2026/05/17/wee

##

oversecurity@mastodon.social at 2026-05-16T14:53:21.000Z ##

Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks

Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-...

🔗️ [Bleepingcomputer] link.is.it/iXcd6x

##

youranonnewsirc@nerdculture.de at 2026-05-16T07:27:16.000Z ##

Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):

Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.

Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.

Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.

#AnonNews_irc #Cybersecurity #News

##

Analyst207@mastodon.social at 2026-05-15T23:36:55.000Z ##

Cisco SD-WAN Zero-Day Exploited for Admin Access

A critical zero-day vulnerability, CVE-2026-20182, has been exploited in Cisco SD-WAN, allowing hackers to gain unrestricted administrative control with a severity score of 10 on the CVSS scale. This flaw enables unauthenticated attackers to manipulate network configurations and take control of Cisco Catalyst SD-WAN Controller with ease.

osintsights.com/cisco-sd-wan-z

#Cisco #Sdwan #ZeroDay #Cve202620182 #Vdaemon

##

Analyst207@mastodon.social at 2026-05-15T22:38:19.000Z ##

Cisco Zero-Day Exploited in Ongoing Attacks by Persistent Threat Group

A newly discovered Cisco zero-day vulnerability, CVE-2026-20182, is being exploited in ongoing attacks, allowing threat actors to gain the highest administrative access to a network controller, essentially handing them a master key to wreak havoc. This max-severity flaw has sparked a race against time for Cisco customers and national cyber…

osintsights.com/cisco-zero-day

#ZeroDay #Cisco #Cve202620182 #AuthenticationBypass #Sdwan

##

netsecio@mastodon.social at 2026-05-15T18:58:15.000Z ##

📰 Cisco Scrambles to Patch Critical 10.0 CVSS Zero-Day in SD-WAN Under Active Attack

🚨 CRITICAL ZERO-DAY: Cisco warns of active exploitation of a 10.0 CVSS auth bypass flaw (CVE-2026-20182) in Catalyst SD-WAN. Attackers can gain full admin access. CISA has issued a directive to patch immediately! ⚠️ #CyberSecurity #ZeroDay #Cisco

🌐 cyber[.]netsecops[.]io

🔗 cyber.netsecops.io/articles/ci

##

AAKL at 2026-05-15T16:38:43.518Z ##

Interesting. This was posted yesterday.

Tenable: Frequently asked questions about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182) tenable.com/blog/faq-about-the @tenable

##

AAKL at 2026-05-15T15:47:59.924Z ##

The Record: CISA orders all federal agencies to patch exploited bug in Cisco SD-WAN systems by Sunday therecord.media/cisa-orders-al @therecord_media @jgreig

CISA, posted yesterday: CVE-2026-20182
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability cve.org/CVERecord?id=CVE-2026-

##

thecybermind@infosec.exchange at 2026-05-17T08:16:10.000Z ##

This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.

thecybermind.co/2026/05/17/wee

##

oversecurity@mastodon.social at 2026-05-16T14:53:21.000Z ##

Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks

Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-...

🔗️ [Bleepingcomputer] link.is.it/iXcd6x

##

youranonnewsirc@nerdculture.de at 2026-05-16T07:27:16.000Z ##

Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):

Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.

Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.

Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.

#AnonNews_irc #Cybersecurity #News

##

AAKL@infosec.exchange at 2026-05-15T16:38:43.000Z ##

Interesting. This was posted yesterday.

Tenable: Frequently asked questions about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182) tenable.com/blog/faq-about-the @tenable #infosec #Cisco #vulnerability

##

AAKL@infosec.exchange at 2026-05-15T15:47:59.000Z ##

The Record: CISA orders all federal agencies to patch exploited bug in Cisco SD-WAN systems by Sunday therecord.media/cisa-orders-al @therecord_media @jgreig

CISA, posted yesterday: CVE-2026-20182
Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability cve.org/CVERecord?id=CVE-2026- #infosec #CISA #Cisco #vulnerability

##

jbhall56@infosec.exchange at 2026-05-15T12:53:43.000Z ##

The zero-day, tracked as CVE-2026-20182, has been exploited in targeted attacks by a sophisticated threat actor identified as UAT-8616. securityweek.com/cisco-patches

##

beyondmachines1@infosec.exchange at 2026-05-15T11:01:07.000Z ##

Cisco Catalyst SD-WAN Controller Authentication Bypass Actively Exploited

Cisco patched a critical authentication bypass (CVE-2026-20182, CVSS 10.0) in Catalyst SD-WAN components that allows remote attackers to gain administrative control and manipulate network fabric configurations. The flaw is being exploited in the wild and follows a similar critical vulnerability used by threat actors since 2023.

**Make sure all Cisco Catalyst SD-WAN Controller and Manager components are isolated publick access and only accessible from expected peer systems and networks, especially UDP port 12346 and TCP port 830. Then do a very qick upgrade to a fixed version and check logs for unauthorized peering, suspicious SSH keys in the vmanage-admin account, and signs of log tampering.**
#cybersecurity #infosec #attack #activeexploit
beyondmachines.net/event_detai

##

hrbrmstr@mastodon.social at 2026-05-15T02:14:18.000Z ##

Why are we even bothering, again, if the "giants" of cyber aren't bothering? rapid7.com/blog/post/ve-cve-20

##

CVE-2026-6473
(8.8 HIGH)

EPSS: 0.06%

updated 2026-05-14T15:32:05

1 posts

Integer wraparound in multiple PostgreSQL server features allows an unprivileged database user to cause the server to undersize an allocation and write out-of-bounds. This may execute arbitrary code as the operating system user running the database. In applications that pass gigabyte-scale user inputs to the relevant database functions, the application input provider may achieve a segmentation f

mastokukei@social.josko.org at 2026-05-17T18:01:39.000Z ##

CVE-2026-6473.
- **AI in Legal and Ethical Contexts**: Debates on AI-generated content, legal definitions of "data," and AI's impact on professions like journalism and academia.
- **Data Centers and Energy Consumption**: Environmental impact, energy demands, and local resource strain from AI data centers.
- **Cybersecurity Vulnerabilities**: Reports on security issues like Microsoft BitLocker backdoor, Grafana Labs source code theft, and Linux kernel vulnerabilities.
- [2/3]

##

CVE-2026-8181
(9.8 CRITICAL)

EPSS: 0.26%

updated 2026-05-14T14:28:41.283000

2 posts

The Burst Statistics – Privacy-Friendly WordPress Analytics (Google Analytics Alternative) plugin for WordPress is vulnerable to Authentication Bypass in versions 3.4.0 to 3.4.1.1. This is due to incorrect return-value handling in the `is_mainwp_authenticated()` function when validating application passwords from the Authorization header. This makes it possible for unauthenticated attackers, with

5 repos

https://github.com/Jenderal92/CVE-2026-8181

https://github.com/zycoder0day/CVE-2026-8181

https://github.com/whattheslime/CVE-2026-8181

https://github.com/murrez/CVE-2026-8181

https://github.com/rootdirective-sec/CVE-2026-8181-Lab

CVE-2026-43660
(7.5 HIGH)

EPSS: 0.12%

updated 2026-05-13T21:33:06

1 posts

A validation issue was addressed with improved logic. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.

CapTechGroup@mastodon.social at 2026-05-16T14:50:57.000Z ##

Apple's May 11th update addressed 84 vulnerabilities spanning iOS, macOS, Safari, tvOS, watchOS, and visionOS. WebKit alone accounts for 13+ CVEs including CVE-2026-28883 and CVE-2026-43660. Kernel-level privilege escalation...

captechgroup.com/about-us/thre

##

CVE-2026-28883
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-13T21:33:04

1 posts

A use-after-free issue was addressed with improved memory management. This issue is fixed in iOS 26.5 and iPadOS 26.5, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. Processing maliciously crafted web content may lead to an unexpected process crash.

CapTechGroup@mastodon.social at 2026-05-16T14:50:57.000Z ##

Apple's May 11th update addressed 84 vulnerabilities spanning iOS, macOS, Safari, tvOS, watchOS, and visionOS. WebKit alone accounts for 13+ CVEs including CVE-2026-28883 and CVE-2026-43660. Kernel-level privilege escalation...

captechgroup.com/about-us/thre

##

CVE-2026-40003
(5.1 MEDIUM)

EPSS: 0.03%

updated 2026-05-13T19:19:26.713000

1 posts

ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory writes via USB. Attackers can exploit the lack of target address validation in the USB download mode to write data to any location in BootROM runtime memory, thereby overwriting the stack, hijacking the execution flow, bypassing the Secure Boot signature verification mechanism, and achieving unauthorized code execution.

1 repos

https://github.com/rva3/CVE-2026-40003

CVE-2026-0265
(0 None)

EPSS: 0.08%

updated 2026-05-13T18:17:47.830000

2 posts

An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure acc

1 repos

https://github.com/tstephens1080/palo-alto-cve-2026-0265-checker

beyondmachines1 at 2026-05-15T18:01:08.315Z ##

Authentication Bypass Flaw in Palo Alto Networks PAN-OS Sparks Severity Dispute

Palo Alto Networks disclosed a high-severity authentication bypass vulnerability (CVE-2026-0265) in PAN-OS affecting firewalls and Panorama appliances using Cloud Authentication Service. The flaw allows unauthenticated attackers to bypass security controls on management interfaces and GlobalProtect portals.

**Make sure all PAN-OS firewall and Panorama management interfaces are isolated from the internet and accessible only from trusted internal networks. If you use Cloud Authentication Service (CAS), upgrade PAN-OS to a fixed version ASAP, or as a temporary fix switch the authentication profile to SAML or RADIUS until you can patch.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-05-15T18:01:08.000Z ##

Authentication Bypass Flaw in Palo Alto Networks PAN-OS Sparks Severity Dispute

Palo Alto Networks disclosed a high-severity authentication bypass vulnerability (CVE-2026-0265) in PAN-OS affecting firewalls and Panorama appliances using Cloud Authentication Service. The flaw allows unauthenticated attackers to bypass security controls on management interfaces and GlobalProtect portals.

**Make sure all PAN-OS firewall and Panorama management interfaces are isolated from the internet and accessible only from trusted internal networks. If you use Cloud Authentication Service (CAS), upgrade PAN-OS to a fixed version ASAP, or as a temporary fix switch the authentication profile to SAML or RADIUS until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-45091
(9.1 CRITICAL)

EPSS: 0.01%

updated 2026-05-13T16:24:39

2 posts

In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every minted unseal token. JWS payload is base64-encoded JSON, NOT encrypted. Any party who could observe a minted token (CI build logs, container env dumps, kubectl describe pod, Sentry/Rollbar stack traces, log aggregators) could decode the payload and ext

1 repos

https://github.com/HORKimhab/CVE-2026-45091

beyondmachines1 at 2026-05-17T11:01:06.991Z ##

Critical TOTP Secret Leak Discovered in sealed-env Enterprise Mode

The sealed-env npm package patched a critical vulnerability (CVE-2026-45091) that leaked plaintext TOTP secrets in unseal tokens, allowing attackers to bypass two-factor authentication.

**If you use the sealed-env npm package (versions 0.1.0-alpha.1 through 0.1.0-alpha.3), upgrade ASAP to 0.1.0-alpha.4 or later, as your TOTP secrets may be exposed in token logs, CI/CD build logs, container dumps, or third-party tools like Sentry. After upgrading you must rotate all TOTP secrets, re-seal any environment files protected by the vulnerable versions since the upgrade is a breaking change. Then review historical logs to purge any captured tokens.**

beyondmachines.net/event_detai

##

beyondmachines1@infosec.exchange at 2026-05-17T11:01:06.000Z ##

Critical TOTP Secret Leak Discovered in sealed-env Enterprise Mode

The sealed-env npm package patched a critical vulnerability (CVE-2026-45091) that leaked plaintext TOTP secrets in unseal tokens, allowing attackers to bypass two-factor authentication.

**If you use the sealed-env npm package (versions 0.1.0-alpha.1 through 0.1.0-alpha.3), upgrade ASAP to 0.1.0-alpha.4 or later, as your TOTP secrets may be exposed in token logs, CI/CD build logs, container dumps, or third-party tools like Sentry. After upgrading you must rotate all TOTP secrets, re-seal any environment files protected by the vulnerable versions since the upgrade is a breaking change. Then review historical logs to purge any captured tokens.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-40361
(8.4 HIGH)

EPSS: 0.06%

updated 2026-05-13T15:34:52.573000

2 posts

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

CVE-2026-4798
(7.5 HIGH)

EPSS: 0.06%

updated 2026-05-13T14:43:46.717000

1 posts

The Avada Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘product_order’ parameter in all versions up to, and including, 3.15.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries t

Analyst207@mastodon.social at 2026-05-15T16:07:27.000Z ##

Avada Builder Flaws Expose WordPress Sites to Credential Theft

A critical vulnerability in the Avada Builder WordPress plugin, used by an estimated one million active installations, leaves sites exposed to credential theft and data breaches. Two flaws, CVE-2026-4782 and CVE-2026-4798, allow attackers to read sensitive files and extract database information, putting your site at risk.

osintsights.com/avada-builder-

#Wordpress #AvadaBuilder #CredentialTheft #ArbitraryFileRead #SqlInjection

##

CVE-2026-28993
(5.5 MEDIUM)

EPSS: 0.01%

updated 2026-05-13T14:07:29.720000

2 posts

This issue was addressed by adding an additional prompt for user consent. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, visionOS 26.5. An app may be able to access user-sensitive data.

agiletortoise@mastodon.social at 2026-05-15T15:03:29.000Z ##

NOTICE: Shortcuts broke its x-callback-url implementation.

Seems to be part of the security fix for CVE-2026-28993 included in iOS 26.5/18.7.9, macOS 26.5/15.7.7/14.8.7. On these OSes, it’s no longer possible to get a result from a Shortcut call via `x-success` callback, you will *always* get an x-error.

In theory, per the CVE, Shortcuts should offer a permissions prompt, not just fail.

Apple Folks: FB22785648

##

agiletortoise@mastodon.social at 2026-05-15T15:03:29.000Z ##

NOTICE: Shortcuts broke its x-callback-url implementation.

Seems to be part of the security fix for CVE-2026-28993 included in iOS 26.5/18.7.9, macOS 26.5/15.7.7/14.8.7. On these OSes, it’s no longer possible to get a result from a Shortcut call via `x-success` callback, you will *always* get an x-error.

In theory, per the CVE, Shortcuts should offer a permissions prompt, not just fail.

Apple Folks: FB22785648

##

CVE-2026-42898
(9.9 CRITICAL)

EPSS: 0.08%

updated 2026-05-12T18:30:54

1 posts

Improper control of generation of code ('code injection') in Microsoft Dynamics 365 (on-premises) allows an authorized attacker to execute code over a network.

jukkan@mstdn.social at 2026-05-15T11:02:20.000Z ##

Oh cool. A 9.9 score on the new critical code injection vulnerability for Microsoft Dynamics 365 on-prem servers. RCE with a scope change.🥳

msrc.microsoft.com/update-guid

#Dynamics365 #PatchTuesday

##

CVE-2026-40369
(7.8 HIGH)

EPSS: 0.02%

updated 2026-05-12T18:30:50

4 posts

Untrusted pointer dereference in Windows Kernel allows an authorized attacker to elevate privileges locally.

1 repos

https://github.com/orinimron123/CVE-2026-40369-EXPLOIT

mastokukei@social.josko.org at 2026-05-17T09:01:43.000Z ##

debates, LLM-generated code in projects, and controversies around AI policies in open-source.
- **Cybersecurity and Vulnerabilities**: Updates on vulnerabilities (e.g., CVE-2026-40369, BitLocker bypass), exploits, and security practices.
- **Linux and Open-Source Software**: Updates on Linux distributions (Debian 13.5, Arch Linux), open-source projects, and discussions about migrating from proprietary systems.
- **Eurovision Song Contest (ESC)**: Live discussions, technical [2/3]

##

mastokukei@social.josko.org at 2026-05-16T18:01:44.000Z ##

energy consumption, and the strain on local resources.
- **Cybersecurity and Vulnerabilities**: Updates on vulnerabilities (e.g., CVE-2026-40369, BitLocker bypass), exploits, and security practices in open-source projects and enterprise systems.
- **Linux and Open-Source Software**: Updates on Linux distributions (e.g., Debian 13.5, Arch Linux), open-source projects, and discussions about migrating from proprietary systems.
- **Tech Industry Shifts**: Reorganizations at [2/3]

##

lobsters@mastodon.social at 2026-05-16T06:20:12.000Z ##

CVE-2026-40369: Arbitrary Kernel Address Increment via NtQuerySystemInformation lobste.rs/s/lwtmzl #security #windows
github.com/orinimron123/CVE-20

##

lobsters@mastodon.social at 2026-05-16T06:20:12.000Z ##

CVE-2026-40369: Arbitrary Kernel Address Increment via NtQuerySystemInformation lobste.rs/s/lwtmzl #security #windows
github.com/orinimron123/CVE-20

##

CVE-2026-8043
(9.6 CRITICAL)

EPSS: 0.09%

updated 2026-05-12T15:31:49

1 posts

External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side attacks.

beyondmachines1@infosec.exchange at 2026-05-15T09:01:07.000Z ##

Critical Path Traversal Vulnerability in Ivanti Xtraction

Ivanti released a critical security update for Xtraction to patch a path traversal vulnerability CVE-2026-8043) that allows authenticated attackers to read sensitive files and write malicious HTML content.

**Patch your Xtraction instances to version 2026.2 immediately and verify that Multi-Factor Authentication is active for all users. Even though this requires authentication, assume attackers can easily find low-level credentials.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-31431
(7.8 HIGH)

EPSS: 2.57%

updated 2026-05-12T15:31:18

1 posts

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just

100 repos

https://github.com/sec17br/CVE-2026-31431-Copy-Fail

https://github.com/darioomatos/cve-2026-31431-copyfail

https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe

https://github.com/badsectorlabs/copyfail-go

https://github.com/professional-slacker/alg_check

https://github.com/desultory/CVE-2026-31431

https://github.com/Koshmare-Blossom/Copyfail-sh

https://github.com/wesmar/CVE-2026-31431

https://github.com/xn0kkx/CVE-2026-31431_CopyFail_LinuxKernel_LPE

https://github.com/Smarttfoxx/copyfail

https://github.com/rvizx/CVE-2026-31431

https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431

https://github.com/qi4L/CVE-2026-31431-Container-Escape

https://github.com/ben-slates/CVE-2026-31431-Exploit

https://github.com/ExploitEoom/CVE-2026-31431

https://github.com/SilverRuler/copy-fail-CVE-2026-31431

https://github.com/XsanFlip/CVE-2026-31431-Patch

https://github.com/adysec/cve-2026-31431

https://github.com/0xShe/CVE-2026-31431

https://github.com/SeanRickerd/cve-2026-31431

https://github.com/xeloxa/copyfail-exploit

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC

https://github.com/malwarekid/CVE-2026-31431

https://github.com/cyber-joker/copy-fail-python

https://github.com/JuanBindez/CVE-2026-31431

https://github.com/Alfredooe/CVE-2026-31431

https://github.com/b5null/CVE-2026-31431-C

https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection

https://github.com/wgnet/wg.copyfail.patch

https://github.com/ZephrFish/CopyFail-CVE-2026-31431

https://github.com/bigwario/copy-fail-CVE-2026-31431-C

https://github.com/Xerxes-2/CVE-2026-31431-rs

https://github.com/sgkdev/page_inject

https://github.com/diemoeve/copyfail-rs

https://github.com/Dabbleam/CVE-2026-31431-mitigation

https://github.com/EynaExp/Copy-Fail-CVE-2026-31431-modernized

https://github.com/abdullaabdullazade/CVE-2026-31431

https://github.com/RoflSecurity/copy_fail

https://github.com/philfry/cve-2026-31431-ftrace

https://github.com/atgreen/block-copyfail

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC

https://github.com/wuwu001/CVE-2026-31431-exploit

https://github.com/cozystack/copy-fail-blocker

https://github.com/Qengineering/RK35xx-CopyFail-Hotfix

https://github.com/tgies/copy-fail-c

https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431

https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431

https://github.com/sudoytang/copyfail-arm64

https://github.com/povzayd/CVE-2026-31431

https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431

https://github.com/ErdemOzgen/copy-fail-cve-2026-31431

https://github.com/mCub3/CVE-2026-31431

https://github.com/suominen/CVE-2026-31431

https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit

https://github.com/Boos4721/copyfail-rs

https://github.com/Huchangzhi/autorootlinux

https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431

https://github.com/bootsareme/copyfail-deconstructed

https://github.com/Dullpurple-sloop726/CVE-2026-31431-Linux-Copy-Fail

https://github.com/ncmprbll/copy-fail-rs

https://github.com/0xBlackash/CVE-2026-31431

https://github.com/rootsecdev/cve_2026_31431

https://github.com/theori-io/copy-fail-CVE-2026-31431

https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite

https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431

https://github.com/lonelyor/CVE-2026-31431-exp

https://github.com/pedromizz/copy-fail

https://github.com/H1d3r/copy-fail_LPE_Interactive

https://github.com/samanzamani/copy-fail-checker

https://github.com/rfxn/copyfail

https://github.com/gagaltotal/cve-2026-31431-copy-fail

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/krisiasty/vcheck

https://github.com/AdityaBhatt3010/CVE-2026-31431

https://github.com/pascal-gujer/CVE-2026-31431

https://github.com/yxdm02/CVE-2026-31431

https://github.com/gbonacini/CVE-2026-31431

https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation

https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag

https://github.com/rippsec/CVE-2026-31431-Copy-Fail

https://github.com/jbnetwork-git/copy-fail-check

https://github.com/toxy4ny/copy-fail-exploit-on-c-redteam

https://github.com/MrAriaNet/cPanel-Fix

https://github.com/mrunalp/block-copyfail

https://github.com/kadir/copy-fail-CVE-2026-31431-IOC

https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit

https://github.com/polyakovavv/copyfail

https://github.com/ctzisme/copyfail-guard

https://github.com/sammwyy/copyfail-rs

https://github.com/wvverez/CVE-2026-31431-Copy-Fail

https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431

https://github.com/AliHzSec/CVE-2026-31431

https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script

https://github.com/MartinPham/copy-fail-CVE-2026-31431-php

https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail

https://github.com/aestechno/cve-2026-31431-ansible

https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE

https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs

https://github.com/Sl4cK0TH/CVE-2026-31431-PoC

jchyip@mastodon.online at 2026-05-15T04:06:19.000Z ##

copy.fail (CVE-2026-31431): a small Linux kernel bug with an unusually big blast radius jorijn.com/en/blog/copy-fail-c

##

CVE-2026-7411
(10.0 CRITICAL)

EPSS: 0.13%

updated 2026-05-11T16:22:43

1 posts

In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequate path normalization in the Submodel HTTP API allows an unauthenticated remote attacker to perform a path traversal attack. By supplying a maliciously crafted fileName parameter during a file upload operation, an attacker can bypass intended storage boundaries and write arbitrary files to any location on the host files

1 repos

https://github.com/CryptReaper12/CVE-2026-7411

sayzard@mastodon.sayzard.org at 2026-05-17T05:38:02.000Z ##

Vulnerability Cve-2026-7411

Eclipse BaSyx Java Server SDK 버전 2.0.0-milestone-10 이전에서 Submodel HTTP API의 부적절한 경로 정규화 취약점(CVE-2026-7411)이 발견되었습니다. 인증되지 않은 원격 공격자가 악의적으로 조작된 fileName 파라미터를 이용해 경로 탐색 공격을 수행, 임의의 파일을 서버 파일 시스템에 쓸 수 있어 원격 코드 실행(RCE) 및 시스템 완전 장악이 가능합니다. 이 취약점은 네트워크 공격 벡터, 낮은 공격 복잡도, 권한 요구 없음으로 CVSS 10점의 치명적 위험도를 가집니다. 해당 SDK를 사용하는 AI 인프라 및 서비스 개발자는 즉시 버전 업데이트 및 보안 패치를 적용해야 합니다.

db.gcve.eu/vuln/cve-2026-7411

#security #cve #pathtraversal #rce #eclipse

##

CVE-2026-44570
(8.3 HIGH)

EPSS: 0.04%

updated 2026-05-11T14:25:50

2 posts

### Summary Authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, restore, and view the contents of other users' memories. ### Details Using a newly created non-admin user with no existing memories, it is possible to view existing memories via `POST /api/v1/memories/query`. See below under the PoC section, where a call to

thehackerwire@mastodon.social at 2026-05-16T13:00:58.000Z ##

🟠 CVE-2026-44570 - High (8.3)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, resto...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T13:00:58.000Z ##

🟠 CVE-2026-44570 - High (8.3)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, resto...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44565
(8.1 HIGH)

EPSS: 0.06%

updated 2026-05-11T14:03:27

2 posts

** CONFIDENTIAL ** Vulnerability Disclosure Analysis Documentation ----------------------------------------------- Vulnerability Details --------------------- 1. Discoverer: Taylor Pennington of KoreLogic, Inc. 2. Date Submitted: June 11, 2024 3. Title: Open WebUI Arbitrary File Write, Delete via Path Traversal 4. High-level Summary: Attacker controlled files can be uploaded to arbitrary lo

thehackerwire@mastodon.social at 2026-05-16T14:00:57.000Z ##

🟠 CVE-2026-44565 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitiz...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T14:00:57.000Z ##

🟠 CVE-2026-44565 - High (8.1)

Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitiz...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7412
(8.6 HIGH)

EPSS: 0.03%

updated 2026-05-06T16:16:12.510000

1 posts

In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, the Operation Delegation feature fails to validate the destination URI of delegated requests. An unauthenticated remote attacker can exploit this design flaw to force the BaSyx server to execute blind HTTP POST requests to arbitrary internal or external targets. This allows an attacker to bypass network segmentation and pivot i

sayzard@mastodon.sayzard.org at 2026-05-17T05:38:11.000Z ##

Vulnerability Cve-2026-7412

Eclipse BaSyx Java Server SDK 버전 2.0.0-milestone-10 이전에서 Operation Delegation 기능이 위임 요청의 대상 URI를 검증하지 않아 인증되지 않은 원격 공격자가 임의의 내부 또는 외부 대상에 대해 블라인드 HTTP POST 요청을 실행할 수 있는 SSRF 취약점(CVE-2026-7412)이 발견되었습니다. 이 취약점은 네트워크 분할을 우회하고 내부 IT/OT 인프라 또는 클라우드 메타데이터 서비스(IMDS)를 공격하는 데 악용될 수 있습니다. CVSS 점수는 8.6으로 높은 심각도를 가집니다.

db.gcve.eu/vuln/cve-2026-7412

#security #ssrf #eclipse #vulnerability #sdk

##

CVE-2026-41940
(9.8 CRITICAL)

EPSS: 78.29%

updated 2026-05-04T18:31:33

1 posts

cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Nuclei template

67 repos

https://github.com/Wesuiliye/CVE-2026-41940

https://github.com/tahaXafous/CVE_2026_41940_scan_exploit

https://github.com/devtint/CVE-2026-41940

https://github.com/mahfuzreham/cpanel-cve-2026-41940

https://github.com/shahidmallaofficial/cpanel-cve-2026-41940-fix

https://github.com/Ap0dexMe0/CVE-2026-41940

https://github.com/habibkaratas/sorry-ransomware-analysis

https://github.com/thekawix/CVE-2026-41940

https://github.com/realawaisakbar/CVE-2026-41940-Exploit-PoC

https://github.com/Kagantua/cPanelWHM-AuthBypass

https://github.com/murrez/CVE-2026-41940

https://github.com/tc4dy/CVE-2026-41940-POC-Exploit

https://github.com/sebinxavi/cve-checker-2026

https://github.com/Underh0st/CPanel-Audit-Remediation-Tool

https://github.com/MrOplus/CVE-2026-41940

https://github.com/AmirrezaMarzban/portscan-CVE-2026-41940

https://github.com/44pie/cpsniper

https://github.com/ynsmroztas/cPanelSniper

https://github.com/senyx122/CVE-2026-41940

https://github.com/kmaruthisrikar/CVE-2026-41940-cPanel-Auth-Bypass-Exploit

https://github.com/linko-iheb/cve-2026-41940-scanner

https://github.com/Andrei-Dr/cpanel-cve-2026-41940-ioc

https://github.com/ngksiva/cpanel-forensics

https://github.com/MrAriaNet/cPanel-Fix

https://github.com/merdw/cPanel-CVE-2026-41940-Scanner

https://github.com/0xF55/cve-2026-41940-exploit

https://github.com/0xabdoulaye/CPANEL-CVE-2026-41940

https://github.com/Christian93111/CVE-2026-41940

https://github.com/imbas007/POC_CVE-2026-41940

https://github.com/Richflexpix/cpanel-pwn

https://github.com/branixsolutions/Security-CVE-2026-41940-cPanel-WHM-WP2

https://github.com/unteikyou/CVE-2026-41940-AuthBypass-Detector

https://github.com/Sachinart/CVE-2026-41940-cpanel-0day

https://github.com/3tternp/CVE-2026-41940---cPanel-WHM-check

https://github.com/nickpaulsec/2026-41940-poc

https://github.com/ZildanZ/CVE-2026-41940

https://github.com/rdyprtmx/poc-cve-2026-41940

https://github.com/assetnote/cpanel2shell-scanner

https://github.com/iSee857/cPanel-WHM-CVE-2026-41940-AuthBypass

https://github.com/Defacto-ridgepole254/CVE-2026-41940-Exploit-PoC

https://github.com/anach-ai/CVE-2026-41940

https://github.com/YudaSamuel/cpanel-vuln-scanner

https://github.com/itsismarcos/CVE-2026-41940

https://github.com/tfawnies/CVE-2026-41940-next

https://github.com/acuciureanu/cpanel2shell-honeypot

https://github.com/SreejaPuthan/cpanel-control-plane-exposure-check

https://github.com/0dev1337/cpanelscanner

https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker

https://github.com/zycoder0day/CVE-2026-41940

https://github.com/Jenderal92/CVE-2026-41940

https://github.com/george1-adel/CVE-2026-41940_exploit

https://github.com/zedxod/CVE-2026-41940-POC

https://github.com/dennisec/CVE-2026-41940

https://github.com/ilmndwntr/CVE-2026-41940-MASS-EXPLOIT

https://github.com/Unfold-Security/CVE-2026-41940-Detection

https://github.com/Ishanoshada/CVE-2026-41940-Exploit-PoC

https://github.com/sercanokur/CVE-2026-41940-cPanel-WHM-Verification-Tool

https://github.com/XsanFlip/poc-cpanel-cve-2026-41940

https://github.com/cy3erm/CVE-2026-41940-POC

https://github.com/Lutfifakee-Project/CVE-2026-41940

https://github.com/OhmGun/whmxploit---CVE-2026-41940

https://github.com/rfxn/cpanel-sessionscribe

https://github.com/vineet7800/cpanel-malware-cleaner-cve-2026

https://github.com/adriyansyah-mf/cve-2026-41940-poc

https://github.com/NULL200OK/cve-2026-41940-tool

https://github.com/bughunt4me/cpanelCVE-2026-41940

https://github.com/0xBlackash/CVE-2026-41940

greenido.dev@greenido.dev at 2026-05-15T14:48:00.000Z ##

Ransomware Risks: Why SMBs Need AI Security Now

Last week I was staring at my EnduraCoach dashboard, watching it yell at me for sneaking in an extra sprint session that my body wasn’t ready for. The AI caught the overtraining pattern across heart-rate, sleep, and power data and shut it down before I wrecked my Ironman build. That same evening the April ransomware numbers landed. SMBs got hammered again. And I thought: if only every founder had an always-on coach like this for their security stack.

Here’s the uncomfortable truth from April 2026: ransomware didn’t slow down—it accelerated. A new player called JanaWare quietly encrypted files for hundreds of Turkish home users and small businesses through targeted phishing campaigns. Low-dollar demands ($200–$400) but high volume. Attackers are learning that SMBs are softer targets and faster payers.

The broader picture is uglier.
Verizon’s 2025 DBIR (still the gold standard) showed 88% of ransomware breaches hit SMBs versus just 39% for enterprises. Unpatched vulnerabilities caused 29% of incidents; stolen credentials another 30%.
Sophos and Black Kite reports confirm SMBs in the $4M–$8M revenue band are now the sweet spot for attackers.

Most of us simply don’t have a 24/7 SOC or the headcount to patch, triage, and remediate at machine speed.

Why your current stack is losing the race

You already know the drill—I wrote about it two weeks ago. You’ve got EDR, a SIEM that spits 800 alerts a day, cloud config tools, backup solutions, and a compliance spreadsheet that lives in Google Docs. Your one-person IT “team” (probably you or your CTO wearing three hats) can’t keep up. Alerts become noise. Drift happens. A single phishing email or unpatched server becomes a full-blown encryption party.

Meanwhile, attackers have upgraded. Remember my Claude Mythos experiment in April? One air-gapped model autonomously built an exploit chain and phoned home. Offensive AI agents are now table stakes for ransomware groups. Defensive point tools can’t match that speed.

The fix we’re actually shipping at Espresso Labs

This is exactly why we built Espresso Labs: one unified AI-powered platform that replaces the dozen disconnected tools and the missing SOC. At the center is Barista—our continuous AI agent that doesn’t just alert. It acts.

Barista watches endpoints, cloud configs, identities, and backups 24/7. It triages, quarantines, remediates, and collects audit-ready evidence in real time. Human experts back it up when needed. For CMMC, SOC 2, or HIPAA it enforces controls continuously instead of chasing checkboxes. Founders tell us it cuts compliance cost and timeline by up to 80% while actually stopping breaches.

Think of it as EnduraCoach for your entire tech stack: always connected, always enforcing the plan, and stepping in before you even notice the problem.

Two real-world SMBs that would still be running if they had Barista

Example 1: A Dental Clinic (12 employees, California)
Late April 2026 the practice got hit via the fresh cPanel vulnerability (CVE-2026-41940). One unpatched server, no continuous scanning, and “Sorry” ransomware encrypted patient records and scheduling systems in under 40 minutes.
Downtime cost them $18k in lost appointments plus a $45k ransom negotiation.
They paid.
Data was partially recovered.

With Espresso Labs this never happens.
Barista’s agents would have auto-detected the cPanel drift during its nightly vuln sweep, patched it automatically, and isolated the server the moment anomalous encryption behavior started.
Immutable backups would have let them restore in minutes with zero ransom paid. The clinic keeps seeing patients instead of calling their MSP in panic.

Example 2: A Marketing Agency (8 employees, remote-first)
A senior designer clicked a sophisticated phishing link dressed as a client creative brief.
Stolen credentials gave attackers initial access. Within hours they deployed ransomware across the shared drive and exfiltrated client campaigns. The agency lost three days of billable work and faced a $32k demand.
Classic stolen-credential playbook—exactly the 30% bucket from the Verizon report.

Barista would have caught and blocked the malware download, and rolled back from the last clean backup automatically. The designer gets a gentle “hey, that link looked sketchy—let’s run a quick training module.” No encryption, no exfil, no headlines.

These aren’t hypotheticals.
These patterns played out in April for dozens of SMBs just like yours.

Your 5-step practitioner playbook (do this this week)

  1. Stop buying another tool. Audit what you actually have running and where data lives. Most SMBs discover they’re paying for 70% overlap.
  2. Demand continuous enforcement. Point-in-time scans are dead. You need agents that watch 24/7 and fix drift instantly.
  3. Test autonomous remediation on one workload. Spin up a low-risk environment (dev server, staging) and let an agent like Barista practice quarantining and restoring.
  4. Layer in phishing simulation + training that actually sticks. Barista does this natively and measures real behavior change.
  5. Get your compliance evidence automated. If you’re chasing CMMC Level 2 or SOC 2 Type 2 this year, manual evidence collection is the fastest way to fail an audit.

Your startup isn’t a marathon—it’s brutal sprints.
Security in 2026 is the same.
One missed sprint and the whole race ends. Continuous AI agents turn defense into a sprint you can actually win.

The tech exists today. We’re running it for our own early customers and it feels exactly like the relief EnduraCoach gives me mid-training: someone (or something) smarter has your back.

If your April numbers looked anything like the industry’s, drop a comment: what’s your biggest security headache right now?
Or head to espressolabs.com and book a 15-minute Barista demo.
No slide deck, no hard sell—just a live look at what continuous actually feels like.

Stay safe out there.
Train hard, ship secure, and let the AI do the heavy lifting.

Rate this:

#cybersecurity #SMB #startups ##

CVE-2026-4289
(7.3 HIGH)

EPSS: 0.04%

updated 2026-04-29T01:00:01.613000

2 posts

A security vulnerability has been detected in Tiandy Easy7 Integrated Management Platform up to 7.17.0. This affects an unknown function of the file /rest/preSetTemplate/getRecByTemplateId. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure bu

1 repos

https://github.com/atiilla/CVE-2026-42897

AAKL at 2026-05-15T17:33:14.958Z ##

CISA has updated the KEV catalogue.

- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2026-

##

AAKL@infosec.exchange at 2026-05-15T17:33:14.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability cve.org/CVERecord?id=CVE-2026- #Microsoft #CISA #zeroday #infosec #vulnerability

##

CVE-2026-40478
(9.0 None)

EPSS: 0.05%

updated 2026-04-24T20:53:27

2 posts

### Impact A security bypass vulnerability exists in the expression execution mechanisms of Thymeleaf up to and including 3.1.3.RELEASE. Although the library provides mechanisms to prevent expression injection, it fails to properly neutralize specific syntax patterns that allow for the execution of unauthorized expressions. If an application developer passes unvalidated user input directly to the

1 repos

https://github.com/bmvermeer/thymeleaf.CVE_2026_40478

foojay@foojay.social at 2026-05-15T15:31:08.000Z ##

The Thymeleaf vulnerability with a CVSS score of 9.1 grabs your attention, as it should. But before you call the cavalry and claim this as the new Log4shell, read this first. CVE-2026-40478 is a server-side template injection vulnerability in Thymeleaf discovered by pentester Dawid Bakaj. Thymeleaf is a templating engine in Java that is used for server-side webpage…...

foojay.io/today/dont-panic-the

##

foojay@foojay.social at 2026-05-15T15:31:08.000Z ##

The Thymeleaf vulnerability with a CVSS score of 9.1 grabs your attention, as it should. But before you call the cavalry and claim this as the new Log4shell, read this first. CVE-2026-40478 is a server-side template injection vulnerability in Thymeleaf discovered by pentester Dawid Bakaj. Thymeleaf is a templating engine in Java that is used for server-side webpage…...

foojay.io/today/dont-panic-the

##

CVE-2026-34197
(8.8 HIGH)

EPSS: 75.81%

updated 2026-04-16T21:49:17

2 posts

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) a

Nuclei template

10 repos

https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197

https://github.com/0xBlackash/CVE-2026-34197

https://github.com/DEVSECURITYSPRO/CVE-2026-34197

https://github.com/dinosn/CVE-2026-34197

https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

https://github.com/Catherines77/ActiveMQ-EXPtools

https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-

https://github.com/rootdirective-sec/CVE-2026-34197-Lab

https://github.com/hg0434hongzh0/CVE-2026-34197

https://github.com/keraattin/CVE-2026-34197

nyanbinary at 2026-05-16T19:52:55.433Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary@infosec.exchange at 2026-05-16T19:52:55.000Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

CVE-2026-32201
(6.5 MEDIUM)

EPSS: 8.71%

updated 2026-04-14T18:30:55

1 posts

Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network.

1 repos

https://github.com/B1tBit/CVE-2026-32201-exploit

PC_Fluesterer@social.tchncs.de at 2026-05-16T09:56:35.000Z ##

Neue Windows Zero-Day Sicherheitslücken

Inzwischen ist der Zoo der neu veröffentlichten Zero-Day Sicherheitslücken in Microsoft (MS) Windows auf 5 Exemplare angewachsen. Ein anonymer Entwickler, der unter den Pseudonymen Nightmare-Eclipse oder Chaotic Eclipse auftritt, hat gerade zwei weitere bis dato unbekannte Sicherheitslücken in Windows publik gemacht. Die nennt er GreenPlasma und YellowKey. Im April hatte er bereits drei andere Lücken veröffentlicht: BlueHammer, RedSun und UnDefend. Von denen hat als einziger BlueHammer eine CVE-Nummer bekommen (CVE-2026-32201) und wurde von MS mit den Updates im April

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #Microsoft #sicherheit #unplugMicrosoft #UnplugTrump #windows #wissen

##

CVE-2026-24154
(7.6 HIGH)

EPSS: 0.03%

updated 2026-04-03T19:04:33.083000

2 posts

NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker with physical access coul inject incorrect command line arguments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, denial of service, data tampering, and information disclosure.

nyanbinary at 2026-05-16T21:10:08.280Z ##

sigh...

github.com/CVEProject/cve-sche - supporting media in CVE descriptions have the optional field base64 which should indicate if the value field is base64 encoded.

Except one CNA (Nvidia) appears to get this consistently wrong...

Example: github.com/CVEProject/cvelistV

##

nyanbinary@infosec.exchange at 2026-05-16T21:10:08.000Z ##

sigh...

github.com/CVEProject/cve-sche - supporting media in CVE descriptions have the optional field base64 which should indicate if the value field is base64 encoded.

Except one CNA (Nvidia) appears to get this consistently wrong...

Example: github.com/CVEProject/cvelistV

##

CVE-2018-4063
(8.8 HIGH)

EPSS: 1.88%

updated 2025-12-15T15:18:49.987000

2 posts

An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability.

nyanbinary at 2026-05-16T19:52:55.433Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary@infosec.exchange at 2026-05-16T19:52:55.000Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

CVE-2023-22518
(9.8 CRITICAL)

EPSS: 94.38%

updated 2025-10-24T13:38:59.063000

2 posts

All versions of Confluence Data Center and Server are affected by this unexploited vulnerability. This Improper Authorization vulnerability allows an unauthenticated attacker to reset Confluence and create a Confluence instance administrator account. Using this account, an attacker can then perform all administrative actions that are available to Confluence instance administrator leading to - but

Nuclei template

9 repos

https://github.com/ductink98lhp/analyze-Exploit-CVE-2023-22518-Confluence

https://github.com/ForceFledgling/CVE-2023-22518

https://github.com/bibo318/CVE-2023-22518

https://github.com/RevoltSecurities/CVE-2023-22518

https://github.com/davidfortytwo/CVE-2023-22518

https://github.com/C1ph3rX13/CVE-2023-22518

https://github.com/0x0d3ad/CVE-2023-22518

https://github.com/Lilly-dox/Exploit-CVE-2023-22518

https://github.com/0x00sector/CVE_2023_22518_Checker

thecybermind at 2026-05-17T18:02:04.244Z ##

CVE‑2023‑22518 is a critical broken authentication flaw in Atlassian Confluence that allows unauthenticated attackers to reset the instance and create a new admin account. Active exploitation confirms the urgency for immediate patching and external access restriction.

thecybermind.co/2026/05/17/cve

##

thecybermind@infosec.exchange at 2026-05-17T18:02:04.000Z ##

CVE‑2023‑22518 is a critical broken authentication flaw in Atlassian Confluence that allows unauthenticated attackers to reset the instance and create a new admin account. Active exploitation confirms the urgency for immediate patching and external access restriction.

thecybermind.co/2026/05/17/cve

##

AAKL at 2026-05-15T16:47:24.661Z ##

New.

VulnCheck: Nine Years and Still Swinging: CVE-2017-9841 Remains One of the Most Actively Targeted Vulnerabilities in Canaries vulncheck.com/blog/cve-2017-98 @vulncheck

##

AAKL@infosec.exchange at 2026-05-15T16:47:24.000Z ##

New.

VulnCheck: Nine Years and Still Swinging: CVE-2017-9841 Remains One of the Most Actively Targeted Vulnerabilities in Canaries vulncheck.com/blog/cve-2017-98 @vulncheck #infosec #vulnerability

##

CVE-2025-6793
(9.4 CRITICAL)

EPSS: 87.03%

updated 2025-07-07T15:30:41

2 posts

Marvell QConvergeConsole QLogicDownloadImpl Directory Traversal Arbitrary File Deletion and Information Disclosure Vulnerability. This vulnerability allows remote attackers to delete arbitrary files and disclose sensitive information on affected installations of Marvell QConvergeConsole. Authentication is not required to exploit this vulnerability. The specific flaw exists within the QLogicDownlo

metasploit at 2026-05-15T19:09:38.474Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

metasploit@infosec.exchange at 2026-05-15T19:09:38.000Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

CVE-2024-48760
(9.8 CRITICAL)

EPSS: 66.58%

updated 2025-01-23T18:32:22

2 posts

An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code via the file upload function. The attacker can upload a malicious perlcmd.cgi file that overwrites the original upload.cgi file, enabling remote command execution.

metasploit at 2026-05-15T19:09:38.474Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

metasploit@infosec.exchange at 2026-05-15T19:09:38.000Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

metasploit at 2026-05-15T19:09:38.474Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

metasploit@infosec.exchange at 2026-05-15T19:09:38.000Z ##

The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?

Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).

As always, check it out the blog: rapid7.com/blog/post/pt-metasp

##

CVE-2024-49767
(7.5 HIGH)

EPSS: 1.09%

updated 2025-01-03T12:15:26.257000

2 posts

Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can

nyanbinary at 2026-05-16T19:52:55.433Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary@infosec.exchange at 2026-05-16T19:52:55.000Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary at 2026-05-16T19:52:55.433Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

nyanbinary@infosec.exchange at 2026-05-16T19:52:55.000Z ##

Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:

##

CVE-2026-43908
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T17:00:20.000Z ##

🟠 CVE-2026-43908 - High (8.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside Conv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T17:00:20.000Z ##

🟠 CVE-2026-43908 - High (8.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside Conv...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43907
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T15:00:45.000Z ##

🟠 CVE-2026-43907 - High (8.3)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp le...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T15:00:45.000Z ##

🟠 CVE-2026-43907 - High (8.3)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp le...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43906
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T15:00:35.000Z ##

🟠 CVE-2026-43906 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a heap-based buffer overflow in the HEIF decoder of OpenImageIO allows out-of-bounds ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T15:00:35.000Z ##

🟠 CVE-2026-43906 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a heap-based buffer overflow in the HEIF decoder of OpenImageIO allows out-of-bounds ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43905
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T15:00:23.000Z ##

🟠 CVE-2026-43905 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T15:00:23.000Z ##

🟠 CVE-2026-43905 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43904
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T14:00:48.000Z ##

🟠 CVE-2026-43904 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T14:00:48.000Z ##

🟠 CVE-2026-43904 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43903
(0 None)

EPSS: 0.01%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T14:00:37.000Z ##

🟠 CVE-2026-43903 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, sgiinput.cpp:265,274 use OIIO_DASSERT for bounds checking in the RLE decode loop. In ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T14:00:37.000Z ##

🟠 CVE-2026-43903 - High (7.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, sgiinput.cpp:265,274 use OIIO_DASSERT for bounds checking in the RLE decode loop. In ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43909
(0 None)

EPSS: 0.04%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-17T14:00:25.000Z ##

🟠 CVE-2026-43909 - High (8.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-17T14:00:25.000Z ##

🟠 CVE-2026-43909 - High (8.8)

OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABy...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

sourceware@fosstodon.org at 2026-05-17T11:05:36.000Z ##

To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).

Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.

##

PC_Fluesterer@social.tchncs.de at 2026-05-17T06:57:38.000Z ##

Ist die Aufregung um die neuen Linux-Fehler berechtigt?

Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:

CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").

Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).

Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher

pc-fluesterer.info/wordpress/2

#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen

##

Grub_09@mastodon.uno at 2026-05-15T18:24:21.000Z ##

Fragnesia: una nuova vulnerabilità di escalation dei privilegi nel kernel Linux

Scoperta una nuova falla di sicurezza nel kernel Linux, chiamata Fragnesia (CVE-2026-46300), che consente a un utente locale non privilegiato di ottenere i privilegi di amministratore (root) su una distribuzione GNU/Linux.

@linux #UnoLinux #gnulinux #linux

#kernellinux #gnulinuxitalia #linuxitalia #fragnesia

#vulnerabilitalinux

laseroffice.it/blog/2026/05/14

##

Grub_09@mastodon.uno at 2026-05-15T18:24:21.000Z ##

Fragnesia: una nuova vulnerabilità di escalation dei privilegi nel kernel Linux

Scoperta una nuova falla di sicurezza nel kernel Linux, chiamata Fragnesia (CVE-2026-46300), che consente a un utente locale non privilegiato di ottenere i privilegi di amministratore (root) su una distribuzione GNU/Linux.

@linux #UnoLinux #gnulinux #linux

#kernellinux #gnulinuxitalia #linuxitalia #fragnesia

#vulnerabilitalinux

laseroffice.it/blog/2026/05/14

##

ruario@vivaldi.net at 2026-05-15T05:51:37.000Z ##

Oh and while we are here, Linux fans, please tell me you have updated your machine for "Fragnesia (CVE-2026-46300)", right… right!?

github.com/v12-security/pocs/t

##

CVE-2026-46407
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-16T19:59:56.000Z ##

🟠 CVE-2026-46407 - High (8.1)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token li...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T19:59:56.000Z ##

🟠 CVE-2026-46407 - High (8.1)

Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token li...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8686
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-16T19:00:00.000Z ##

🟠 CVE-2026-8686 - High (7.5)

Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet.

To remediate this issue, users should upgrade to v5.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-16T19:00:00.000Z ##

🟠 CVE-2026-8686 - High (7.5)

Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet.

To remediate this issue, users should upgrade to v5.0.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44699
(0 None)

EPSS: 0.04%

2 posts

N/A

offseq at 2026-05-16T09:00:28.867Z ##

⚠️ CRITICAL: CVE-2026-44699 in libjwt (3.0.0 – 3.3.2) lets attackers forge JWTs by exploiting HMAC verification with a zero-length key if RSA JWKs lack the alg parameter. Patch to 3.3.3 or confirm vendor remediation! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-16T09:00:28.000Z ##

⚠️ CRITICAL: CVE-2026-44699 in libjwt (3.0.0 – 3.3.2) lets attackers forge JWTs by exploiting HMAC verification with a zero-length key if RSA JWKs lack the alg parameter. Patch to 3.3.3 or confirm vendor remediation! radar.offseq.com/threat/cve-20 #OffSeq #JWT #Infosec

##

CVE-2026-45035
(0 None)

EPSS: 0.05%

2 posts

N/A

offseq at 2026-05-16T06:00:28.451Z ##

🚨 CVE-2026-45035 (CRITICAL, CVSS 9.4): Tabby < 1.0.233 exposes users to RCE via tabby:// links. Any click can run OS commands with user privileges. Patch to 1.0.233+ ASAP! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-16T06:00:28.000Z ##

🚨 CVE-2026-45035 (CRITICAL, CVSS 9.4): Tabby < 1.0.233 exposes users to RCE via tabby:// links. Any click can run OS commands with user privileges. Patch to 1.0.233+ ASAP! radar.offseq.com/threat/cve-20 #OffSeq #RCE #Tabby #Vuln

##

CVE-2026-4782
(0 None)

EPSS: 0.04%

1 posts

N/A

Analyst207@mastodon.social at 2026-05-15T16:07:27.000Z ##

Avada Builder Flaws Expose WordPress Sites to Credential Theft

A critical vulnerability in the Avada Builder WordPress plugin, used by an estimated one million active installations, leaves sites exposed to credential theft and data breaches. Two flaws, CVE-2026-4782 and CVE-2026-4798, allow attackers to read sensitive files and extract database information, putting your site at risk.

osintsights.com/avada-builder-

#Wordpress #AvadaBuilder #CredentialTheft #ArbitraryFileRead #SqlInjection

##

Visit counter For Websites