## Updated at UTC 2026-05-12T23:46:26.668565

Access data as JSON

CVE CVSS EPSS Posts Repos Nuclei Updated Description
CVE-2026-45185 9.8 0.00% 13 1 2026-05-12T21:16:16.807000 Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable u
CVE-2026-35071 8.2 0.00% 2 0 2026-05-12T19:49:35.160000 Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper ne
CVE-2026-41712 7.5 0.03% 4 0 2026-05-12T19:26:04.083000 Spring AI's chat memory component contained a problematic default that, when not
CVE-2026-44277 9.8 0.00% 3 0 2026-05-12T18:57:02.307000 A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, Fo
CVE-2026-28972 6.5 0.02% 2 0 2026-05-12T18:30:37 An out-of-bounds write issue was addressed with improved input validation. This
CVE-2026-44183 9.8 0.00% 2 0 2026-05-12T18:17:29.427000 Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in
CVE-2026-44167 7.5 0.00% 2 0 2026-05-12T18:17:29.273000 phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3
CVE-2026-42899 7.5 0.00% 1 0 2026-05-12T18:17:26.733000 Loop with unreachable exit condition ('infinite loop') in ASP.NET Core allows an
CVE-2026-41096 9.8 0.00% 2 0 2026-05-12T18:17:21.167000 Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attac
CVE-2026-41089 9.8 0.00% 2 0 2026-05-12T18:17:20.720000 Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker
CVE-2026-35433 7.3 0.00% 2 0 2026-05-12T18:17:13.710000 Improper input validation in .NET allows an unauthorized attacker to elevate pri
CVE-2026-32177 7.3 0.00% 2 0 2026-05-12T18:16:58.947000 Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate pr
CVE-2026-32175 4.3 0.00% 1 0 2026-05-12T18:16:58.737000 A tampering vulnerability exists when .NET Core improperly handles specially cra
CVE-2026-6722 9.8 0.29% 2 0 2026-05-12T17:48:21.643000 In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, a
CVE-2026-43992 9.8 0.00% 4 0 2026-05-12T17:16:21.240000 JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-securit
CVE-2026-42860 8.5 0.03% 2 0 2026-05-12T16:50:08.553000 The Open edx Enterprise Service app provides enterprise features to the Open edX
CVE-2026-5084 6.5 0.01% 2 0 2026-05-12T16:48:58.260000 WebDyne::Session versions through 2.075 for Perl generates the session id insecu
CVE-2026-2465 8.8 0.04% 4 0 2026-05-12T16:47:58.570000 Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering
CVE-2026-6001 8.8 0.04% 2 0 2026-05-12T16:47:58.570000 Authorization bypass through User-Controlled key vulnerability in ABIS Technolog
CVE-2026-42609 8.1 0.04% 2 0 2026-05-12T16:16:54.790000 Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a business logic vulne
CVE-2026-42612 8.5 0.03% 2 0 2026-05-12T16:16:40.253000 Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a stored Cross-Site Sc
CVE-2026-43937 8.8 0.00% 2 0 2026-05-12T16:16:18.740000 YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin O
CVE-2026-28986 7.5 0.02% 2 0 2026-05-12T15:32:40 A race condition was addressed with additional validation. This issue is fixed i
CVE-2026-8111 8.8 0.00% 2 0 2026-05-12T15:31:52 SQL injection in the web console of Ivanti Endpoint Manager before version 2024
CVE-2026-8110 7.8 0.00% 4 0 2026-05-12T15:31:49 Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before 
CVE-2026-8043 9.6 0.00% 4 0 2026-05-12T15:31:49 External control of a file name in Ivanti Xtraction before version 2026.2 allows
CVE-2026-7432 7.8 0.00% 2 0 2026-05-12T15:31:48 A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally a
CVE-2026-0300 9.8 6.22% 2 8 2026-05-12T15:31:19 A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Capti
CVE-2026-31431 7.8 4.06% 10 100 2026-05-12T15:31:18 In the Linux kernel, the following vulnerability has been resolved: crypto: alg
CVE-2026-7287 7.5 0.26% 2 0 2026-05-12T15:11:29.503000 ** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep()
CVE-2026-7256 8.8 0.83% 2 0 2026-05-12T15:11:29.503000 ** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI pro
CVE-2026-45091 9.1 0.00% 2 0 2026-05-12T15:09:10 In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embe
CVE-2026-8162 7.5 0.04% 4 0 2026-05-12T15:08:22.857000 multiparty@4.2.3 and lower versions are vulnerable to denial of service via unca
CVE-2026-8159 7.5 0.04% 2 0 2026-05-12T15:08:22.857000 multiparty@4.2.3 and lower versions are vulnerable to denial of service via regu
CVE-2026-45223 8.8 0.08% 2 0 2026-05-12T14:47:42.170000 Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coor
CVE-2026-45006 8.8 0.11% 2 0 2026-05-12T14:20:56.547000 OpenClaw before 2026.4.23 contains an improper access control vulnerability in t
CVE-2026-34263 9.6 0.02% 6 0 2026-05-12T14:19:41.400000 Due to improper Spring Security configuration, SAP Commerce cloud allows an unau
CVE-2026-34260 9.6 0.01% 6 0 2026-05-12T14:19:41.400000 SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerabil
CVE-2026-34259 8.2 0.01% 2 0 2026-05-12T14:19:41.400000 Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment,
CVE-2025-40946 8.3 0.02% 2 0 2026-05-12T14:19:41.400000 A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blu
CVE-2025-40949 9.1 0.17% 2 0 2026-05-12T14:19:41.400000 A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.1
CVE-2025-40947 7.5 0.23% 2 0 2026-05-12T14:19:41.400000 A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.1
CVE-2026-25786 9.1 0.04% 2 0 2026-05-12T14:19:41.400000 Affected devices do not properly validate and sanitize PLC/station name rendered
CVE-2026-27662 7.7 0.03% 2 0 2026-05-12T14:19:41.400000 Affected devices do not properly restrict access to the web browser via the Cont
CVE-2026-44412 7.8 0.01% 2 0 2026-05-12T14:19:41.400000 A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0
CVE-2026-32658 8.0 0.04% 2 0 2026-05-12T14:17:10.613000 Dell Automation Platform versions prior to 2.0.0.0, contains a missing authoriza
CVE-2026-42869 10.0 0.12% 2 0 2026-05-12T14:17:05.463000 SOCFortress CoPilot focuses on providing a single pane of glass for all your sec
CVE-2026-35227 0 0.10% 2 0 2026-05-12T14:15:46.747000 An unauthenticated remote attacker may exhaust all available TCP connections in
CVE-2026-4890 7.5 0.18% 2 0 2026-05-12T14:15:46.747000 A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allo
CVE-2026-43441 7.5 0.05% 2 0 2026-05-12T14:10:27.343000 In the Linux kernel, the following vulnerability has been resolved: net: bondin
CVE-2026-43437 7.8 0.01% 2 0 2026-05-12T14:10:27.343000 In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm:
CVE-2026-43456 7.8 0.01% 2 0 2026-05-12T14:10:27.343000 In the Linux kernel, the following vulnerability has been resolved: bonding: fi
CVE-2026-43466 8.2 0.05% 2 0 2026-05-12T14:10:27.343000 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e:
CVE-2026-43464 7.5 0.06% 2 0 2026-05-12T14:10:27.343000 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e:
CVE-2026-39432 8.2 0.03% 4 0 2026-05-12T14:03:52.757000 Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Inco
CVE-2026-42742 8.5 0.03% 2 0 2026-05-12T14:03:52.757000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-42741 8.5 0.03% 2 0 2026-05-12T14:03:52.757000 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-8072 None 0.03% 2 0 2026-05-12T12:32:23 Insecure generation of credentials in the local SAT (Technical Support) access f
CVE-2026-25787 9.1 0.04% 2 0 2026-05-12T12:32:22 Affected devices do not properly validate and sanitize Technology Object (TO) na
CVE-2026-33893 7.5 0.04% 2 0 2026-05-12T12:32:22 A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.00
CVE-2026-44411 7.8 0.01% 2 0 2026-05-12T12:32:22 A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0
CVE-2026-41551 9.1 0.05% 2 0 2026-05-12T12:32:22 A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected ve
CVE-2026-45214 8.5 0.03% 4 0 2026-05-12T12:32:22 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-45213 7.6 0.03% 4 0 2026-05-12T12:32:22 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-41713 8.2 0.03% 2 0 2026-05-12T12:32:22 A malicious user could craft input that is stored in conversation memory and lat
CVE-2026-45211 8.5 0.03% 2 0 2026-05-12T12:32:22 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2026-45218 7.7 0.03% 2 0 2026-05-12T12:32:22 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti
CVE-2025-40833 7.5 0.04% 2 0 2026-05-12T12:32:21 The affected devices contain a null pointer dereference vulnerability while proc
CVE-2026-22925 7.5 0.04% 2 0 2026-05-12T12:32:21 A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). Th
CVE-2026-22924 9.1 0.04% 2 0 2026-05-12T12:32:14 A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). Th
CVE-2025-6577 9.8 0.03% 2 0 2026-05-12T12:32:14 Improper neutralization of special elements used in an SQL command ('SQL injecti
CVE-2026-2993 7.5 0.10% 2 0 2026-05-12T09:31:33 The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable
CVE-2026-42882 9.4 0.12% 2 0 2026-05-11T20:25:44.450000 oxyno-zeta/s3-proxy is an aws s3 proxy written in go. Prior to 5.0.0, s3-proxy c
CVE-2026-42843 8.8 0.04% 2 0 2026-05-11T20:25:42.893000 Grav API Plugin is a RESTful API for Grav CMS that provides full headless access
CVE-2026-41431 8.0 0.04% 2 0 2026-05-11T19:16:22.897000 Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Ap
CVE-2026-8177 7.5 0.02% 2 0 2026-05-11T18:32:45 XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when
CVE-2026-6433 7.3 0.03% 2 0 2026-05-11T18:32:45 The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize
CVE-2026-44413 8.2 0.00% 3 0 2026-05-11T18:31:59 In JetBrains TeamCity before 2026.1 2025.11.5 authenticated users could expose s
CVE-2026-43639 8.0 0.05% 2 0 2026-05-11T18:31:59 Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerabili
CVE-2026-45004 7.8 0.01% 2 0 2026-05-11T18:31:59 OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in
CVE-2026-33357 7.5 0.03% 4 0 2026-05-11T18:31:55 In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.
CVE-2026-33356 7.7 0.03% 4 0 2026-05-11T18:31:55 In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated l
CVE-2026-33362 8.6 0.03% 2 0 2026-05-11T18:31:55 In Meari IoT SDK builds embedded in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (b
CVE-2026-33361 7.5 0.02% 2 0 2026-05-11T18:31:54 In Meari IoT SDK image handling (libmrplayer.so) as observed in CloudEdge 5.5.0
CVE-2026-33359 7.5 0.05% 2 0 2026-05-11T18:31:54 In Meari IoT Cloud alert image storage on Alibaba OSS (latest observed; storage
CVE-2026-7815 8.8 0.05% 2 0 2026-05-11T18:31:54 SQL injection vulnerability in pgAdmin 4 Maintenance Tool. Four user-supplied J
CVE-2026-7813 9.9 0.06% 2 0 2026-05-11T18:31:54 Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Se
CVE-2026-7819 8.1 0.04% 2 0 2026-05-11T18:31:54 Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager. check_
CVE-2026-43640 8.1 0.06% 2 0 2026-05-11T18:16:37.110000 Bitwarden Server prior to v2026.4.1 does not require master-password re-authenti
CVE-2026-42603 8.8 0.04% 2 0 2026-05-11T18:16:35.887000 OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses
CVE-2026-7816 8.8 0.19% 2 0 2026-05-11T17:16:35 OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query exp
CVE-2026-44738 7.7 0.03% 2 0 2026-05-11T17:16:34.747000 Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-l
CVE-2026-43500 7.8 0.01% 13 13 2026-05-11T17:16:34.290000 In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also
CVE-2026-4802 8.0 0.19% 2 0 2026-05-11T15:32:12 A flaw was found in Cockpit. This vulnerability allows a remote attacker to achi
CVE-2026-8253 2.4 0.03% 1 0 2026-05-11T15:08:09.893000 A vulnerability was identified in Devs Palace ERP Online up to 4.0.0. Affected b
CVE-2026-40281 10.0 0.09% 1 1 2026-05-11T14:46:07.127000 Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 an
CVE-2026-40636 9.8 0.07% 4 0 2026-05-11T12:32:39 Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to
CVE-2025-10470 8.6 0.05% 2 0 2026-05-11T12:32:39 The Magic Link authentication flow accepts multiple invalid authentication reque
CVE-2026-43438 7.8 0.01% 2 0 2026-05-11T09:31:35 In the Linux kernel, the following vulnerability has been resolved: sched_ext:
CVE-2026-43452 8.2 0.05% 2 0 2026-05-11T09:31:35 In the Linux kernel, the following vulnerability has been resolved: netfilter:
CVE-2026-43447 7.8 0.01% 2 0 2026-05-11T09:31:35 In the Linux kernel, the following vulnerability has been resolved: iavf: fix P
CVE-2026-43461 7.8 0.01% 2 0 2026-05-11T09:31:35 In the Linux kernel, the following vulnerability has been resolved: spi: amlogi
CVE-2026-43462 7.5 0.04% 2 0 2026-05-11T09:31:35 In the Linux kernel, the following vulnerability has been resolved: net: spacem
CVE-2026-43434 7.8 0.01% 2 0 2026-05-11T09:31:34 In the Linux kernel, the following vulnerability has been resolved: rust_binder
CVE-2026-43433 7.8 0.01% 2 0 2026-05-11T09:31:34 In the Linux kernel, the following vulnerability has been resolved: rust_binder
CVE-2026-43454 7.8 0.01% 2 0 2026-05-11T09:31:34 In the Linux kernel, the following vulnerability has been resolved: netfilter:
CVE-2026-43469 7.5 0.05% 2 0 2026-05-11T09:31:34 In the Linux kernel, the following vulnerability has been resolved: xprtrdma: D
CVE-2026-43465 9.8 0.06% 2 0 2026-05-11T09:31:34 In the Linux kernel, the following vulnerability has been resolved: net/mlx5e:
CVE-2026-43284 7.8 0.01% 6 20 2026-05-11T06:31:33 In the Linux kernel, the following vulnerability has been resolved: xfrm: esp:
CVE-2026-8274 5.3 0.01% 2 0 2026-05-11T05:16:16.580000 A security vulnerability has been detected in npitre cramfs-tools up to 2.1. Aff
CVE-2026-8260 8.8 0.04% 3 1 2026-05-11T03:31:32 A vulnerability was found in D-Link DCS-935L up to 1.10.01. The impacted element
CVE-2021-47930 8.2 0.04% 1 0 2026-05-10T15:31:26 Balbooa Joomla Forms Builder 2.0.6 contains an unauthenticated SQL injection vul
CVE-2021-47932 9.8 0.08% 1 0 2026-05-10T15:31:19 WordPress TheCartPress 1.5.3.6 contains an unauthenticated privilege escalation
CVE-2021-47936 9.8 0.22% 1 0 2026-05-10T15:31:19 OpenCATS 0.9.4 contains a remote code execution vulnerability that allows unauth
CVE-2021-47933 9.8 0.17% 1 0 2026-05-10T15:31:19 WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that
CVE-2026-7270 7.8 0.01% 1 1 2026-05-10T08:16:08.693000 An operator precedence bug in the kernel results in a scenario where a buffer ov
CVE-2026-8234 8.8 0.04% 2 0 2026-05-10T07:16:08.740000 A security vulnerability has been detected in EFM ipTIME A8004T 14.18.2. This vu
CVE-2025-66172 6.5 0.01% 1 0 2026-05-09T09:31:45 The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 a
CVE-2026-25077 6.3 0.02% 1 0 2026-05-09T09:31:45 Account users are allowed by default to register templates to be downloaded dire
CVE-2026-42271 8.8 0.05% 1 0 2026-05-08T20:04:50.543000 LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) fo
CVE-2026-42208 9.8 37.37% 4 4 2026-05-08T19:19:34.537000 LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) fo
CVE-2026-7482 9.1 0.10% 3 4 2026-05-08T17:26:03 Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGU
CVE-2026-33587 10.0 0.06% 1 0 2026-05-07T21:30:27 Lack of user input sanitisation in Open Notebook v1.8.3 allows the application u
CVE-2026-6973 7.2 5.01% 2 0 2026-05-07T19:18:39.910000 An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1,
CVE-2026-42611 8.9 0.04% 2 0 2026-05-05T21:36:29 ### Summary A low-privileged (with the ability to create a page) user can cause
CVE-2026-42613 9.4 0.05% 4 0 2026-05-05T21:26:07 # Bug Report: Registration Privilege Escalation via Missing Server-Side Validati
CVE-2026-42607 9.1 0.23% 2 0 2026-05-05T21:21:13 ### Summary An authenticated user with administrative privileges can achieve Rem
CVE-2026-42315 8.1 0.06% 2 0 2026-05-05T21:18:20 ### Summary No sanitization of package folder name allows writing files anywhere
CVE-2026-42260 8.2 0.00% 4 0 2026-05-05T20:51:46 ### Summary `src/utils/urlSafety.ts` exposes `isPublicHttpUrl` / `assertPublicHt
CVE-2026-43938 8.1 0.00% 4 0 2026-05-05T20:31:36 **Description:** Stored (second-order) Cross-Site Scripting (XSS) occurs when at
CVE-2026-42864 9.9 0.05% 4 0 2026-05-05T18:21:19 ### Impact The `POST /api/v2/firefighter/raid/jira_bot` endpoint (`CreateJiraB
CVE-2026-42313 8.3 0.04% 2 0 2026-05-04T22:08:27 ### Summary The `set_config_value()` API method (`@permission(Perms.SETTINGS)`)
CVE-2026-41893 None 0.04% 1 0 2026-05-04T20:53:02 ## Summary The HTTP login endpoints (`POST /login` and `POST /signalk/v1/auth/l
CVE-2026-41940 9.8 67.01% 7 67 template 2026-05-04T18:31:33 cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0
CVE-2026-4670 9.8 0.22% 1 0 2026-05-04T18:20:39.803000 Authentication bypass by primary weakness vulnerability in Progress Software MOV
CVE-2026-42511 7.3 0.06% 2 0 2026-04-30T15:31:40 The BOOTP file field is written to the lease file without escaping embedded doub
CVE-2025-20362 6.5 46.39% 1 0 template 2025-10-22T00:34:26 A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security
CVE-2017-0144 8.1 94.32% 2 21 2025-10-22T00:32:22 The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2
CVE-2024-27355 7.5 0.33% 2 0 2025-09-15T17:17:49.997000 An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3
CVE-2026-43989 0 0.00% 4 0 N/A
CVE-2026-43991 0 0.00% 4 0 N/A
CVE-2026-43990 0 0.00% 2 0 N/A
CVE-2026-43993 0 0.00% 2 0 N/A
CVE-2026-8161 0 0.04% 2 1 N/A
CVE-2026-42858 0 0.03% 2 0 N/A
CVE-2026-41050 0 0.00% 1 0 N/A
CVE-2026-6735 0 0.05% 1 0 N/A
CVE-2026-42562 0 0.04% 1 0 N/A

CVE-2026-45185
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-12T21:16:16.807000

13 posts

Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitr

1 repos

https://github.com/liamromanis101/Dead.Letter-CVE-2026-45185

campuscodi@mastodon.social at 2026-05-12T21:44:54.000Z ##

XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter

xbow.com/blog/dead-letter-cve-

Patches are out: exim.org/static/doc/security/E

##

newsycombinator@framapiaf.org at 2026-05-12T19:00:29.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: xbow.com/blog/dead-letter-cve-
Comments: news.ycombinator.com/item?id=4

##

hnbot@chrispelli.fun at 2026-05-12T18:02:35.000Z ##

Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim - xbow.com/blog/dead-letter-cve-

#hackernews

##

ngate@mastodon.social at 2026-05-12T18:01:21.000Z ##

🚀 Ah, another day, another #CVE nobody asked for. Humans vs. #AI in a race to exploit #Exim, because *obviously* that's what we need—Skynet learning to hack email servers. 😂 But hey, at least the buzzwords and pentest pitches are here to save us from the tedium of actual #security work. 📉
xbow.com/blog/dead-letter-cve- #Skynet #Hacking #HackerNews #ngated

##

h4ckernews@mastodon.social at 2026-05-12T18:01:15.000Z ##

Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim

xbow.com/blog/dead-letter-cve-

#HackerNews #DeadLetter #CVE202645185 #UnauthenticatedRCE #Exim #LLMVsHumans

##

CuratedHackerNews@mastodon.social at 2026-05-12T17:58:07.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

xbow.com/blog/dead-letter-cve-

##

_r_netsec at 2026-05-12T17:43:05.743Z ##

Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim xbow.com/blog/dead-letter-cve-

##

campuscodi@mastodon.social at 2026-05-12T21:44:54.000Z ##

XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter

xbow.com/blog/dead-letter-cve-

Patches are out: exim.org/static/doc/security/E

##

newsycombinator@framapiaf.org at 2026-05-12T19:00:29.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: xbow.com/blog/dead-letter-cve-
Comments: news.ycombinator.com/item?id=4

##

ngate@mastodon.social at 2026-05-12T18:01:21.000Z ##

🚀 Ah, another day, another #CVE nobody asked for. Humans vs. #AI in a race to exploit #Exim, because *obviously* that's what we need—Skynet learning to hack email servers. 😂 But hey, at least the buzzwords and pentest pitches are here to save us from the tedium of actual #security work. 📉
xbow.com/blog/dead-letter-cve- #Skynet #Hacking #HackerNews #ngated

##

h4ckernews@mastodon.social at 2026-05-12T18:01:15.000Z ##

Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim

xbow.com/blog/dead-letter-cve-

#HackerNews #DeadLetter #CVE202645185 #UnauthenticatedRCE #Exim #LLMVsHumans

##

CuratedHackerNews@mastodon.social at 2026-05-12T17:58:07.000Z ##

Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim

xbow.com/blog/dead-letter-cve-

##

_r_netsec@infosec.exchange at 2026-05-12T17:43:05.000Z ##

Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim xbow.com/blog/dead-letter-cve-

##

CVE-2026-35071
(8.2 HIGH)

EPSS: 0.00%

updated 2026-05-12T19:49:35.160000

2 posts

Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution.

thehackerwire@mastodon.social at 2026-05-12T15:00:28.000Z ##

🟠 CVE-2026-35071 - High (8.2)

Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:00:28.000Z ##

🟠 CVE-2026-35071 - High (8.2)

Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit t...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41712
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T19:26:04.083000

4 posts

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

thehackerwire@mastodon.social at 2026-05-12T12:18:44.000Z ##

🟠 CVE-2026-41712 - High (7.5)

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:52.000Z ##

🟠 CVE-2026-41712 - High (7.5)

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:18:44.000Z ##

🟠 CVE-2026-41712 - High (7.5)

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:52.000Z ##

🟠 CVE-2026-41712 - High (7.5)

Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44277
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-12T18:57:02.307000

3 posts

A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

Analyst207@mastodon.social at 2026-05-12T18:28:32.000Z ##

Fortinet Disrupts Critical RCE Flaws in FortiSandbox, FortiAuthenticator

Fortinet has patched a critical remote code execution vulnerability in its FortiAuthenticator and FortiSandbox products, which could have allowed unauthenticated attackers to run unauthorized code or commands. The company has released fixed builds to address the flaw, tracked as CVE-2026-44277, and…

osintsights.com/fortinet-disru

#RemoteCodeExecution #Fortiauthenticator #Cve202644277 #Fortinet #IdentityAndAccessManagement

##

thehackerwire@mastodon.social at 2026-05-12T18:24:07.000Z ##

🔴 CVE-2026-44277 - Critical (9.8)

A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:24:07.000Z ##

🔴 CVE-2026-44277 - Critical (9.8)

A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28972
(6.5 MEDIUM)

EPSS: 0.02%

updated 2026-05-12T18:30:37

2 posts

An out-of-bounds write issue was addressed with improved input validation. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, visionOS 26.5, watchOS 26.5. An app may be able to cause unexpected system termination or write kernel memory.

xint at 2026-05-12T16:26:15.798Z ##

Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
xint.io/blog/kernel-vulnerabil

##

xint@infosec.exchange at 2026-05-12T16:26:15.000Z ##

Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
xint.io/blog/kernel-vulnerabil

##

CVE-2026-44183
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-12T18:17:29.427000

2 posts

Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the X-Forwarded-For header as the client IP. That entry is attacker-controlled — X-Forwarded-For is append-only, so the leftmost value is whatever the origi

thehackerwire@mastodon.social at 2026-05-12T18:24:26.000Z ##

🔴 CVE-2026-44183 - Critical (9.8)

Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:24:26.000Z ##

🔴 CVE-2026-44183 - Critical (9.8)

Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44167
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-12T18:17:29.273000

2 posts

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fixed in 1.0.29, 2.0.54, and 3.0.52.

thehackerwire@mastodon.social at 2026-05-12T18:24:16.000Z ##

🟠 CVE-2026-44167 - High (7.5)

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:24:16.000Z ##

🟠 CVE-2026-44167 - High (7.5)

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42899
(7.5 HIGH)

EPSS: 0.00%

updated 2026-05-12T18:17:26.733000

1 posts

Loop with unreachable exit condition ('infinite loop') in ASP.NET Core allows an unauthorized attacker to deny service over a network.

CVE-2026-41096
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-12T18:17:21.167000

2 posts

Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.

CVE-2026-41089
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-12T18:17:20.720000

2 posts

Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.

CVE-2026-35433
(7.3 HIGH)

EPSS: 0.00%

updated 2026-05-12T18:17:13.710000

2 posts

Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally.

blowdart.me@bsky.brid.gy at 2026-05-12T20:12:48.787Z ##

Even .NET Framework has an update, with its own fixes for CVE-2026-32177 and CVE-2026-35433. support.microsoft.com/en-us/topic/... So, start your update engines :)

May 12, 2026-KB5087051 Cumulat...

##

blowdart.me@bsky.brid.gy at 2026-05-12T20:12:48.785Z ##

CVE-2026-35433 – .NET Elevation of Privilege github.com/dotnet/annou...

Microsoft Security Advisory CV...

##

CVE-2026-32177
(7.3 HIGH)

EPSS: 0.00%

updated 2026-05-12T18:16:58.947000

2 posts

Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate privileges locally.

blowdart.me@bsky.brid.gy at 2026-05-12T20:12:48.787Z ##

Even .NET Framework has an update, with its own fixes for CVE-2026-32177 and CVE-2026-35433. support.microsoft.com/en-us/topic/... So, start your update engines :)

May 12, 2026-KB5087051 Cumulat...

##

blowdart.me@bsky.brid.gy at 2026-05-12T20:12:48.786Z ##

CVE-2026-32177 – .NET Elevation of Privilege github.com/dotnet/annou...

Microsoft Security Advisory CV...

##

CVE-2026-32175
(4.3 MEDIUM)

EPSS: 0.00%

updated 2026-05-12T18:16:58.737000

1 posts

A tampering vulnerability exists when .NET Core improperly handles specially crafted files. An attacker who successfully exploited this vulnerability could write arbitrary files and directories to certain locations on a vulnerable system. However, an attacker would have limited control over the destination of the files and directories. To exploit the vulnerability, an attacker must send a speciall

CVE-2026-6722
(9.8 CRITICAL)

EPSS: 0.29%

updated 2026-05-12T17:48:21.643000

2 posts

In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, and 8.5.* before 8.5.6, the SOAP extension's object deduplication mechanism stores pointers to PHP objects in a global map without incrementing their reference counts. When an apache:Map node contains duplicate keys, processing the second entry overwrites the first in the temporary result map, freeing the original PHP o

Matchbook3469@mastodon.social at 2026-05-11T17:55:31.000Z ##

🚨 New security advisory:

CVE-2026-6722 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #SecurityPatching #HackerNews

##

offseq@infosec.exchange at 2026-05-10T06:00:27.000Z ##

🚩 CRITICAL: CVE-2026-6722 in PHP SOAP (8.2 – 8.5) allows unauthenticated RCE via use-after-free. No patch confirmed — restrict SOAP access or disable if not needed. Details: radar.offseq.com/threat/cve-20 #OffSeq #PHP #Vuln #RCE #InfoSec

##

CVE-2026-43992
(9.8 CRITICAL)

EPSS: 0.00%

updated 2026-05-12T17:16:21.240000

4 posts

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call parameter. The BIP-39 seed was consequently embedded in the LLM tool-call JSON, exposing it to any transport, log, or telemetry surface in the path betwee

thehackerwire@mastodon.social at 2026-05-12T17:22:47.000Z ##

🔴 CVE-2026-43992 - Critical (9.8)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:13.000Z ##

🔴 CVE-2026-43992 - Critical (9.8)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:22:47.000Z ##

🔴 CVE-2026-43992 - Critical (9.8)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:13.000Z ##

🔴 CVE-2026-43992 - Critical (9.8)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42860
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T16:50:08.553000

2 posts

The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_source. An authenticated user with the Enterprise Admin role can set this field to an arbitrary URL via the SAMLProviderConfigViewSet PATCH endpoint, then tri

thehackerwire@mastodon.social at 2026-05-11T18:17:42.000Z ##

🟠 CVE-2026-42860 - High (8.5)

The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_sourc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:17:42.000Z ##

🟠 CVE-2026-42860 - High (8.5)

The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_sourc...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-5084
(6.5 MEDIUM)

EPSS: 0.01%

updated 2026-05-12T16:48:58.260000

2 posts

WebDyne::Session versions through 2.075 for Perl generates the session id insecurely. The session handler generates the session id from an MD5 hash seeded with a call to the built-in rand() function. The rand function is passed a maximum value based on the process id, the epoch time and the reference address of the object, but this information will have no effect on the overall quality of the see

offseq at 2026-05-11T09:00:30.035Z ##

⚠️ HIGH severity: CVE-2026-5084 in WebDyne::Session ≤2.075 creates predictable session IDs (MD5, rand()). Risk: session hijacking. No patch yet — use secure session management & monitor vendor updates. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-11T09:00:30.000Z ##

⚠️ HIGH severity: CVE-2026-5084 in WebDyne::Session ≤2.075 creates predictable session IDs (MD5, rand()). Risk: session hijacking. No patch yet — use secure session management & monitor vendor updates. radar.offseq.com/threat/cve-20 #OffSeq #Infosec #CVE20265084 #Perl

##

CVE-2026-2465
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-12T16:47:58.570000

4 posts

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation. This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

thehackerwire@mastodon.social at 2026-05-12T12:07:33.000Z ##

🟠 CVE-2026-2465 - High (8.8)

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.

This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:40.000Z ##

🟠 CVE-2026-2465 - High (8.8)

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.

This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:07:33.000Z ##

🟠 CVE-2026-2465 - High (8.8)

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.

This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:40.000Z ##

🟠 CVE-2026-2465 - High (8.8)

Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.

This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6001
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-12T16:47:58.570000

2 posts

Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers. This issue affects BAPSİS: before v.202604152042.

thehackerwire@mastodon.social at 2026-05-12T11:59:07.000Z ##

🟠 CVE-2026-6001 - High (8.8)

Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers.

This issue affects BAPSİS: before v.202604152042.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:59:07.000Z ##

🟠 CVE-2026-6001 - High (8.8)

Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers.

This issue affects BAPSİS: before v.202604152042.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42609
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-12T16:16:54.790000

2 posts

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a business logic vulnerability in the Grav Admin Panel allows a low-privileged user (with only user creation permissions) to overwrite existing accounts, including the primary administrator. By creating a new user with a username that already exists, the system updates the existing account's metadata and permissions instead of rejecting the

thehackerwire@mastodon.social at 2026-05-11T17:03:27.000Z ##

🟠 CVE-2026-42609 - High (8.1)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a business logic vulnerability in the Grav Admin Panel allows a low-privileged user (with only user creation permissions) to overwrite existing accounts, including the primary administrator...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:03:27.000Z ##

🟠 CVE-2026-42609 - High (8.1)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a business logic vulnerability in the Grav Admin Panel allows a low-privileged user (with only user creation permissions) to overwrite existing accounts, including the primary administrator...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42612
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T16:16:40.253000

2 posts

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a stored Cross-Site Scripting (XSS) vulnerability in getgrav/grav allows publisher-level accounts to execute arbitrary JavaScript. The issue arises from a blacklist bypass in the detectXss() function when handling unquoted HTML event attributes. This vulnerability is fixed in 2.0.0-beta.2.

thehackerwire@mastodon.social at 2026-05-11T16:58:55.000Z ##

🟠 CVE-2026-42612 - High (8.5)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a stored Cross-Site Scripting (XSS) vulnerability in getgrav/grav allows publisher-level accounts to execute arbitrary JavaScript. The issue arises from a blacklist bypass in the detectXss(...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T16:58:55.000Z ##

🟠 CVE-2026-42612 - High (8.5)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a stored Cross-Site Scripting (XSS) vulnerability in getgrav/grav allows publisher-level accounts to execute arbitrary JavaScript. The issue arises from a blacklist bypass in the detectXss(...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43937
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-12T16:16:18.740000

2 posts

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose OnPostRunQuery binds Editor from the POST body and passes it straight to IDbAccess.RunSql with no caller check, yielding arbitrary SQL execution for any l

thehackerwire@mastodon.social at 2026-05-12T15:26:05.000Z ##

🟠 CVE-2026-43937 - High (8.8)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:05.000Z ##

🟠 CVE-2026-43937 - High (8.8)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-28986
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-12T15:32:40

2 posts

A race condition was addressed with additional validation. This issue is fixed in iOS 18.7.9 and iPadOS 18.7.9, iOS 26.5 and iPadOS 26.5, macOS Sequoia 15.7.7, macOS Sonoma 14.8.7, macOS Tahoe 26.5, tvOS 26.5, watchOS 26.5. An app may be able to cause unexpected system termination.

xint at 2026-05-12T16:26:15.798Z ##

Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
xint.io/blog/kernel-vulnerabil

##

xint@infosec.exchange at 2026-05-12T16:26:15.000Z ##

Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
xint.io/blog/kernel-vulnerabil

##

CVE-2026-8111
(8.8 HIGH)

EPSS: 0.00%

updated 2026-05-12T15:31:52

2 posts

SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.

thehackerwire@mastodon.social at 2026-05-12T15:24:13.000Z ##

🟠 CVE-2026-8111 - High (8.8)

SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:24:13.000Z ##

🟠 CVE-2026-8111 - High (8.8)

SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8110
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-12T15:31:49

4 posts

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

thehackerwire@mastodon.social at 2026-05-12T16:35:38.000Z ##

🟠 CVE-2026-8110 - High (7.8)

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:25:49.000Z ##

🟠 CVE-2026-8110 - High (7.8)

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T16:35:38.000Z ##

🟠 CVE-2026-8110 - High (7.8)

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:25:49.000Z ##

🟠 CVE-2026-8110 - High (7.8)

Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8043
(9.6 CRITICAL)

EPSS: 0.00%

updated 2026-05-12T15:31:49

4 posts

External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side attacks.

nyanbinary at 2026-05-12T16:22:52.138Z ##

til that Ivanti doesn't just make insecure endpoint management software. they also make insecure reporting software :neobot_giggle:

nvd.nist.gov/vuln/detail/cve-2

##

thehackerwire@mastodon.social at 2026-05-12T15:24:31.000Z ##

🔴 CVE-2026-8043 - Critical (9.6)

External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

nyanbinary@infosec.exchange at 2026-05-12T16:22:52.000Z ##

til that Ivanti doesn't just make insecure endpoint management software. they also make insecure reporting software :neobot_giggle:

nvd.nist.gov/vuln/detail/cve-2

##

thehackerwire@mastodon.social at 2026-05-12T15:24:31.000Z ##

🔴 CVE-2026-8043 - Critical (9.6)

External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7432
(7.8 HIGH)

EPSS: 0.00%

updated 2026-05-12T15:31:48

2 posts

A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM

thehackerwire@mastodon.social at 2026-05-12T15:24:22.000Z ##

🟠 CVE-2026-7432 - High (7.8)

A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:24:22.000Z ##

🟠 CVE-2026-7432 - High (7.8)

A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-0300
(9.8 CRITICAL)

EPSS: 6.22%

updated 2026-05-12T15:31:19

2 posts

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal

8 repos

https://github.com/p3Nt3st3r-sTAr/CVE-2026-0300-POC

https://github.com/qassam-315/PAN-OS-User-ID-Buffer-Overflow-PoC

https://github.com/shizuku198411/CVE-2026-0300

https://github.com/TailwindRG/cve-2026-0300-audit

https://github.com/ByteWraith1/CVE-2026-0300

https://github.com/bannned-bit/CVE-2026-0300-PANOS

https://github.com/0xBlackash/CVE-2026-0300

https://github.com/mr-r3b00t/CVE-2026-0300

netsecio@mastodon.social at 2026-05-11T19:53:54.000Z ##

📰 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE

🚨 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS

🔗 cyber.netsecops.io

##

Matchbook3469@mastodon.social at 2026-05-11T17:55:33.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-05-04 to 2026-05-10

Roundup | CRITICAL
CVEs: CVE-2026-0300, CVE-2026-33587, CVE-2026-40281

Cybersecurity roundup for 2026-05-04 to 2026-05-10. 10 CVE advisories, 5 breach reports, 4 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#InfoSec #ZeroDay #SecurityOps

##

CVE-2026-31431
(7.8 HIGH)

EPSS: 4.06%

updated 2026-05-12T15:31:18

10 posts

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just

100 repos

https://github.com/adysec/cve-2026-31431

https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation

https://github.com/Xerxes-2/CVE-2026-31431-rs

https://github.com/wvverez/CVE-2026-31431-Copy-Fail

https://github.com/mCub3/CVE-2026-31431

https://github.com/b5null/CVE-2026-31431-C

https://github.com/theori-io/copy-fail-CVE-2026-31431

https://github.com/rootsecdev/cve_2026_31431

https://github.com/gagaltotal/cve-2026-31431-copy-fail

https://github.com/0xShe/CVE-2026-31431

https://github.com/jbnetwork-git/copy-fail-check

https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite

https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431

https://github.com/abdullaabdullazade/CVE-2026-31431

https://github.com/Sl4cK0TH/CVE-2026-31431-PoC

https://github.com/Linux-zs/cve-2026-31431-mitigation

https://github.com/bootsareme/copyfail-deconstructed

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/diemoeve/copyfail-rs

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC

https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE

https://github.com/Dabbleam/CVE-2026-31431-mitigation

https://github.com/sgkdev/page_inject

https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail

https://github.com/mrunalp/block-copyfail

https://github.com/xn0kkx/CVE-2026-31431_CopyFail_LinuxKernel_LPE

https://github.com/freelabz/CVE-2026-31431

https://github.com/sammwyy/copyfail-rs

https://github.com/SeanRickerd/cve-2026-31431

https://github.com/pascal-gujer/CVE-2026-31431

https://github.com/malwarekid/CVE-2026-31431

https://github.com/ExploitEoom/CVE-2026-31431

https://github.com/JuanBindez/CVE-2026-31431

https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag

https://github.com/badsectorlabs/copyfail-go

https://github.com/ErdemOzgen/copy-fail-cve-2026-31431

https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit

https://github.com/samanzamani/copy-fail-checker

https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script

https://github.com/rfxn/copyfail

https://github.com/professional-slacker/alg_check

https://github.com/cozystack/copy-fail-blocker

https://github.com/poyea/CVE-2026-31431.c

https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431

https://github.com/AliHzSec/CVE-2026-31431

https://github.com/philfry/cve-2026-31431-ftrace

https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431

https://github.com/leelong2020/cve-2026-31431

https://github.com/pedromizz/copy-fail

https://github.com/darioomatos/cve-2026-31431-copyfail

https://github.com/aestechno/cve-2026-31431-ansible

https://github.com/sudoytang/copyfail-arm64

https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431

https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe

https://github.com/0xBlackash/CVE-2026-31431

https://github.com/desultory/CVE-2026-31431

https://github.com/wgnet/wg.copyfail.patch

https://github.com/bigwario/copy-fail-CVE-2026-31431-C

https://github.com/ben-slates/CVE-2026-31431-Exploit

https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit

https://github.com/kadir/copy-fail-CVE-2026-31431-IOC

https://github.com/rvizx/CVE-2026-31431

https://github.com/0xN7y/CVE-2026-31431

https://github.com/polyakovavv/copyfail

https://github.com/ncmprbll/copy-fail-rs

https://github.com/EynaExp/Copy-Fail-CVE-2026-31431-modernized

https://github.com/Smarttfoxx/copyfail

https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC

https://github.com/pvpaulo01/cve-2026-31431

https://github.com/Boos4721/copyfail-rs

https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431

https://github.com/AdityaBhatt3010/CVE-2026-31431

https://github.com/ZephrFish/CopyFail-CVE-2026-31431

https://github.com/tgies/copy-fail-c

https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs

https://github.com/Alfredooe/CVE-2026-31431

https://github.com/H1d3r/copy-fail_LPE_Interactive

https://github.com/Dullpurple-sloop726/CVE-2026-31431-Linux-Copy-Fail

https://github.com/povzayd/CVE-2026-31431

https://github.com/XsanFlip/CVE-2026-31431-Patch

https://github.com/qi4L/CVE-2026-31431-Container-Escape

https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431

https://github.com/cyber-joker/copy-fail-python

https://github.com/yxdm02/CVE-2026-31431

https://github.com/lonelyor/CVE-2026-31431-exp

https://github.com/MartinPham/copy-fail-CVE-2026-31431-php

https://github.com/sec17br/CVE-2026-31431-Copy-Fail

https://github.com/suominen/CVE-2026-31431

https://github.com/Huchangzhi/autorootlinux

https://github.com/MrAriaNet/cPanel-Fix

https://github.com/atgreen/block-copyfail

https://github.com/G01d3nW01f/CVE-2026-31431

https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431

https://github.com/ashok523/cve-2026-31431

https://github.com/wesmar/CVE-2026-31431

https://github.com/krisiasty/vcheck

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/wuwu001/CVE-2026-31431-exploit

https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection

https://github.com/RoflSecurity/copy_fail

_r_netsec at 2026-05-11T08:58:06.114Z ##

Copy Fail (CVE-2026-31431): A Technical Deep Dive github.com/fraynal/articles/tr

##

ruari@velocipederider.com at 2026-05-11T07:43:32.000Z ##

I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.

Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).

I hope things calm down a bit now but I guess we shall see…

##

hackerworkspace at 2026-05-11T04:48:27.825Z ##

GitHub - sgkdev/page_inject: CVE-2026-31431-killed page-cache exploit — code exec into containers sharing the same image layer

github.com/sgkdev/page_inject/

Read on HackerWorkspace: hackerworkspace.com/article/gi

##

linux@activitypub.awakari.com at 2026-05-12T08:00:00.000Z ## Copy Fail and Dirty Frag: Linux Page-Cache Exploits Target Every Major Distribution Two recent Linux kernel vulnerabilities have been disclosed: Copy Fail (CVE-2026-31431) on April 29, 2026, and Di...

#Linux #Security #Vulnerabilities #DevOps #news

Origin | Interest | Match ##

_r_netsec@infosec.exchange at 2026-05-11T08:58:06.000Z ##

Copy Fail (CVE-2026-31431): A Technical Deep Dive github.com/fraynal/articles/tr

##

ruari@velocipederider.com at 2026-05-11T07:43:32.000Z ##

I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.

Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).

I hope things calm down a bit now but I guess we shall see…

##

linux@activitypub.awakari.com at 2026-05-08T08:26:27.000Z ## Dirty Frag Linux Vulnerability Exposes Major Distributions to Root Access Attacks A newly disclosed local privilege escalation (LPE) vulnerability known as Dirty Frag is raising serious concerns ac...

#Firewall #Daily #Cyber #News #Vulnerabilities #Vulnerability #News #CVE-2026-31431 #Dirty #Frag #Linux

Origin | Interest | Match ##

hackerworkspace@infosec.exchange at 2026-05-11T04:48:27.000Z ##

GitHub - sgkdev/page_inject: CVE-2026-31431-killed page-cache exploit — code exec into containers sharing the same image layer

github.com/sgkdev/page_inject/

Read on HackerWorkspace: hackerworkspace.com/article/gi

#cybersecurity #vulnerability #exploit

##

linux@activitypub.awakari.com at 2026-05-07T21:19:23.000Z ## Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privil...

#KernelCare #CVE #Vulnerability #Kernel #Update #AlmaLinux #CloudLinux

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-04-30T15:50:50.000Z ## Copy Fail (CVE-2026-31431): Frequently asked questions about Linux kernel privilege escalation vulnerability A flaw in the Linux kernel present since 2017 allows a local user to gain root access on...


Origin | Interest | Match ##

CVE-2026-7287
(7.5 HIGH)

EPSS: 0.26%

updated 2026-05-12T15:11:29.503000

2 posts

** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C0 could allow an attacker to trigger a denial-of-service (DoS) condition by sending a crafted HTTP request to a vulnerable device.

thehackerwire@mastodon.social at 2026-05-12T17:30:21.000Z ##

🟠 CVE-2026-7287 - High (7.5)

** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:30:21.000Z ##

🟠 CVE-2026-7287 - High (7.5)

** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7256
(8.8 HIGH)

EPSS: 0.83%

updated 2026-05-12T15:11:29.503000

2 posts

** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device by sending a crafted HTTP request.

thehackerwire@mastodon.social at 2026-05-12T17:30:08.000Z ##

🟠 CVE-2026-7256 - High (8.8)

** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:30:08.000Z ##

🟠 CVE-2026-7256 - High (8.8)

** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45091
(9.1 CRITICAL)

EPSS: 0.00%

updated 2026-05-12T15:09:10

2 posts

In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every minted unseal token. JWS payload is base64-encoded JSON, NOT encrypted. Any party who could observe a minted token (CI build logs, container env dumps, kubectl describe pod, Sentry/Rollbar stack traces, log aggregators) could decode the payload and ext

thehackerwire@mastodon.social at 2026-05-12T15:00:16.000Z ##

🔴 CVE-2026-45091 - Critical (9.1)

sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:00:16.000Z ##

🔴 CVE-2026-45091 - Critical (9.1)

sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8162
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T15:08:22.857000

4 posts

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser invokes decodeURI on the value without try/catch. The resulting URIError propagates as an uncaught exception and crashes the process. Impact: any service

thehackerwire@mastodon.social at 2026-05-12T12:18:54.000Z ##

🟠 CVE-2026-8162 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:59:01.000Z ##

🟠 CVE-2026-8162 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:18:54.000Z ##

🟠 CVE-2026-8162 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:59:01.000Z ##

🟠 CVE-2026-8162 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8159
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T15:08:22.857000

2 posts

multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take seconds, blocking the event loop. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: limiting upload sizes at the p

thehackerwire@mastodon.social at 2026-05-12T11:59:16.000Z ##

🟠 CVE-2026-8159 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:59:16.000Z ##

🟠 CVE-2026-8159 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45223
(8.8 HIGH)

EPSS: 0.08%

updated 2026-05-12T14:47:42.170000

2 posts

Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges. An attacker with access to the shared non-admin token can craft a user-token payload with admin: true, sign it using HMAC-SHA256, and present it to adm

thehackerwire@mastodon.social at 2026-05-11T20:01:39.000Z ##

🟠 CVE-2026-45223 - High (8.8)

Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T20:01:39.000Z ##

🟠 CVE-2026-45223 - High (8.8)

Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45006
(8.8 HIGH)

EPSS: 0.11%

updated 2026-05-12T14:20:56.547000

2 posts

OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist protection. Attackers can persist malicious config modifications affecting command execution, network behavior, credentials, and operator policies that surv

thehackerwire@mastodon.social at 2026-05-11T18:21:45.000Z ##

🟠 CVE-2026-45006 - High (8.8)

OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:21:45.000Z ##

🟠 CVE-2026-45006 - High (8.8)

OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist pro...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-34263
(9.6 CRITICAL)

EPSS: 0.02%

updated 2026-05-12T14:19:41.400000

6 posts

Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentiality, Integrity, and Availability of the application.

thehackerwire@mastodon.social at 2026-05-12T18:05:27.000Z ##

🔴 CVE-2026-34263 - Critical (9.6)

Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentia...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1 at 2026-05-12T17:01:08.461Z ##

SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws

SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.

**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**

beyondmachines.net/event_detai

##

offseq at 2026-05-12T03:00:26.488Z ##

🚨 CRITICAL (CVSS 9.6): CVE-2026-34263 hits SAP Commerce Cloud (HY_COM 2205, COM_CLOUD 2211/JDK21). Unauthenticated attackers can upload configs & inject code — full server compromise risk. Monitor & restrict config uploads! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-12T18:05:27.000Z ##

🔴 CVE-2026-34263 - Critical (9.6)

Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentia...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-05-12T17:01:08.000Z ##

SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws

SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.

**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-05-12T03:00:26.000Z ##

🚨 CRITICAL (CVSS 9.6): CVE-2026-34263 hits SAP Commerce Cloud (HY_COM 2205, COM_CLOUD 2211/JDK21). Unauthenticated attackers can upload configs & inject code — full server compromise risk. Monitor & restrict config uploads! radar.offseq.com/threat/cve-20 #OffSeq #SAP #Vuln

##

CVE-2026-34260
(9.6 CRITICAL)

EPSS: 0.01%

updated 2026-05-12T14:19:41.400000

6 posts

SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user input into SQL queries, which are then passed to the underlying database without proper validation or sanitization. Upon successful exploitation, an attac

thehackerwire@mastodon.social at 2026-05-12T18:05:16.000Z ##

🔴 CVE-2026-34260 - Critical (9.6)

SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1 at 2026-05-12T17:01:08.461Z ##

SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws

SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.

**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**

beyondmachines.net/event_detai

##

offseq at 2026-05-12T04:30:30.766Z ##

🚨 CRITICAL: SQL injection (CVE-2026-34260, CVSS 9.6) in SAP S/4HANA (SAP_BASIS 751-816). Authenticated attackers can access sensitive data & crash apps. No patch yet — restrict access & monitor logs. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-12T18:05:16.000Z ##

🔴 CVE-2026-34260 - Critical (9.6)

SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user i...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

beyondmachines1@infosec.exchange at 2026-05-12T17:01:08.000Z ##

SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws

SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.

**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

offseq@infosec.exchange at 2026-05-12T04:30:30.000Z ##

🚨 CRITICAL: SQL injection (CVE-2026-34260, CVSS 9.6) in SAP S/4HANA (SAP_BASIS 751-816). Authenticated attackers can access sensitive data & crash apps. No patch yet — restrict access & monitor logs. radar.offseq.com/threat/cve-20 #OffSeq #SAP #Infosec #SQLInjection

##

CVE-2026-34259
(8.2 HIGH)

EPSS: 0.01%

updated 2026-05-12T14:19:41.400000

2 posts

Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful exploitation could allow the attacker to read or modify any system data or shut down the system, resulting in a complete compromise of confidentiality, integ

thehackerwire@mastodon.social at 2026-05-12T18:05:05.000Z ##

🟠 CVE-2026-34259 - High (8.2)

Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful expl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:05:05.000Z ##

🟠 CVE-2026-34259 - High (8.2)

Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful expl...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40946
(8.3 HIGH)

EPSS: 0.02%

updated 2026-05-12T14:19:41.400000

2 posts

A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All versions), blueplanet 125 NX3 M11 (All versions), blueplanet 125 TL3 (All versions), blueplanet 125 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 137 TL3 (All ve

thehackerwire@mastodon.social at 2026-05-12T17:27:26.000Z ##

🟠 CVE-2025-40946 - High (8.3)

A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions &lt; V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions &lt; V6.1.4.9), blueplanet 110 TL3 (All ver...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:27:26.000Z ##

🟠 CVE-2025-40946 - High (8.3)

A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions &lt; V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions &lt; V6.1.4.9), blueplanet 110 TL3 (All ver...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40949
(9.1 CRITICAL)

EPSS: 0.17%

updated 2026-05-12T14:19:41.400000

2 posts

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All vers

thehackerwire@mastodon.social at 2026-05-12T15:26:16.000Z ##

🔴 CVE-2025-40949 - Critical (9.1)

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.17.1), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.17.1), RUGGED...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:16.000Z ##

🔴 CVE-2025-40949 - Critical (9.1)

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.17.1), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.17.1), RUGGED...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40947
(7.5 HIGH)

EPSS: 0.23%

updated 2026-05-12T14:19:41.400000

2 posts

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGEDCOM ROX RX1501 (All versions < V2.17.1), RUGGEDCOM ROX RX1510 (All versions < V2.17.1), RUGGEDCOM ROX RX1511 (All versions < V2.17.1), RUGGEDCOM ROX RX1512 (All vers

thehackerwire@mastodon.social at 2026-05-12T15:05:08.000Z ##

🟠 CVE-2025-40947 - High (7.5)

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.17.1), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.17.1), RUGGED...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:05:08.000Z ##

🟠 CVE-2025-40947 - High (7.5)

A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions &lt; V2.17.1), RUGGEDCOM ROX MX5000RE (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1400 (All versions &lt; V2.17.1), RUGGEDCOM ROX RX1500 (All versions &lt; V2.17.1), RUGGED...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25786
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-12T14:19:41.400000

2 posts

Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into the product, to inject malicious scripts into the page. If a benign user with appropriate rights accesses the "communication" parameters page, the malicious code wo

thehackerwire@mastodon.social at 2026-05-12T15:04:48.000Z ##

🔴 CVE-2026-25786 - Critical (9.1)

Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:04:48.000Z ##

🔴 CVE-2026-25786 - Critical (9.1)

Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product,...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-27662
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-12T14:19:41.400000

2 posts

Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place. This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potentially enabling the discovery of backdoors, performing unauthorized actions, or exploiting misconfigurations that may lead to further system compromise.

thehackerwire@mastodon.social at 2026-05-12T15:01:38.000Z ##

🟠 CVE-2026-27662 - High (7.7)

Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place.
This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:01:38.000Z ##

🟠 CVE-2026-27662 - High (7.7)

Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place.
This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potenti...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44412
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-12T14:19:41.400000

2 posts

A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files. This could allow an attacker to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-05-12T13:05:16.000Z ##

🟠 CVE-2026-44412 - High (7.8)

A vulnerability has been identified in Solid Edge SE2026 (All versions &lt; V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.
This could allow an attacker to execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T13:05:16.000Z ##

🟠 CVE-2026-44412 - High (7.8)

A vulnerability has been identified in Solid Edge SE2026 (All versions &lt; V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.
This could allow an attacker to execut...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-32658
(8.0 HIGH)

EPSS: 0.04%

updated 2026-05-12T14:17:10.613000

2 posts

Dell Automation Platform versions prior to 2.0.0.0, contains a missing authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

thehackerwire@mastodon.social at 2026-05-11T11:47:59.000Z ##

🟠 CVE-2026-32658 - High (8)

Dell Automation Platform versions prior to 2.0.0.0, contains a missing authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T11:47:59.000Z ##

🟠 CVE-2026-32658 - High (8)

Dell Automation Platform versions prior to 2.0.0.0, contains a missing authorization vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Elevation of privileges.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42869
(10.0 CRITICAL)

EPSS: 0.12%

updated 2026-05-12T14:17:05.463000

2 posts

SOCFortress CoPilot focuses on providing a single pane of glass for all your security operations needs. Prior to 0.1.57, SOCFortress CoPilot ships a hardcoded JWT signing secret as a fallback value in backend/app/auth/utils.py:28 and ships it verbatim in .env.example. Any deployment where JWT_SECRET is not explicitly set — including the default Docker Compose setup — signs all authentication token

offseq at 2026-05-12T00:00:45.157Z ##

🚨 CVE-2026-42869 (CRITICAL): socfortress CoPilot <0.1.57 uses a hardcoded JWT secret, letting attackers forge admin tokens and seize control. Upgrade to 0.1.57+ and set JWT_SECRET securely! Details: radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-12T00:00:45.000Z ##

🚨 CVE-2026-42869 (CRITICAL): socfortress CoPilot <0.1.57 uses a hardcoded JWT secret, letting attackers forge admin tokens and seize control. Upgrade to 0.1.57+ and set JWT_SECRET securely! Details: radar.offseq.com/threat/cve-20 #OffSeq #Vuln #CVE #InfoSec

##

CVE-2026-35227
(0 None)

EPSS: 0.10%

updated 2026-05-12T14:15:46.747000

2 posts

An unauthenticated remote attacker may exhaust all available TCP connections in the CODESYS Modbus TCP Server stack if a race condition in connection handling is successfully exploited, preventing legitimate clients from establishing new connections.

certvde at 2026-05-12T07:15:44.226Z ##

VDE-2026-042
CODESYS Modbus TCP Server - Improper resource management

CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
CVE-2026-35227

certvde.com/en/advisories/vde-

codesys.csaf-tp.certvde.com/.w

##

certvde@infosec.exchange at 2026-05-12T07:15:44.000Z ##

#OT #Advisory VDE-2026-042
CODESYS Modbus TCP Server - Improper resource management

CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35227

certvde.com/en/advisories/vde-

#CSAF codesys.csaf-tp.certvde.com/.w

##

CVE-2026-4890
(7.5 HIGH)

EPSS: 0.18%

updated 2026-05-12T14:15:46.747000

2 posts

A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.

thehackerwire@mastodon.social at 2026-05-11T20:01:59.000Z ##

🟠 CVE-2026-4890 - High (7.5)

A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T20:01:59.000Z ##

🟠 CVE-2026-4890 - High (7.5)

A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43441
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-12T14:10:27.343000

2 posts

In the Linux kernel, the following vulnerability has been resolved: net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never initialized because inet6_init() exits before ndisc_init() is called which initializes it. If bonding ARP/NS validation is enabled, an IPv6 NS/NA packet received on a slave can reach bond_validate

thehackerwire@mastodon.social at 2026-05-11T18:00:12.000Z ##

🟠 CVE-2026-43441 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled

When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never
initialized because inet6_init() exits befo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:00:12.000Z ##

🟠 CVE-2026-43441 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled

When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never
initialized because inet6_init() exits befo...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43437
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-12T14:10:27.343000

2 posts

In the Linux kernel, the following vulnerability has been resolved: ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain() In the drain loop, the local variable 'runtime' is reassigned to a linked stream's runtime (runtime = s->runtime at line 2157). After releasing the stream lock at line 2169, the code accesses runtime->no_period_wakeup, runtime->rate, and runtime->buffer_s

thehackerwire@mastodon.social at 2026-05-11T17:07:03.000Z ##

🟠 CVE-2026-43437 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain()

In the drain loop, the local variable 'runtime' is reassigned to a
linked stream's runtime (runtime = s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:07:03.000Z ##

🟠 CVE-2026-43437 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: fix use-after-free on linked stream runtime in snd_pcm_drain()

In the drain loop, the local variable 'runtime' is reassigned to a
linked stream's runtime (runtime = s...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43456
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-12T14:10:27.343000

2 posts

In the Linux kernel, the following vulnerability has been resolved: bonding: fix type confusion in bond_setup_by_slave() kernel BUG at net/core/skbuff.c:2306! Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI RIP: 0010:pskb_expand_head+0xa08/0xfe0 net/core/skbuff.c:2306 RSP: 0018:ffffc90004aff760 EFLAGS: 00010293 RAX: 0000000000000000 RBX: ffff88807e3c8780 RCX: ffffffff89593e0e RDX: ffff88807b7c49

thehackerwire@mastodon.social at 2026-05-11T15:59:57.000Z ##

🟠 CVE-2026-43456 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

bonding: fix type confusion in bond_setup_by_slave()

kernel BUG at net/core/skbuff.c:2306!
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
RIP: 0010:pskb_expand_head+0xa08/0xfe0...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T15:59:57.000Z ##

🟠 CVE-2026-43456 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

bonding: fix type confusion in bond_setup_by_slave()

kernel BUG at net/core/skbuff.c:2306!
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
RIP: 0010:pskb_expand_head+0xa08/0xfe0...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43466
(8.2 HIGH)

EPSS: 0.05%

updated 2026-05-12T14:10:27.343000

2 posts

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery In case of a TX error CQE, a recovery flow is triggered, mlx5e_reset_txqsq_cc_pc() resets dma_fifo_cc to 0 but not dma_fifo_pc, desyncing the DMA FIFO producer and consumer. After recovery, the producer pushes new DMA entries at the old dma_fifo_pc, while the consumer read

thehackerwire@mastodon.social at 2026-05-11T15:42:05.000Z ##

🟠 CVE-2026-43466 - High (8.2)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery

In case of a TX error CQE, a recovery flow is triggered,
mlx5e_reset_txqsq_cc_pc() resets dma_fifo_cc to 0 but not dma_fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T15:42:05.000Z ##

🟠 CVE-2026-43466 - High (8.2)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix DMA FIFO desync on error CQE SQ recovery

In case of a TX error CQE, a recovery flow is triggered,
mlx5e_reset_txqsq_cc_pc() resets dma_fifo_cc to 0 but not dma_fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43464
(7.5 HIGH)

EPSS: 0.06%

updated 2026-05-12T14:10:27.343000

2 posts

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix XDP multi-buf frag counting for legacy RQ XDP multi-buf programs can modify the layout of the XDP buffer when the program calls bpf_xdp_pull_data() or bpf_xdp_adjust_tail(). The referenced commit in the fixes tag corrected the assumption in the mlx5 driver that the XDP buffer layout doesn't change during a pro

thehackerwire@mastodon.social at 2026-05-11T12:33:49.000Z ##

🟠 CVE-2026-43464 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: RX, Fix XDP multi-buf frag counting for legacy RQ

XDP multi-buf programs can modify the layout of the XDP buffer when the
program calls bpf_xdp_pull_data() or bpf_xdp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T12:33:49.000Z ##

🟠 CVE-2026-43464 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: RX, Fix XDP multi-buf frag counting for legacy RQ

XDP multi-buf programs can modify the layout of the XDP buffer when the
program calls bpf_xdp_pull_data() or bpf_xdp...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-39432
(8.2 HIGH)

EPSS: 0.03%

updated 2026-05-12T14:03:52.757000

4 posts

Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Timetics: from n/a through 1.0.53.

thehackerwire@mastodon.social at 2026-05-12T17:29:58.000Z ##

🟠 CVE-2026-39432 - High (8.2)

Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.

This issue affects Timetics: from n/a through 1.0.53.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-12T09:00:33.706Z ##

🔍 HIGH severity: CVE-2026-39432 in Arraytics Timetics ≤1.0.53 — Missing authorization (CWE-862) enables potential data exposure. No patch available yet. Restrict access, monitor advisories. radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-12T17:29:58.000Z ##

🟠 CVE-2026-39432 - High (8.2)

Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.

This issue affects Timetics: from n/a through 1.0.53.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-12T09:00:33.000Z ##

🔍 HIGH severity: CVE-2026-39432 in Arraytics Timetics ≤1.0.53 — Missing authorization (CWE-862) enables potential data exposure. No patch available yet. Restrict access, monitor advisories. radar.offseq.com/threat/cve-20 #OffSeq #Cybersecurity #Vuln #CVE202639432

##

CVE-2026-42742
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T14:03:52.757000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through <= 3.4.6.

thehackerwire@mastodon.social at 2026-05-12T11:55:19.000Z ##

🟠 CVE-2026-42742 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through &lt;= 3.4.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:55:19.000Z ##

🟠 CVE-2026-42742 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through &lt;= 3.4.6.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42741
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T14:03:52.757000

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection.This issue affects Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend: from n/a through <= 3.3.2.

thehackerwire@mastodon.social at 2026-05-12T11:55:09.000Z ##

🟠 CVE-2026-42741 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:55:09.000Z ##

🟠 CVE-2026-42741 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection....

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8072(CVSS UNKNOWN)

EPSS: 0.03%

updated 2026-05-12T12:32:23

2 posts

Insecure generation of credentials in the local SAT (Technical Support) access functionality of the Ingecon Sun EMS Board. The vulnerability arose because the secret access credentials were not based on a secure cryptographic scheme, but rather on a weak hashing algorithm, which could allow an attacker to carry out a privilege escalation.

offseq at 2026-05-12T10:30:31.031Z ##

🔴 CVE-2026-8072 (CRITICAL, 9.2): Ingeteam Ingecon Sun EMS Board uses weak hashing for SAT access credentials, risking privilege escalation. No mitigation yet — review access and monitor for updates. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-12T10:30:31.000Z ##

🔴 CVE-2026-8072 (CRITICAL, 9.2): Ingeteam Ingecon Sun EMS Board uses weak hashing for SAT access credentials, risking privilege escalation. No mitigation yet — review access and monitor for updates. radar.offseq.com/threat/cve-20 #OffSeq #ICS #Vulnerability

##

CVE-2026-25787
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-12T12:32:22

2 posts

Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into the product, to inject malicious scripts into the page. If a benign user with appropriate rights accesses the "Motion Control Diagnostics" parameters pag

thehackerwire@mastodon.social at 2026-05-12T15:04:58.000Z ##

🔴 CVE-2026-25787 - Critical (9.1)

Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:04:58.000Z ##

🔴 CVE-2026-25787 - Critical (9.1)

Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33893
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T12:32:22

2 posts

A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.0014), Teamcenter V2406 (All versions < V2406.0012), Teamcenter V2412 (All versions < V2412.0009), Teamcenter V2506 (All versions < V2506.0005), Teamcenter V2512 (All versions). The affected application contains hardcoded key which is used for obfuscation stored directly into the application. This could allow an attacker

thehackerwire@mastodon.social at 2026-05-12T15:01:49.000Z ##

🟠 CVE-2026-33893 - High (7.5)

A vulnerability has been identified in Teamcenter V2312 (All versions &lt; V2312.0014), Teamcenter V2406 (All versions &lt; V2406.0012), Teamcenter V2412 (All versions &lt; V2412.0009), Teamcenter V2506 (All versions &lt; V2506.0005), Teamcenter V...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:01:49.000Z ##

🟠 CVE-2026-33893 - High (7.5)

A vulnerability has been identified in Teamcenter V2312 (All versions &lt; V2312.0014), Teamcenter V2406 (All versions &lt; V2406.0012), Teamcenter V2412 (All versions &lt; V2412.0009), Teamcenter V2506 (All versions &lt; V2506.0005), Teamcenter V...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44411
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-12T12:32:22

2 posts

A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnerability to execute code in the context of the current process.

thehackerwire@mastodon.social at 2026-05-12T13:05:05.000Z ##

🟠 CVE-2026-44411 - High (7.8)

A vulnerability has been identified in Solid Edge SE2026 (All versions &lt; V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T13:05:05.000Z ##

🟠 CVE-2026-44411 - High (7.8)

A vulnerability has been identified in Solid Edge SE2026 (All versions &lt; V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnera...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41551
(9.1 CRITICAL)

EPSS: 0.05%

updated 2026-05-12T12:32:22

2 posts

A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized. This could allow a remote attacker to access arbitrary files on the device.

thehackerwire@mastodon.social at 2026-05-12T13:04:56.000Z ##

🔴 CVE-2026-41551 - Critical (9.1)

A vulnerability has been identified in ROS# (All versions &lt; V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized.
This could allow a remote attacker to access arbitrary files on the dev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T13:04:56.000Z ##

🔴 CVE-2026-41551 - Critical (9.1)

A vulnerability has been identified in ROS# (All versions &lt; V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized.
This could allow a remote attacker to access arbitrary files on the dev...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45214
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

4 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.

thehackerwire@mastodon.social at 2026-05-12T12:07:23.000Z ##

🟠 CVE-2026-45214 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through &lt;= 1.5.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:42.000Z ##

🟠 CVE-2026-45214 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through &lt;= 1.5.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:07:23.000Z ##

🟠 CVE-2026-45214 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through &lt;= 1.5.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:42.000Z ##

🟠 CVE-2026-45214 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through &lt;= 1.5.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45213
(7.6 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

4 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.

thehackerwire@mastodon.social at 2026-05-12T12:07:13.000Z ##

🟠 CVE-2026-45213 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through &lt;= 1.1.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:31.000Z ##

🟠 CVE-2026-45213 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through &lt;= 1.1.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:07:13.000Z ##

🟠 CVE-2026-45213 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through &lt;= 1.1.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:31.000Z ##

🟠 CVE-2026-45213 - High (7.6)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through &lt;= 1.1.7.1.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41713
(8.2 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

2 posts

A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavior across conversation turns.

thehackerwire@mastodon.social at 2026-05-12T11:58:58.000Z ##

🟠 CVE-2026-41713 - High (8.2)

A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:58.000Z ##

🟠 CVE-2026-41713 - High (8.2)

A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45211
(8.5 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a through <= 4.7.1.

thehackerwire@mastodon.social at 2026-05-12T11:58:21.000Z ##

🟠 CVE-2026-45211 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:58:21.000Z ##

🟠 CVE-2026-45211 - High (8.5)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45218
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-12T12:32:22

2 posts

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through <= 11.4.0.

thehackerwire@mastodon.social at 2026-05-12T11:55:00.000Z ##

🟠 CVE-2026-45218 - High (7.7)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through &lt;= 11.4.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T11:55:00.000Z ##

🟠 CVE-2026-45218 - High (7.7)

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through &lt;= 11.4.0.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-40833
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T12:32:21

2 posts

The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.

thehackerwire@mastodon.social at 2026-05-12T17:27:36.000Z ##

🟠 CVE-2025-40833 - High (7.5)

The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:27:36.000Z ##

🟠 CVE-2025-40833 - High (7.5)

The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22925
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-12T12:32:21

2 posts

A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets This could allow an attacker to render the service unavailable and cause denial-of-service conditions by overwhelming system resources.

thehackerwire@mastodon.social at 2026-05-12T15:01:59.000Z ##

🟠 CVE-2026-22925 - High (7.5)

A vulnerability has been identified in SIMATIC CN 4100 (All versions &lt; V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets
This could allow an attacker to render the service un...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:01:59.000Z ##

🟠 CVE-2026-22925 - High (7.5)

A vulnerability has been identified in SIMATIC CN 4100 (All versions &lt; V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets
This could allow an attacker to render the service un...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-22924
(9.1 CRITICAL)

EPSS: 0.04%

updated 2026-05-12T12:32:14

2 posts

A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions. This could allow an attacker to disrupt normal operations or perform unauthorized actions, potentially impacting system availability and integrity.

thehackerwire@mastodon.social at 2026-05-12T17:21:36.000Z ##

🔴 CVE-2026-22924 - Critical (9.1)

A vulnerability has been identified in SIMATIC CN 4100 (All versions &lt; V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.
This could allow an attacker to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:36.000Z ##

🔴 CVE-2026-22924 - Critical (9.1)

A vulnerability has been identified in SIMATIC CN 4100 (All versions &lt; V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.
This could allow an attacker to...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2025-6577
(9.8 CRITICAL)

EPSS: 0.03%

updated 2026-05-12T12:32:14

2 posts

Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection. This issue affects E-Commerce Website: before 4.5.001.

thehackerwire@mastodon.social at 2026-05-12T15:26:26.000Z ##

🔴 CVE-2025-6577 - Critical (9.8)

Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection.

This issue affects E-Commerce Website: before 4.5.001.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:26.000Z ##

🔴 CVE-2025-6577 - Critical (9.8)

Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection.

This issue affects E-Commerce Website: before 4.5.001.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-2993
(7.5 HIGH)

EPSS: 0.10%

updated 2026-05-12T09:31:33

2 posts

The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing SQL query in the getListForTbl() function. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing que

thehackerwire@mastodon.social at 2026-05-12T17:27:46.000Z ##

🟠 CVE-2026-2993 - High (7.5)

The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:27:46.000Z ##

🟠 CVE-2026-2993 - High (7.5)

The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing S...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42882
(9.4 CRITICAL)

EPSS: 0.12%

updated 2026-05-11T20:25:44.450000

2 posts

oxyno-zeta/s3-proxy is an aws s3 proxy written in go. Prior to 5.0.0, s3-proxy contains an authentication bypass caused by inconsistent URL path interpretation between the authentication middleware and the bucket handler. The authentication middleware evaluates resource path patterns against the percent-encoded request URI (r.URL.RequestURI()), while the bucket handler constructs S3 object keys fr

offseq at 2026-05-12T06:00:28.604Z ##

🚨 CVE-2026-42882 (CRITICAL): oxyno-zeta s3-proxy <5.0.0 has a path traversal bug, letting unauthenticated attackers bypass auth to access or modify protected S3 objects. Patch to v5.0.0 now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-12T06:00:28.000Z ##

🚨 CVE-2026-42882 (CRITICAL): oxyno-zeta s3-proxy <5.0.0 has a path traversal bug, letting unauthenticated attackers bypass auth to access or modify protected S3 objects. Patch to v5.0.0 now! radar.offseq.com/threat/cve-20 #OffSeq #CVE202642882 #CloudSecurity #Vuln

##

CVE-2026-42843
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-11T20:25:42.893000

2 posts

Grav API Plugin is a RESTful API for Grav CMS that provides full headless access to your site's content, media, configuration, users, and system management. Prior to 1.0.0-beta.15, an insecure direct object reference and logic flaw in the Grav API plugin (UsersController::update) allows any authenticated user with basic API access (api.access) to modify their own permission configuration. An attac

thehackerwire@mastodon.social at 2026-05-11T17:26:35.000Z ##

🟠 CVE-2026-42843 - High (8.8)

Grav API Plugin is a RESTful API for Grav CMS that provides full headless access to your site's content, media, configuration, users, and system management. Prior to 1.0.0-beta.15, an insecure direct object reference and logic flaw in the Grav API...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:26:35.000Z ##

🟠 CVE-2026-42843 - High (8.8)

Grav API Plugin is a RESTful API for Grav CMS that provides full headless access to your site's content, media, configuration, users, and system management. Prior to 1.0.0-beta.15, an insecure direct object reference and logic flaw in the Grav API...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41431
(8.0 HIGH)

EPSS: 0.04%

updated 2026-05-11T19:16:22.897000

2 posts

Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Application Resource (MAR) updater (org.mozilla.updater) that has had all MAR signature verification stripped from the Firefox codebase it was forked from. The MAR files served to users contain zero cryptographic signatures, and the updater binary contains zero cryptographic verification code. This eliminates the defense

thehackerwire@mastodon.social at 2026-05-11T18:24:15.000Z ##

🟠 CVE-2026-41431 - High (8)

Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Application Resource (MAR) updater (org.mozilla.updater) that has had all MAR signature verification stripped from the Firefox codebase it was forked from. The MAR files...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:24:15.000Z ##

🟠 CVE-2026-41431 - High (8)

Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Application Resource (MAR) updater (org.mozilla.updater) that has had all MAR signature verification stripped from the Firefox codebase it was forked from. The MAR files...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8177
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-11T18:32:45

2 posts

XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences. A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the end of the input string into adjacent heap memory. Any Perl process that passes attacker controlled strings to XML::LibXML's DOM node-name methods can r

thehackerwire@mastodon.social at 2026-05-11T18:24:47.000Z ##

🟠 CVE-2026-8177 - High (7.5)

XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences.

A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:24:47.000Z ##

🟠 CVE-2026-8177 - High (7.5)

XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences.

A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-6433
(7.3 HIGH)

EPSS: 0.03%

updated 2026-05-11T18:32:45

2 posts

The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize user input before using it in a SQL query, and the result is passed to eval(), allowing unauthenticated users to execute arbitrary PHP code on the server.

offseq at 2026-05-11T07:30:30.325Z ##

🚨 CRITICAL: CVE-2026-6433 in Custom css-js-php <=2.0.7 enables unauthenticated PHP code execution via flawed input handling. No patch or exploit in the wild yet. Disable/remove plugin now. radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-11T07:30:30.000Z ##

🚨 CRITICAL: CVE-2026-6433 in Custom css-js-php <=2.0.7 enables unauthenticated PHP code execution via flawed input handling. No patch or exploit in the wild yet. Disable/remove plugin now. radar.offseq.com/threat/cve-20 #OffSeq #WordPress #vuln #WebSecurity

##

CVE-2026-44413
(8.2 HIGH)

EPSS: 0.00%

updated 2026-05-11T18:31:59

3 posts

In JetBrains TeamCity before 2026.1 2025.11.5 authenticated users could expose server API to unauthorised access

netsecio@mastodon.social at 2026-05-12T16:44:10.000Z ##

📰 High-Severity Flaw in JetBrains TeamCity On-Premises Allows API Exposure (CVE-2026-44413)

PATCH NOW: A high-severity vulnerability (CVE-2026-44413) in JetBrains TeamCity On-Premises allows any authenticated user to expose server APIs. All versions up to 2025.11.4 are affected. Upgrade to 2026.1 immediately. 💻🔧 #TeamCity #JetBrains #CI/CD

🔗 cyber.netsecops.io

##

thehackerwire@mastodon.social at 2026-05-11T18:21:57.000Z ##

🟠 CVE-2026-44413 - High (8.2)

In JetBrains TeamCity before 2026.1
2025.11.5 authenticated users could expose server API to unauthorised access

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:21:57.000Z ##

🟠 CVE-2026-44413 - High (8.2)

In JetBrains TeamCity before 2026.1
2025.11.5 authenticated users could expose server API to unauthorised access

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43639
(8.0 HIGH)

EPSS: 0.05%

updated 2026-05-11T18:31:59

2 posts

Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of the target organization; self-hosted installations are unaffected as this endpoint is restricted to Cloud via SelfHosted(NotSelfHostedOnly = true).

thehackerwire@mastodon.social at 2026-05-11T18:23:55.000Z ##

🟠 CVE-2026-43639 - High (8)

Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:23:55.000Z ##

🟠 CVE-2026-43639 - High (8)

Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-45004
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T18:31:59

2 posts

OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript under the current user account by placing a malicious extensions/<plugin>/setup-api.js file in a repository and convincing a user to run OpenClaw commands fr

thehackerwire@mastodon.social at 2026-05-11T18:21:35.000Z ##

🟠 CVE-2026-45004 - High (7.8)

OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript unde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:21:35.000Z ##

🟠 CVE-2026-45004 - High (7.8)

OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript unde...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33357
(7.5 HIGH)

EPSS: 0.03%

updated 2026-05-11T18:31:55

4 posts

In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label <= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP data for arbitrary devices. The root cause is a server-side authorization failure in "GET /openapi/device/status".

thehackerwire@mastodon.social at 2026-05-11T17:39:18.000Z ##

🟠 CVE-2026-33357 - High (7.5)

In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label &lt;= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:28:01.000Z ##

🟠 CVE-2026-33357 - High (7.5)

In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label &lt;= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:39:18.000Z ##

🟠 CVE-2026-33357 - High (7.5)

In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label &lt;= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:28:01.000Z ##

🟠 CVE-2026-33357 - High (7.5)

In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label &lt;= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33356
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-11T18:31:55

4 posts

In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but does not enforce equivalent subscribe authorization at per-device scope.

thehackerwire@mastodon.social at 2026-05-11T17:39:08.000Z ##

🟠 CVE-2026-33356 - High (7.7)

In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but doe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:27:51.000Z ##

🟠 CVE-2026-33356 - High (7.7)

In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but doe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:39:08.000Z ##

🟠 CVE-2026-33356 - High (7.7)

In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but doe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:27:51.000Z ##

🟠 CVE-2026-33356 - High (7.7)

In Meari IoT Cloud MQTT Broker deployments running EMQX 4.x, any authenticated low-privilege account can subscribe to global wildcard topics and receive telemetry from devices the user does not own. The broker enforces publish restrictions but doe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33362
(8.6 HIGH)

EPSS: 0.03%

updated 2026-05-11T18:31:55

2 posts

In Meari IoT SDK builds embedded in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and white-label Android apps <= 1.8.x (latest observed), multiple security-critical secrets are hardcoded and shared, including API signing material, password-transport keying, and service access keys.

thehackerwire@mastodon.social at 2026-05-11T17:27:42.000Z ##

🟠 CVE-2026-33362 - High (8.6)

In Meari IoT SDK builds embedded in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and white-label Android apps &lt;= 1.8.x (latest observed), multiple security-critical secrets are hardcoded and shared, including API signing material, pas...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:27:42.000Z ##

🟠 CVE-2026-33362 - High (8.6)

In Meari IoT SDK builds embedded in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and white-label Android apps &lt;= 1.8.x (latest observed), multiple security-critical secrets are hardcoded and shared, including API signing material, pas...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33361
(7.5 HIGH)

EPSS: 0.02%

updated 2026-05-11T18:31:54

2 posts

In Meari IoT SDK image handling (libmrplayer.so) as observed in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and related white-label apps (<= 1.8.x), baby monitor ".jpgx3" files use reversible XOR over only the first 1024 bytes with a predictable key derivation model.

thehackerwire@mastodon.social at 2026-05-11T17:28:13.000Z ##

🟠 CVE-2026-33361 - High (7.5)

In Meari IoT SDK image handling (libmrplayer.so) as observed in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and related white-label apps (&lt;= 1.8.x), baby monitor &quot;.jpgx3&quot; files use reversible XOR over only the first 1024 by...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:28:13.000Z ##

🟠 CVE-2026-33361 - High (7.5)

In Meari IoT SDK image handling (libmrplayer.so) as observed in CloudEdge 5.5.0 (build 220), Arenti 1.8.1 (build 220), and related white-label apps (&lt;= 1.8.x), baby monitor &quot;.jpgx3&quot; files use reversible XOR over only the first 1024 by...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-33359
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-11T18:31:54

2 posts

In Meari IoT Cloud alert image storage on Alibaba OSS (latest observed; storage service version not disclosed), motion snapshots are retrievable without authentication, signed URLs, or expiry enforcement. URLs function as direct object references and remain valid beyond expected operational windows.

thehackerwire@mastodon.social at 2026-05-11T17:28:04.000Z ##

🟠 CVE-2026-33359 - High (7.5)

In Meari IoT Cloud alert image storage on Alibaba OSS (latest observed; storage service version not disclosed), motion snapshots are retrievable without authentication, signed URLs, or expiry enforcement. URLs function as direct object references ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:28:04.000Z ##

🟠 CVE-2026-33359 - High (7.5)

In Meari IoT Cloud alert image storage on Alibaba OSS (latest observed; storage service version not disclosed), motion snapshots are retrievable without authentication, signed URLs, or expiry enforcement. URLs function as direct object references ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7815
(8.8 HIGH)

EPSS: 0.05%

updated 2026-05-11T18:31:54

2 posts

SQL injection vulnerability in pgAdmin 4 Maintenance Tool. Four user-supplied JSON fields (buffer_usage_limit, vacuum_parallel, vacuum_index_cleanup, reindex_tablespace) were concatenated directly into the rendered VACUUM/ANALYZE/REINDEX command and passed to psql --command. An authenticated user with the tools_maintenance permission could break out of the option syntax and execute arbitrary SQL

thehackerwire@mastodon.social at 2026-05-11T16:58:36.000Z ##

🟠 CVE-2026-7815 - High (8.8)

SQL injection vulnerability in pgAdmin 4 Maintenance Tool.

Four user-supplied JSON fields (buffer_usage_limit, vacuum_parallel, vacuum_index_cleanup, reindex_tablespace) were concatenated directly into the rendered VACUUM/ANALYZE/REINDEX command ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T16:58:36.000Z ##

🟠 CVE-2026-7815 - High (8.8)

SQL injection vulnerability in pgAdmin 4 Maintenance Tool.

Four user-supplied JSON fields (buffer_usage_limit, vacuum_parallel, vacuum_index_cleanup, reindex_tablespace) were concatenated directly into the rendered VACUUM/ANALYZE/REINDEX command ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7813
(9.9 CRITICAL)

EPSS: 0.06%

updated 2026-05-11T18:31:54

2 posts

Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Servers, Shared Servers, Background Processes, and Debugger modules. Multiple endpoints fetched user-owned objects without filtering by the requesting user's identity. An authenticated user could access another user's private servers, server groups, background processes, and debugger function arguments by guessing objec

thehackerwire@mastodon.social at 2026-05-11T16:35:02.000Z ##

🔴 CVE-2026-7813 - Critical (9.9)

Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Servers, Shared Servers, Background Processes, and Debugger modules.

Multiple endpoints fetched user-owned objects without filtering by the requesting user's identity. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T16:35:02.000Z ##

🔴 CVE-2026-7813 - Critical (9.9)

Authorization vulnerability in pgAdmin 4 server mode affecting Server Groups, Servers, Shared Servers, Background Processes, and Debugger modules.

Multiple endpoints fetched user-owned objects without filtering by the requesting user's identity. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7819
(8.1 HIGH)

EPSS: 0.04%

updated 2026-05-11T18:31:54

2 posts

Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager. check_access_permission used os.path.abspath, which resolves '..' but does not resolve symbolic links, while the subsequent kernel write follows symlinks. An authenticated user could plant a symbolic link inside their own storage directory pointing outside it and induce pgAdmin to write to any path reachable by the pgAdmin p

thehackerwire@mastodon.social at 2026-05-11T16:34:42.000Z ##

🟠 CVE-2026-7819 - High (8.1)

Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager.

check_access_permission used os.path.abspath, which resolves '..' but does not resolve symbolic links, while the subsequent kernel write follows symlinks. An authenticated u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T16:34:42.000Z ##

🟠 CVE-2026-7819 - High (8.1)

Symbolic-link path traversal (CWE-61, CWE-22) in pgAdmin 4 File Manager.

check_access_permission used os.path.abspath, which resolves '..' but does not resolve symbolic links, while the subsequent kernel write follows symlinks. An authenticated u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43640
(8.1 HIGH)

EPSS: 0.06%

updated 2026-05-11T18:16:37.110000

2 posts

Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid session.

thehackerwire@mastodon.social at 2026-05-11T18:17:24.000Z ##

🟠 CVE-2026-43640 - High (8.1)

Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:17:24.000Z ##

🟠 CVE-2026-43640 - High (8.1)

Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42603
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-11T18:16:35.887000

2 posts

OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Prior to 2.1.2, .github/workflows/pre-commit-fix.yaml uses pull_request_target (privileged trigger) but checks out and executes code directly from the attacker's fork, enabling RCE with write permissions. This vulnerability is fixed in 2.1.2.

thehackerwire@mastodon.social at 2026-05-11T17:26:54.000Z ##

🟠 CVE-2026-42603 - High (8.8)

OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Prior to 2.1.2, .github/workflows/pre-commit-fix.yaml uses pull_request_target (privileged trigger) but checks out and exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:26:54.000Z ##

🟠 CVE-2026-42603 - High (8.8)

OWASP BLT is a QA testing and vulnerability disclosure platform that encompasses websites, apps, git repositories, and more. Prior to 2.1.2, .github/workflows/pre-commit-fix.yaml uses pull_request_target (privileged trigger) but checks out and exe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7816
(8.8 HIGH)

EPSS: 0.19%

updated 2026-05-11T17:16:35

2 posts

OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query export. User-supplied input was interpolated directly into a psql \copy metacommand template without sanitization. An authenticated user could inject ") TO PROGRAM 'cmd'" to break out of the \copy (...) context and achieve arbitrary command execution on the pgAdmin server, or ") TO '/path'" for arbitrary file write. Addi

thehackerwire@mastodon.social at 2026-05-11T16:34:53.000Z ##

🟠 CVE-2026-7816 - High (8.8)

OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query export.

User-supplied input was interpolated directly into a psql \copy metacommand template without sanitization. An authenticated user could inject ") TO PROGRAM 'cmd'...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T16:34:53.000Z ##

🟠 CVE-2026-7816 - High (8.8)

OS command injection (CWE-78) vulnerability in pgAdmin 4 Import/Export query export.

User-supplied input was interpolated directly into a psql \copy metacommand template without sanitization. An authenticated user could inject ") TO PROGRAM 'cmd'...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-44738
(7.7 HIGH)

EPSS: 0.03%

updated 2026-05-11T17:16:34.747000

2 posts

Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-list permits any user with the admin.pages role to call config.toArray() from within a page body, dumping the entire merged site configuration — including all plugin secrets (SMTP passwords, AWS keys, OAuth client secrets, API tokens) — into the rendered HTML. No administrator privileges are required. This vulnerability

thehackerwire@mastodon.social at 2026-05-11T17:26:44.000Z ##

🟠 CVE-2026-44738 - High (7.7)

Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-list permits any user with the admin.pages role to call config.toArray() from within a page body, dumping the entire merged site configuration — including all plugin ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:26:44.000Z ##

🟠 CVE-2026-44738 - High (7.7)

Grav is a file-based Web platform. Prior to 2.0.0-rc.2, the Twig sandbox allow-list permits any user with the admin.pages role to call config.toArray() from within a page body, dumping the entire merged site configuration — including all plugin ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43500
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T17:16:34.290000

13 posts

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-o

13 repos

https://github.com/XRSecCD/202605_dirty_frag

https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4

https://github.com/vorkampfer/dirty_frag_mitigation

https://github.com/linnemanlabs/dirtyfrag-arm64

https://github.com/metalx1993/dirtyfrag-patches

https://github.com/haydenjames/dirty-frag-check

https://github.com/krisiasty/vcheck

https://github.com/liamromanis101/DirtyFrag-Detector

https://github.com/attaattaatta/CVE-2026-43500

https://github.com/0xlane/pagecache-guard

https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan

https://github.com/KaraZajac/DIRTYFAIL

https://github.com/AK777177/Dirty-Frag-Analysis

lobsters@mastodon.social at 2026-05-12T21:15:09.000Z ##

Load-Bearing Assumptions: the rxrpc case (CVE-2026-43500) and the constraint that was never there lobste.rs/s/tuiapt #linux #security
linkedin.com/pulse/load-bearin

##

knoppix95@mastodon.social at 2026-05-12T20:52:59.000Z ##

Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧

🔗 itsfoss.com/news/linux-fully-p

#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech

##

mora@mastodon.uno at 2026-05-12T05:52:33.000Z ##

Dirty Frag: Linux Kernel Local Privilege Escalation via ESP and RxRPC
Unpatched kernel flaw chain (CVE-2026-43284, CVE-2026-43500) enables root escalation on major Linux distributions.

wiz.io/blog/dirty-frag-linux-k

##

thehackerwire@mastodon.social at 2026-05-11T12:28:13.000Z ##

🟠 CVE-2026-43500 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present

The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE
handler in rxrpc_verify_response() co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ruari@velocipederider.com at 2026-05-11T07:43:32.000Z ##

I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.

Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).

I hope things calm down a bit now but I guess we shall see…

##

lobsters@mastodon.social at 2026-05-12T21:15:09.000Z ##

Load-Bearing Assumptions: the rxrpc case (CVE-2026-43500) and the constraint that was never there lobste.rs/s/tuiapt #linux #security
linkedin.com/pulse/load-bearin

##

knoppix95@mastodon.social at 2026-05-12T20:52:59.000Z ##

Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧

🔗 itsfoss.com/news/linux-fully-p

#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech

##

linux@activitypub.awakari.com at 2026-05-08T16:58:20.000Z ## Dirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chain Weeks after the Copy Fail vulnerability was revealed, a new ...


Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-11T13:35:31.000Z ## Two stable kernels with Dirty Frag fixes Greg Kroah-Hartman has released the 7.0.6 and 6.18.29 stable kernels with Hyunwoo Kim's patch for the second vulnerability ( CVE-2026-43500 ) reported w...


Origin | Interest | Match ##

thehackerwire@mastodon.social at 2026-05-11T12:28:13.000Z ##

🟠 CVE-2026-43500 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present

The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE
handler in rxrpc_verify_response() co...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

ruari@velocipederider.com at 2026-05-11T07:43:32.000Z ##

I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.

Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).

I hope things calm down a bit now but I guess we shall see…

##

linux@activitypub.awakari.com at 2026-05-07T21:19:23.000Z ## Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privil...

#KernelCare #CVE #Vulnerability #Kernel #Update #AlmaLinux #CloudLinux

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-08T16:58:20.000Z ## Dirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chain Weeks after the Copy Fail vulnerability was revealed, a new ...


Origin | Interest | Match ##

CVE-2026-4802
(8.0 HIGH)

EPSS: 0.19%

updated 2026-05-11T15:32:12

2 posts

A flaw was found in Cockpit. This vulnerability allows a remote attacker to achieve arbitrary command execution on the host by exploiting unsanitized user-controlled parameters within crafted links in the system logs user interface (UI). An attacker can inject shell metacharacters and command substitutions into these parameters, leading to the execution of arbitrary shell commands on the affected

thehackerwire@mastodon.social at 2026-05-11T14:59:50.000Z ##

🟠 CVE-2026-4802 - High (8)

A flaw was found in Cockpit. This vulnerability allows a remote attacker to achieve arbitrary command execution on the host by exploiting unsanitized user-controlled parameters within crafted links in the system logs user interface (UI). An attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T14:59:50.000Z ##

🟠 CVE-2026-4802 - High (8)

A flaw was found in Cockpit. This vulnerability allows a remote attacker to achieve arbitrary command execution on the host by exploiting unsanitized user-controlled parameters within crafted links in the system logs user interface (UI). An attack...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-8253
(2.4 LOW)

EPSS: 0.03%

updated 2026-05-11T15:08:09.893000

1 posts

A vulnerability was identified in Devs Palace ERP Online up to 4.0.0. Affected by this vulnerability is an unknown functionality of the file /inventory/purchase_save. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

offseq@infosec.exchange at 2026-05-11T00:00:38.000Z ##

⚠️ CVE-2026-8253: MEDIUM severity XSS in Devs Palace ERP Online v4.0.0 via /inventory/purchase_save. No patch; vendor unresponsive. Apply WAF rules & restrict access. Details: radar.offseq.com/threat/cve-20 #OffSeq #XSS #ERP #Vuln

##

CVE-2026-40281
(10.0 CRITICAL)

EPSS: 0.09%

updated 2026-05-11T14:46:07.127000

1 posts

Gotenberg is a Docker-powered stateless API for PDF files. In versions 8.30.1 and earlier, the metadata write endpoint validates metadata keys for control characters but leaves metadata values unsanitized. A newline character in a metadata value splits the ExifTool stdin line into two separate arguments, allowing injection of arbitrary ExifTool pseudo-tags such as -FileName, -Directory, -SymLink,

1 repos

https://github.com/ByteWraith1/CVE-2026-40281

Matchbook3469@mastodon.social at 2026-05-11T17:55:33.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-05-04 to 2026-05-10

Roundup | CRITICAL
CVEs: CVE-2026-0300, CVE-2026-33587, CVE-2026-40281

Cybersecurity roundup for 2026-05-04 to 2026-05-10. 10 CVE advisories, 5 breach reports, 4 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#InfoSec #ZeroDay #SecurityOps

##

CVE-2026-40636
(9.8 CRITICAL)

EPSS: 0.07%

updated 2026-05-11T12:32:39

4 posts

Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains a use of hard-coded credentials vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to filesystem access for attacker.

thehackerwire@mastodon.social at 2026-05-11T12:28:02.000Z ##

🔴 CVE-2026-40636 - Critical (9.8)

Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains a use of hard-coded credentials vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq at 2026-05-11T10:30:28.943Z ##

🚨 CRITICAL: CVE-2026-40636 in Dell ECS & ObjectScale (CVSS 9.8) exposes systems via hard-coded credentials. Local attackers may gain full access. Restrict local access & monitor logs. Await vendor patch. Details: radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-11T12:28:02.000Z ##

🔴 CVE-2026-40636 - Critical (9.8)

Dell ECS versions 3.8.1.0 through 3.8.1.7 and Dell ObjectScale versions prior to 4.3.0.0, contains a use of hard-coded credentials vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-11T10:30:28.000Z ##

🚨 CRITICAL: CVE-2026-40636 in Dell ECS & ObjectScale (CVSS 9.8) exposes systems via hard-coded credentials. Local attackers may gain full access. Restrict local access & monitor logs. Await vendor patch. Details: radar.offseq.com/threat/cve-20 #OffSeq #Dell #Vuln #InfoSec

##

CVE-2025-10470
(8.6 HIGH)

EPSS: 0.05%

updated 2026-05-11T12:32:39

2 posts

The Magic Link authentication flow accepts multiple invalid authentication requests without adequate rate limiting or resource control, leading to uncontrolled memory usage growth. This vulnerability can result in a denial-of-service condition, causing service unavailability for deployments that utilize the Magic Link authenticator. The impact is limited to these specific deployments and requires

thehackerwire@mastodon.social at 2026-05-11T12:27:52.000Z ##

🟠 CVE-2025-10470 - High (8.6)

The Magic Link authentication flow accepts multiple invalid authentication requests without adequate rate limiting or resource control, leading to uncontrolled memory usage growth.

This vulnerability can result in a denial-of-service condition, c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T12:27:52.000Z ##

🟠 CVE-2025-10470 - High (8.6)

The Magic Link authentication flow accepts multiple invalid authentication requests without adequate rate limiting or resource control, leading to uncontrolled memory usage growth.

This vulnerability can result in a denial-of-service condition, c...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43438
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T09:31:35

2 posts

In the Linux kernel, the following vulnerability has been resolved: sched_ext: Remove redundant css_put() in scx_cgroup_init() The iterator css_for_each_descendant_pre() walks the cgroup hierarchy under cgroup_lock(). It does not increment the reference counts on yielded css structs. According to the cgroup documentation, css_put() should only be used to release a reference obtained via css_get

thehackerwire@mastodon.social at 2026-05-11T17:07:13.000Z ##

🟠 CVE-2026-43438 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Remove redundant css_put() in scx_cgroup_init()

The iterator css_for_each_descendant_pre() walks the cgroup hierarchy
under cgroup_lock(). It does not increment the r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:07:13.000Z ##

🟠 CVE-2026-43438 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Remove redundant css_put() in scx_cgroup_init()

The iterator css_for_each_descendant_pre() walks the cgroup hierarchy
under cgroup_lock(). It does not increment the r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43452
(8.2 HIGH)

EPSS: 0.05%

updated 2026-05-11T09:31:35

2 posts

In the Linux kernel, the following vulnerability has been resolved: netfilter: x_tables: guard option walkers against 1-byte tail reads When the last byte of options is a non-single-byte option kind, walkers that advance with i += op[i + 1] ? : 1 can read op[i + 1] past the end of the option area. Add an explicit i == optlen - 1 check before dereferencing op[i + 1] in xt_tcpudp and xt_dccp opti

thehackerwire@mastodon.social at 2026-05-11T17:06:54.000Z ##

🟠 CVE-2026-43452 - High (8.2)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: x_tables: guard option walkers against 1-byte tail reads

When the last byte of options is a non-single-byte option kind, walkers
that advance with i += op[i + 1] ? : ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:06:54.000Z ##

🟠 CVE-2026-43452 - High (8.2)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: x_tables: guard option walkers against 1-byte tail reads

When the last byte of options is a non-single-byte option kind, walkers
that advance with i += op[i + 1] ? : ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43447
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T09:31:35

2 posts

In the Linux kernel, the following vulnerability has been resolved: iavf: fix PTP use-after-free during reset Commit 7c01dbfc8a1c5f ("iavf: periodically cache PHC time") introduced a worker to cache PHC time, but failed to stop it during reset or disable. This creates a race condition where `iavf_reset_task()` or `iavf_disable_vf()` free adapter resources (AQ) while the worker is still running.

thehackerwire@mastodon.social at 2026-05-11T16:00:15.000Z ##

🟠 CVE-2026-43447 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

iavf: fix PTP use-after-free during reset

Commit 7c01dbfc8a1c5f ("iavf: periodically cache PHC time") introduced a
worker to cache PHC time, but failed to stop it during reset o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T16:00:15.000Z ##

🟠 CVE-2026-43447 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

iavf: fix PTP use-after-free during reset

Commit 7c01dbfc8a1c5f ("iavf: periodically cache PHC time") introduced a
worker to cache PHC time, but failed to stop it during reset o...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43461
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T09:31:35

2 posts

In the Linux kernel, the following vulnerability has been resolved: spi: amlogic: spifc-a4: Fix DMA mapping error handling Fix three bugs in aml_sfc_dma_buffer_setup() error paths: 1. Unnecessary goto: When the first DMA mapping (sfc->daddr) fails, nothing needs cleanup. Use direct return instead of goto. 2. Double-unmap bug: When info DMA mapping failed, the code would unmap sfc->daddr in

thehackerwire@mastodon.social at 2026-05-11T16:00:06.000Z ##

🟠 CVE-2026-43461 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

spi: amlogic: spifc-a4: Fix DMA mapping error handling

Fix three bugs in aml_sfc_dma_buffer_setup() error paths:
1. Unnecessary goto: When the first DMA mapping (sfc->daddr) fai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T16:00:06.000Z ##

🟠 CVE-2026-43461 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

spi: amlogic: spifc-a4: Fix DMA mapping error handling

Fix three bugs in aml_sfc_dma_buffer_setup() error paths:
1. Unnecessary goto: When the first DMA mapping (sfc->daddr) fai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43462
(7.5 HIGH)

EPSS: 0.04%

updated 2026-05-11T09:31:35

2 posts

In the Linux kernel, the following vulnerability has been resolved: net: spacemit: Fix error handling in emac_tx_mem_map() The DMA mappings were leaked on mapping error. Free them with the existing emac_free_tx_buf() function.

thehackerwire@mastodon.social at 2026-05-11T12:33:39.000Z ##

🟠 CVE-2026-43462 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

net: spacemit: Fix error handling in emac_tx_mem_map()

The DMA mappings were leaked on mapping error. Free them with the
existing emac_free_tx_buf() function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T12:33:39.000Z ##

🟠 CVE-2026-43462 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

net: spacemit: Fix error handling in emac_tx_mem_map()

The DMA mappings were leaked on mapping error. Free them with the
existing emac_free_tx_buf() function.

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43434
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T09:31:34

2 posts

In the Linux kernel, the following vulnerability has been resolved: rust_binder: check ownership before using vma When installing missing pages (or zapping them), Rust Binder will look up the vma in the mm by address, and then call vm_insert_page (or zap_page_range_single). However, if the vma is closed and replaced with a different vma at the same address, this can lead to Rust Binder installin

thehackerwire@mastodon.social at 2026-05-11T18:00:36.000Z ##

🟠 CVE-2026-43434 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

rust_binder: check ownership before using vma

When installing missing pages (or zapping them), Rust Binder will look
up the vma in the mm by address, and then call vm_insert_pag...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:00:36.000Z ##

🟠 CVE-2026-43434 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

rust_binder: check ownership before using vma

When installing missing pages (or zapping them), Rust Binder will look
up the vma in the mm by address, and then call vm_insert_pag...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43433
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T09:31:34

2 posts

In the Linux kernel, the following vulnerability has been resolved: rust_binder: avoid reading the written value in offsets array When sending a transaction, its offsets array is first copied into the target proc's vma, and then the values are read back from there. This is normally fine because the vma is a read-only mapping, so the target process cannot change the value under us. However, if t

thehackerwire@mastodon.social at 2026-05-11T18:00:23.000Z ##

🟠 CVE-2026-43433 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

rust_binder: avoid reading the written value in offsets array

When sending a transaction, its offsets array is first copied into the
target proc's vma, and then the values are r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:00:23.000Z ##

🟠 CVE-2026-43433 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

rust_binder: avoid reading the written value in offsets array

When sending a transaction, its offsets array is first copied into the
target proc's vma, and then the values are r...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43454
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-11T09:31:34

2 posts

In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: Fix for duplicate device in netdev hooks When handling NETDEV_REGISTER notification, duplicate device registration must be avoided since the device may have been added by nft_netdev_hook_alloc() already when creating the hook.

thehackerwire@mastodon.social at 2026-05-11T15:42:24.000Z ##

🟠 CVE-2026-43454 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix for duplicate device in netdev hooks

When handling NETDEV_REGISTER notification, duplicate device
registration must be avoided since the device may hav...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T15:42:24.000Z ##

🟠 CVE-2026-43454 - High (7.8)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: Fix for duplicate device in netdev hooks

When handling NETDEV_REGISTER notification, duplicate device
registration must be avoided since the device may hav...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43469
(7.5 HIGH)

EPSS: 0.05%

updated 2026-05-11T09:31:34

2 posts

In the Linux kernel, the following vulnerability has been resolved: xprtrdma: Decrement re_receiving on the early exit paths In the event that rpcrdma_post_recvs() fails to create a work request (due to memory allocation failure, say) or otherwise exits early, we should decrement ep->re_receiving before returning. Otherwise we will hang in rpcrdma_xprt_drain() as re_receiving will never reach ze

thehackerwire@mastodon.social at 2026-05-11T15:42:14.000Z ##

🟠 CVE-2026-43469 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

xprtrdma: Decrement re_receiving on the early exit paths

In the event that rpcrdma_post_recvs() fails to create a work request
(due to memory allocation failure, say) or otherwi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T15:42:14.000Z ##

🟠 CVE-2026-43469 - High (7.5)

In the Linux kernel, the following vulnerability has been resolved:

xprtrdma: Decrement re_receiving on the early exit paths

In the event that rpcrdma_post_recvs() fails to create a work request
(due to memory allocation failure, say) or otherwi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43465
(9.8 CRITICAL)

EPSS: 0.06%

updated 2026-05-11T09:31:34

2 posts

In the Linux kernel, the following vulnerability has been resolved: net/mlx5e: RX, Fix XDP multi-buf frag counting for striding RQ XDP multi-buf programs can modify the layout of the XDP buffer when the program calls bpf_xdp_pull_data() or bpf_xdp_adjust_tail(). The referenced commit in the fixes tag corrected the assumption in the mlx5 driver that the XDP buffer layout doesn't change during a p

thehackerwire@mastodon.social at 2026-05-11T12:33:59.000Z ##

🔴 CVE-2026-43465 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: RX, Fix XDP multi-buf frag counting for striding RQ

XDP multi-buf programs can modify the layout of the XDP buffer when the
program calls bpf_xdp_pull_data() or bpf_x...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T12:33:59.000Z ##

🔴 CVE-2026-43465 - Critical (9.8)

In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: RX, Fix XDP multi-buf frag counting for striding RQ

XDP multi-buf programs can modify the layout of the XDP buffer when the
program calls bpf_xdp_pull_data() or bpf_x...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

mora@mastodon.uno at 2026-05-12T05:52:33.000Z ##

Dirty Frag: Linux Kernel Local Privilege Escalation via ESP and RxRPC
Unpatched kernel flaw chain (CVE-2026-43284, CVE-2026-43500) enables root escalation on major Linux distributions.

wiz.io/blog/dirty-frag-linux-k

##

ruari@velocipederider.com at 2026-05-11T07:43:32.000Z ##

I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.

Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).

I hope things calm down a bit now but I guess we shall see…

##

linux@activitypub.awakari.com at 2026-05-08T16:58:20.000Z ## Dirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chain Weeks after the Copy Fail vulnerability was revealed, a new ...


Origin | Interest | Match ##

ruari@velocipederider.com at 2026-05-11T07:43:32.000Z ##

I upgraded my kernel for Copy Fail (CVE-2026-31431) not that long ago.

Now I am upgrading again for Dirty Frag (CVE-2026-43284 and CVE-2026-43500).

I hope things calm down a bit now but I guess we shall see…

##

linux@activitypub.awakari.com at 2026-05-07T21:19:23.000Z ## Dirty Frag (CVE-2026-43284, CVE-2026-43500): Mitigation and Kernel Update on CloudLinux A week after Copy Fail (CVE-2026-31431), researcher Hyunwoo Kim disclosed a second Linux kernel local privil...

#KernelCare #CVE #Vulnerability #Kernel #Update #AlmaLinux #CloudLinux

Origin | Interest | Match ##

linux@activitypub.awakari.com at 2026-05-08T16:58:20.000Z ## Dirty Frag (CVE-2026-43284, CVE-2026-43500): Frequently asked questions about this Linux kernel privilege escalation vulnerability chain Weeks after the Copy Fail vulnerability was revealed, a new ...


Origin | Interest | Match ##

CVE-2026-8274
(5.3 MEDIUM)

EPSS: 0.01%

updated 2026-05-11T05:16:16.580000

2 posts

A security vulnerability has been detected in npitre cramfs-tools up to 2.1. Affected is the function do_directory of the file cramfsck.c of the component Directory Handler. Such manipulation leads to path traversal. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used. Upgrading to version 2.2 is able to address this issue. The name of

offseq at 2026-05-11T06:00:29.853Z ##

MEDIUM severity: CVE-2026-8274 in npitre cramfs-tools (v2.0/2.1) enables local path traversal via cramfsck.c. Exploitation requires local access, no interaction. Patch in v2.2. Upgrade now! radar.offseq.com/threat/cve-20

##

offseq@infosec.exchange at 2026-05-11T06:00:29.000Z ##

MEDIUM severity: CVE-2026-8274 in npitre cramfs-tools (v2.0/2.1) enables local path traversal via cramfsck.c. Exploitation requires local access, no interaction. Patch in v2.2. Upgrade now! radar.offseq.com/threat/cve-20 #OffSeq #Vulnerability #Linux #Security

##

CVE-2026-8260
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-11T03:31:32

3 posts

A vulnerability was found in D-Link DCS-935L up to 1.10.01. The impacted element is the function SetDeviceSettings of the file /web/cgi-bin/hnap/hnap_service of the component HNAP Service. The manipulation of the argument AdminPassword results in buffer overflow. The attack can be executed remotely. The exploit has been made public and could be used.

1 repos

https://github.com/CryptReaper12/CVE-2026-8260

thehackerwire@mastodon.social at 2026-05-11T02:50:52.000Z ##

🟠 CVE-2026-8260 - High (8.8)

A vulnerability was found in D-Link DCS-935L up to 1.10.01. The impacted element is the function SetDeviceSettings of the file /web/cgi-bin/hnap/hnap_service of the component HNAP Service. The manipulation of the argument AdminPassword results in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T02:50:52.000Z ##

🟠 CVE-2026-8260 - High (8.8)

A vulnerability was found in D-Link DCS-935L up to 1.10.01. The impacted element is the function SetDeviceSettings of the file /web/cgi-bin/hnap/hnap_service of the component HNAP Service. The manipulation of the argument AdminPassword results in ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-11T01:30:27.000Z ##

🔎 HIGH severity: D-Link DCS-935L (≤1.10.01) is affected by CVE-2026-8260 — remote buffer overflow in HNAP Service via AdminPassword. Public exploit available. Urgent: segment/monitor impacted devices. radar.offseq.com/threat/cve-20 #OffSeq #DLink #Vuln #Cybersecurity

##

CVE-2021-47930
(8.2 HIGH)

EPSS: 0.04%

updated 2026-05-10T15:31:26

1 posts

Balbooa Joomla Forms Builder 2.0.6 contains an unauthenticated SQL injection vulnerability in the form submission handler that allows remote attackers to execute arbitrary SQL queries. Attackers can send POST requests to the com_baforms component with malicious JSON payloads in the 'id' field parameter to extract sensitive database information.

Matchbook3469@mastodon.social at 2026-05-11T23:32:25.000Z ##

🟠 New security advisory:

CVE-2021-47930 affects multiple systems.

• Impact: Significant security breach potential
• Risk: Unauthorized access or data exposure
• Mitigation: Apply patches within 24-48 hours

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #VulnerabilityManagement #CyberSec

##

CVE-2021-47932
(9.8 CRITICAL)

EPSS: 0.08%

updated 2026-05-10T15:31:19

1 posts

WordPress TheCartPress 1.5.3.6 contains an unauthenticated privilege escalation vulnerability that allows attackers to create administrator accounts by submitting crafted requests to the AJAX handler. Attackers can send POST requests to the tcp_register_and_login_ajax action with tcp_role set to administrator to gain full administrative access without authentication.

Matchbook3469@mastodon.social at 2026-05-11T17:10:23.000Z ##

🔴 New security advisory:

CVE-2021-47932 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #VulnerabilityManagement #CyberSec

##

CVE-2021-47936
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-05-10T15:31:19

1 posts

OpenCATS 0.9.4 contains a remote code execution vulnerability that allows unauthenticated attackers to execute arbitrary commands by uploading malicious PHP files disguised as resume attachments. Attackers can upload PHP payloads through the careers job application endpoint and execute system commands via POST requests to the uploaded file in the upload directory.

Matchbook3469@mastodon.social at 2026-05-11T10:39:12.000Z ##

🚨 New security advisory:

CVE-2021-47936 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#CVE #SecurityPatching #HackerNews

##

CVE-2021-47933
(9.8 CRITICAL)

EPSS: 0.17%

updated 2026-05-10T15:31:19

1 posts

WordPress MStore API 2.0.6 contains an arbitrary file upload vulnerability that allows unauthenticated attackers to upload malicious files by sending POST requests to the REST API endpoint. Attackers can upload PHP files with arbitrary names to the config_file endpoint to achieve remote code execution on the server.

Matchbook3469@mastodon.social at 2026-05-11T10:07:49.000Z ##

🔴 New security advisory:

CVE-2021-47933 affects multiple systems.

• Impact: Remote code execution or complete system compromise possible
• Risk: Attackers can gain full control of affected systems
• Mitigation: Patch immediately or isolate affected systems

Full breakdown:
yazoul.net/advisory/cve/cve-20

#InfoSec #VulnerabilityManagement #CyberSec

##

CVE-2026-7270
(7.8 HIGH)

EPSS: 0.01%

updated 2026-05-10T08:16:08.693000

1 posts

An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privileges.

1 repos

https://github.com/babyshen/freebsd-CVE-2026-7270

CVE-2026-8234
(8.8 HIGH)

EPSS: 0.04%

updated 2026-05-10T07:16:08.740000

2 posts

A security vulnerability has been detected in EFM ipTIME A8004T 14.18.2. This vulnerability affects the function formWifiBasicSet of the file /goform/WifiBasicSet. The manipulation of the argument security_5g leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but d

thehackerwire@mastodon.social at 2026-05-10T08:00:05.000Z ##

🟠 CVE-2026-8234 - High (8.8)

A security vulnerability has been detected in EFM ipTIME A8004T 14.18.2. This vulnerability affects the function formWifiBasicSet of the file /goform/WifiBasicSet. The manipulation of the argument security_5g leads to stack-based buffer overflow. ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-10T07:30:25.000Z ##

HIGH severity alert: CVE-2026-8234 stack buffer overflow in EFM ipTIME A8004T (v14.18.2) — remote, unauthenticated exploit possible. No patch yet; restrict remote access now. Details: radar.offseq.com/threat/cve-20 #OffSeq #CVE20268234 #RouterSecurity #Infosec

##

CVE-2025-66172
(6.5 MEDIUM)

EPSS: 0.01%

updated 2026-05-09T09:31:45

1 posts

The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and have access to specific APIs can restore a volume from any other user's backups and attach the volume to their own VMs. Backup plugin users using CloudStack 4.21.0.0+ are recommended to upg

thehackerwire@mastodon.social at 2026-05-10T16:55:49.000Z ##

🟠 CVE-2025-66172 - High (8.1)

The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and have access to specific APIs can rest...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-25077
(6.3 MEDIUM)

EPSS: 0.02%

updated 2026-05-09T09:31:45

1 posts

Account users are allowed by default to register templates to be downloaded directly to the primary storage for deploying instances using the KVM hypervisor. Due to missing file name sanitization, an attacker can register malicious templates to execute arbitrary code on the KVM hosts. This can result in the compromise of resource integrity and confidentiality, data loss, denial of service, and ava

thehackerwire@mastodon.social at 2026-05-10T16:55:40.000Z ##

🟠 CVE-2026-25077 - High (8.8)

Account users are allowed by default to register templates to be downloaded directly to the primary storage for deploying instances using the KVM hypervisor. Due to missing file name sanitization, an attacker can register malicious templates to ex...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42271
(8.8 HIGH)

EPSS: 0.05%

updated 2026-05-08T20:04:50.543000

1 posts

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.74.2 to before version 1.83.7, two endpoints used to preview an MCP server before saving it — POST /mcp-rest/test/connection and POST /mcp-rest/test/tools/list — accepted a full server configuration in the request body, including the command, args, and env fields used by the stdio transport. When c

thehackerwire@mastodon.social at 2026-05-10T05:59:53.000Z ##

🟠 CVE-2026-42271 - High (8.8)

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.74.2 to before version 1.83.7, two endpoints used to preview an MCP server before saving it — POST /mcp-rest/test/connection and POST /mcp-rest/...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42208
(9.8 CRITICAL)

EPSS: 37.37%

updated 2026-05-08T19:19:34.537000

4 posts

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead of passing it as a separate parameter. An unauthenticated attacker could send a specially crafted Authorization header to any LLM API route (for example

4 repos

https://github.com/rootdirective-sec/cve-2026-42208-Lab

https://github.com/Zeltoc/threat-intel-brief-cve-2026-42208-litellm

https://github.com/imjdl/CVE-2026-42208_lab

https://github.com/0xBlackash/CVE-2026-42208

AAKL at 2026-05-11T15:59:16.987Z ##

CISA has updated the KEV catalogue.

- CVE-2026-42208: BerriAI LiteLLM SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026-

##

AAKL@infosec.exchange at 2026-05-11T15:59:16.000Z ##

CISA has updated the KEV catalogue.

- CVE-2026-42208: BerriAI LiteLLM SQL Injection Vulnerability cve.org/CVERecord?id=CVE-2026- #CISA #infosec #vulnerability

##

secdb@infosec.exchange at 2026-05-10T06:01:01.000Z ##

🚨 [CISA-2026:0508] CISA Adds One Known Exploited Vulnerability to Catalog (secdb.nttzen.cloud/security-ad)

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.

⚠️ CVE-2026-42208 (secdb.nttzen.cloud/cve/detail/)
- Name: BerriAI LiteLLM SQL Injection Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: BerriAI
- Product: LiteLLM
- Notes: github.com/BerriAI/litellm/sec ; nvd.nist.gov/vuln/detail/CVE-2

#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260508 #cisa20260508 #cve_2026_42208 #cve202642208

##

thehackerwire@mastodon.social at 2026-05-10T06:00:03.000Z ##

🔴 CVE-2026-42208 - Critical (9.8)

LiteLLM is a proxy server (AI Gateway) to call LLM APIs in OpenAI (or native) format. From version 1.81.16 to before version 1.83.7, a database query used during proxy API key checks mixed the caller-supplied key value into the query text instead ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-7482
(9.1 CRITICAL)

EPSS: 0.10%

updated 2026-05-08T17:26:03

3 posts

Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader. The /api/create endpoint accepts an attacker-supplied GGUF file in which the declared tensor offset and size exceed the file's actual length; during quantization in fs/ggml/gguf.go and server/quantization.go (WriteTo()), the server reads past the allocated heap buffer. The leaked memory contents may inc

4 repos

https://github.com/kaleth4/CVE-2026-7482

https://github.com/0x0OZ/CVE-2026-7482-PoC

https://github.com/msuiche/gguf_cve2026_7482

https://github.com/szybnev/CVE-2026-7482

youranonnewsirc@nerdculture.de at 2026-05-11T07:07:03.000Z ##

Geopolitical tensions persist around the Strait of Hormuz as Iran responds to a US peace proposal amidst continued flare-ups (May 10-11, 2026). In cybersecurity, a critical "Bleeding Llama" vulnerability (CVE-2026-7482) in Ollama threatens over 300,000 servers (May 10, 2026). Australia urges urgent action on cyber risks from frontier AI systems. CISA also launched "CI Fortify" to bolster critical infrastructure resilience.

#AnonNews_irc #Cybersecurity #News

##

youranonnewsirc@nerdculture.de at 2026-05-11T07:07:03.000Z ##

Geopolitical tensions persist around the Strait of Hormuz as Iran responds to a US peace proposal amidst continued flare-ups (May 10-11, 2026). In cybersecurity, a critical "Bleeding Llama" vulnerability (CVE-2026-7482) in Ollama threatens over 300,000 servers (May 10, 2026). Australia urges urgent action on cyber risks from frontier AI systems. CISA also launched "CI Fortify" to bolster critical infrastructure resilience.

#AnonNews_irc #Cybersecurity #News

##

youranonnewsirc@nerdculture.de at 2026-05-10T15:05:00.000Z ##

Geopolitical tensions persist, notably the ongoing US-Iran conflict with recent flare-ups, as US President Trump and Chinese President Xi Jinping are set to meet, discussing the Iran war and AI (May 9-10).

In cybersecurity, the ShinyHunters group breached Canvas, an online learning system, impacting thousands of schools globally and potentially 275 million individuals (May 9). CISA launched "CI Fortify" to enhance critical infrastructure resilience against cyber threats, and a critical vulnerability (CVE-2026-7482) was disclosed in Ollama, an open-source LLM framework (May 10).

Technology-wise, AI advancements continue rapidly, with reports of OpenAI-Apple integration talks for iOS (May 9) and Anthropic's explosive growth and significant AI chip investments by SpaceX (May 10).

#Cybersecurity #Geopolitics #AINews

##

CVE-2026-33587
(10.0 CRITICAL)

EPSS: 0.06%

updated 2026-05-07T21:30:27

1 posts

Lack of user input sanitisation in Open Notebook v1.8.3 allows the application user to execute Python code (and subsequently OS commands) on the docker container via Server-Side Template Injection (SSTI) for user-created transformations.

Matchbook3469@mastodon.social at 2026-05-11T17:55:33.000Z ##

🔵 THREAT INTELLIGENCE

Weekly Threat Roundup: 2026-05-04 to 2026-05-10

Roundup | CRITICAL
CVEs: CVE-2026-0300, CVE-2026-33587, CVE-2026-40281

Cybersecurity roundup for 2026-05-04 to 2026-05-10. 10 CVE advisories, 5 breach reports, 4 threat news stories.

Full analysis:
yazoul.net/news/article/2026-w

#InfoSec #ZeroDay #SecurityOps

##

CVE-2026-6973
(7.2 HIGH)

EPSS: 5.01%

updated 2026-05-07T19:18:39.910000

2 posts

An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution.

tomshw@mastodon.social at 2026-05-11T17:29:13.000Z ##

🛡️ Nuova zero-day in Ivanti: aggiornare subito è essenziale per ridurre il rischio di attacchi e proteggere sistemi e dati aziendali. #Cybersecurity #Ivanti

🔗 tomshw.it/hardware/ivanti-epmm

##

tomshw@mastodon.social at 2026-05-11T17:29:13.000Z ##

🛡️ Nuova zero-day in Ivanti: aggiornare subito è essenziale per ridurre il rischio di attacchi e proteggere sistemi e dati aziendali. #Cybersecurity #Ivanti

🔗 tomshw.it/hardware/ivanti-epmm

##

CVE-2026-42611
(8.9 HIGH)

EPSS: 0.04%

updated 2026-05-05T21:36:29

2 posts

### Summary A low-privileged (with the ability to create a page) user can cause XSS with the injection of `svg` element. The XSS can further be escalated to dump the entire system information available under `/admin/config/info` whenever a Super Admin visits the page; which can further be chained with the use of admin-nonce to do a complete server compromise (RCE). ### Details Affected endpoint:

thehackerwire@mastodon.social at 2026-05-11T16:58:45.000Z ##

🟠 CVE-2026-42611 - High (8.9)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a low-privileged (with the ability to create a page) user can cause XSS with the injection of svg element. The XSS can further be escalated to dump the entire system information available u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T16:58:45.000Z ##

🟠 CVE-2026-42611 - High (8.9)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, a low-privileged (with the ability to create a page) user can cause XSS with the injection of svg element. The XSS can further be escalated to dump the entire system information available u...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42613
(9.4 CRITICAL)

EPSS: 0.05%

updated 2026-05-05T21:26:07

4 posts

# Bug Report: Registration Privilege Escalation via Missing Server-Side Validation of groups/access ## Summary The `Login::register()` method in the Login plugin accepts attacker-controlled `groups` and `access` fields from the registration POST data without server-side validation. When registration is enabled and `groups` or `access` are included in the configured allowed fields list, an unauth

offseq at 2026-05-12T01:30:27.301Z ##

⚠️ CRITICAL: Grav CMS Login plugin (<2.0.0-beta.2) has a flaw in input validation — unauthenticated attackers can self-register as admin.super if registration is enabled. Patch to 2.0.0-beta.2+ or disable registration! CVE-2026-42613 radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-11T17:02:46.000Z ##

🔴 CVE-2026-42613 - Critical (9.4)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, the Login::register() method in the Login plugin accepts attacker-controlled groups and access fields from the registration POST data without server-side validation. When registration is en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-12T01:30:27.000Z ##

⚠️ CRITICAL: Grav CMS Login plugin (<2.0.0-beta.2) has a flaw in input validation — unauthenticated attackers can self-register as admin.super if registration is enabled. Patch to 2.0.0-beta.2+ or disable registration! CVE-2026-42613 radar.offseq.com/threat/cve-20 #OffSeq #Grav #Infosec

##

thehackerwire@mastodon.social at 2026-05-11T17:02:46.000Z ##

🔴 CVE-2026-42613 - Critical (9.4)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, the Login::register() method in the Login plugin accepts attacker-controlled groups and access fields from the registration POST data without server-side validation. When registration is en...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42607
(9.1 CRITICAL)

EPSS: 0.23%

updated 2026-05-05T21:21:13

2 posts

### Summary An authenticated user with administrative privileges can achieve Remote Code Execution (RCE) by uploading a specially crafted ZIP file through the "Direct Install" tool. While the system attempts to block direct .php file uploads, it fails to inspect the contents of uploaded ZIP archives. Once a malicious plugin is extracted, it can execute arbitrary PHP code or drop a persistent web s

thehackerwire@mastodon.social at 2026-05-11T17:03:37.000Z ##

🔴 CVE-2026-42607 - Critical (9.1)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, an authenticated user with administrative privileges can achieve Remote Code Execution (RCE) by uploading a specially crafted ZIP file through the "Direct Install" tool. While the system at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T17:03:37.000Z ##

🔴 CVE-2026-42607 - Critical (9.1)

Grav is a file-based Web platform. Prior to 2.0.0-beta.2, an authenticated user with administrative privileges can achieve Remote Code Execution (RCE) by uploading a specially crafted ZIP file through the "Direct Install" tool. While the system at...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42315
(8.1 HIGH)

EPSS: 0.06%

updated 2026-05-05T21:18:20

2 posts

### Summary No sanitization of package folder name allows writing files anywhere outside the intended download directory. #### Affected Component - `src/pyload/core/api/__init__.py` - Function: `set_package_data()` ### Details When passing a folder name in the `set_package_data()` API function call inside the data object with key `"_folder"`, there is no sanitization at all, allowing a user with

thehackerwire@mastodon.social at 2026-05-11T18:24:04.000Z ##

🟠 CVE-2026-42315 - High (8.1)

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_folder", there is no sanitization at all, allowi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:24:04.000Z ##

🟠 CVE-2026-42315 - High (8.1)

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_folder", there is no sanitization at all, allowi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42260
(8.2 HIGH)

EPSS: 0.00%

updated 2026-05-05T20:51:46

4 posts

### Summary `src/utils/urlSafety.ts` exposes `isPublicHttpUrl` / `assertPublicHttpUrl`, used to gate the MCP `fetchWebContent` tool against private-network targets. The check has two defects that together allow **non-blind SSRF with the response body returned to the caller**: 1. **Bracketed IPv6 literals are never recognized.** Node's WHATWG `URL.hostname` keeps the surrounding `[…]` for IPv6 lit

thehackerwire@mastodon.social at 2026-05-12T16:35:49.000Z ##

🟠 CVE-2026-42260 - High (8.2)

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:25:58.000Z ##

🟠 CVE-2026-42260 - High (8.2)

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T16:35:49.000Z ##

🟠 CVE-2026-42260 - High (8.2)

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:25:58.000Z ##

🟠 CVE-2026-42260 - High (8.2)

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43938
(8.1 HIGH)

EPSS: 0.00%

updated 2026-05-05T20:31:36

4 posts

**Description:** Stored (second-order) Cross-Site Scripting (XSS) occurs when attacker-controlled input is persisted through one component of an application and later rendered, without proper sanitization or contextual output encoding, by a completely different component — often one that implicitly trusts the stored data. Because the dangerous sink is typically a privileged administrative interfac

thehackerwire@mastodon.social at 2026-05-12T16:35:58.000Z ##

🟠 CVE-2026-43938 - High (8.1)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:09.000Z ##

🟠 CVE-2026-43938 - High (8.1)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T16:35:58.000Z ##

🟠 CVE-2026-43938 - High (8.1)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T15:26:09.000Z ##

🟠 CVE-2026-43938 - High (8.1)

YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42864
(9.9 CRITICAL)

EPSS: 0.05%

updated 2026-05-05T18:21:19

4 posts

### Impact The `POST /api/v2/firefighter/raid/jira_bot` endpoint (`CreateJiraBotView`) is reachable without authentication (`permission_classes = [permissions.AllowAny]`). Its `attachments` payload is fetched server-side via `httpx.get()` with no URL validation, then uploaded as an attachment on the Jira ticket that gets created. An unauthenticated caller able to reach the ingress can c

offseq at 2026-05-12T07:30:31.410Z ##

🔥 CVE-2026-42864: CRITICAL vuln in ManoManoTech firefighter-incident (<0.0.54). Missing auth lets attackers fetch arbitrary URLs & exfil AWS creds if IMDSv2 not enforced. Update to 0.0.54+ & check your cloud configs! radar.offseq.com/threat/cve-20

##

thehackerwire@mastodon.social at 2026-05-11T20:01:49.000Z ##

🔴 CVE-2026-42864 - Critical (9.9)

FireFighter is an incident management application. Prior to 0.0.54, the POST /api/v2/firefighter/raid/jira_bot endpoint (CreateJiraBotView) is reachable without authentication (permission_classes = [permissions.AllowAny]). Its attachments payload ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

offseq@infosec.exchange at 2026-05-12T07:30:31.000Z ##

🔥 CVE-2026-42864: CRITICAL vuln in ManoManoTech firefighter-incident (<0.0.54). Missing auth lets attackers fetch arbitrary URLs & exfil AWS creds if IMDSv2 not enforced. Update to 0.0.54+ & check your cloud configs! radar.offseq.com/threat/cve-20 #OffSeq #CVE202642864 #CloudSecurity

##

thehackerwire@mastodon.social at 2026-05-11T20:01:49.000Z ##

🔴 CVE-2026-42864 - Critical (9.9)

FireFighter is an incident management application. Prior to 0.0.54, the POST /api/v2/firefighter/raid/jira_bot endpoint (CreateJiraBotView) is reachable without authentication (permission_classes = [permissions.AllowAny]). Its attachments payload ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42313
(8.3 HIGH)

EPSS: 0.04%

updated 2026-05-04T22:08:27

2 posts

### Summary The `set_config_value()` API method (`@permission(Perms.SETTINGS)`) in `src/pyload/core/api/__init__.py` gates security-sensitive options behind a hand-maintained allowlist `ADMIN_ONLY_CORE_OPTIONS`. The allowlist contains `("proxy", "username")` and `("proxy", "password")` — which protect the proxy credentials — but it does **not** include `("proxy", "enabled")`, `("proxy", "host")`,

thehackerwire@mastodon.social at 2026-05-11T18:24:36.000Z ##

🟠 CVE-2026-42313 - High (8.3)

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, the set_config_value() API method (@Permission(Perms.SETTINGS)) in src/pyload/core/api/__init__.py gates security-sensitive options behind a hand-maintai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:24:36.000Z ##

🟠 CVE-2026-42313 - High (8.3)

pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, the set_config_value() API method (@Permission(Perms.SETTINGS)) in src/pyload/core/api/__init__.py gates security-sensitive options behind a hand-maintai...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41893(CVSS UNKNOWN)

EPSS: 0.04%

updated 2026-05-04T20:53:02

1 posts

## Summary The HTTP login endpoints (`POST /login` and `POST /signalk/v1/auth/login`) are protected by `express-rate-limit` (default: 100 attempts per 10-minute window, configurable via `HTTP_RATE_LIMITS`). The WebSocket login path — sending `{login: {username, password}}` messages over an established WebSocket connection — calls `app.securityStrategy.login()` directly without any rate limiting.

offseq@infosec.exchange at 2026-05-10T10:30:26.000Z ##

🛡️ HIGH severity in SignalK signalk-server <2.25.0 (CVE-2026-41893): WebSocket login bypasses rate limits, enabling fast brute force attacks. Patch to 2.25.0+ ASAP. Details: radar.offseq.com/threat/cve-20 #OffSeq #infosec #vuln #bruteforce

##

CVE-2026-41940
(9.8 CRITICAL)

EPSS: 67.01%

updated 2026-05-04T18:31:33

7 posts

cPanel and WHM versions prior to 11.110.0.97, 11.118.0.63, 11.126.0.54, 11.132.0.29, 11.134.0.20, and 11.136.0.5 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Nuclei template

67 repos

https://github.com/Lutfifakee-Project/CVE-2026-41940

https://github.com/AmirrezaMarzban/portscan-CVE-2026-41940

https://github.com/sebinxavi/cve-checker-2026

https://github.com/44pie/cpsniper

https://github.com/SreejaPuthan/cpanel-control-plane-exposure-check

https://github.com/unteikyou/CVE-2026-41940-AuthBypass-Detector

https://github.com/linko-iheb/cve-2026-41940-scanner

https://github.com/shahidmallaofficial/cpanel-cve-2026-41940-fix

https://github.com/ilmndwntr/CVE-2026-41940-MASS-EXPLOIT

https://github.com/Ap0dexMe0/CVE-2026-41940

https://github.com/tfawnies/CVE-2026-41940-next

https://github.com/rfxn/cpanel-sessionscribe

https://github.com/itsismarcos/CVE-2026-41940

https://github.com/zycoder0day/CVE-2026-41940

https://github.com/george1-adel/CVE-2026-41940_exploit

https://github.com/acuciureanu/cpanel2shell-honeypot

https://github.com/0xBlackash/CVE-2026-41940

https://github.com/bughunt4me/cpanelCVE-2026-41940

https://github.com/devtint/CVE-2026-41940

https://github.com/MrOplus/CVE-2026-41940

https://github.com/imbas007/POC_CVE-2026-41940

https://github.com/Ishanoshada/CVE-2026-41940-Exploit-PoC

https://github.com/merdw/cPanel-CVE-2026-41940-Scanner

https://github.com/habibkaratas/sorry-ransomware-analysis

https://github.com/nickpaulsec/2026-41940-poc

https://github.com/assetnote/cpanel2shell-scanner

https://github.com/adriyansyah-mf/cve-2026-41940-poc

https://github.com/YudaSamuel/cpanel-vuln-scanner

https://github.com/murrez/CVE-2026-41940

https://github.com/cy3erm/CVE-2026-41940-POC

https://github.com/Sachinart/CVE-2026-41940-cpanel-0day

https://github.com/tc4dy/CVE-2026-41940-POC-Exploit

https://github.com/kmaruthisrikar/CVE-2026-41940-cPanel-Auth-Bypass-Exploit

https://github.com/OhmGun/whmxploit---CVE-2026-41940

https://github.com/3tternp/CVE-2026-41940---cPanel-WHM-check

https://github.com/rdyprtmx/poc-cve-2026-41940

https://github.com/Kagantua/cPanelWHM-AuthBypass

https://github.com/realawaisakbar/CVE-2026-41940-Exploit-PoC

https://github.com/sercanokur/CVE-2026-41940-cPanel-WHM-Verification-Tool

https://github.com/Defacto-ridgepole254/CVE-2026-41940-Exploit-PoC

https://github.com/Jenderal92/CVE-2026-41940

https://github.com/0xabdoulaye/CPANEL-CVE-2026-41940

https://github.com/tahaXafous/CVE_2026_41940_scan_exploit

https://github.com/anach-ai/CVE-2026-41940

https://github.com/MrAriaNet/cPanel-Fix

https://github.com/Richflexpix/cpanel-pwn

https://github.com/iSee857/cPanel-WHM-CVE-2026-41940-AuthBypass

https://github.com/Underh0st/CPanel-Audit-Remediation-Tool

https://github.com/0xF55/cve-2026-41940-exploit

https://github.com/Christian93111/CVE-2026-41940

https://github.com/ynsmroztas/cPanelSniper

https://github.com/ZildanZ/CVE-2026-41940

https://github.com/Unfold-Security/CVE-2026-41940-Detection

https://github.com/vineet7800/cpanel-malware-cleaner-cve-2026

https://github.com/XsanFlip/poc-cpanel-cve-2026-41940

https://github.com/thekawix/CVE-2026-41940

https://github.com/zedxod/CVE-2026-41940-POC

https://github.com/ngksiva/cpanel-forensics

https://github.com/senyx122/CVE-2026-41940

https://github.com/0dev1337/cpanelscanner

https://github.com/branixsolutions/Security-CVE-2026-41940-cPanel-WHM-WP2

https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker

https://github.com/mahfuzreham/cpanel-cve-2026-41940

https://github.com/dennisec/CVE-2026-41940

https://github.com/Andrei-Dr/cpanel-cve-2026-41940-ioc

https://github.com/Wesuiliye/CVE-2026-41940

https://github.com/NULL200OK/cve-2026-41940-tool

threatcodex at 2026-05-12T14:55:55.925Z ##

Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment

blog.xlab.qianxin.com/mr_rot13

##

technadu at 2026-05-12T14:35:01.354Z ##

CVE-2026-41940 is under active mass exploitation.

Researchers say threat group “Mr_Rot13” is exploiting the critical cPanel flaw to steal credentials, deploy webshells, and gain persistent access across hosting infrastructure.

2,000+ attacking IPs observed globally.

technadu.com/cve-2026-41940-vu

##

undercodenews@mastodon.social at 2026-05-12T13:11:11.000Z ##

Critical cPanel Vulnerability CVE-2026-41940 Sparks Global Cyberattacks and Backdoor Infections

Massive Exploitation Campaign Targets cPanel Servers Worldwide A dangerous cyberattack campaign is rapidly spreading across the internet after hackers began exploiting the critical cPanel vulnerability identified as CVE-2026-41940. Security researchers have assigned the flaw a CVSS severity score of 9.3, placing it among the most dangerous web hosting vulnerabilities…

undercodenews.com/critical-cpa

##

Analyst207@mastodon.social at 2026-05-11T18:28:45.000Z ##

cPanel Flaw Exploited to Deploy Filemanager Backdoor

Over 2,000 attacker source IPs worldwide are currently involved in automated attacks exploiting a critical cPanel vulnerability, CVE-2026-41940, which allows remote attackers to gain elevated control and deploy malicious backdoors. This flaw has been targeted by multiple actors for a range of malicious outcomes, including…

osintsights.com/cpanel-flaw-ex

#CpanelVulnerability #Cve202641940 #AuthenticationBypass #EmergingThreats #MalwareOperations

##

threatcodex@infosec.exchange at 2026-05-12T14:55:55.000Z ##

Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment
#CVE_2026_41940 #Mr_Rot13
blog.xlab.qianxin.com/mr_rot13

##

technadu@infosec.exchange at 2026-05-12T14:35:01.000Z ##

CVE-2026-41940 is under active mass exploitation.

Researchers say threat group “Mr_Rot13” is exploiting the critical cPanel flaw to steal credentials, deploy webshells, and gain persistent access across hosting infrastructure.

2,000+ attacking IPs observed globally.

technadu.com/cve-2026-41940-vu

#CyberSecurity #ThreatIntel #cPanel

##

linux@activitypub.awakari.com at 2026-05-11T14:33:51.000Z ## Hackers Exploit CVE-2026-41940 to Take Over cPanel and WHM Servers A critical authentication bypass vulnerability affecting cPanel and WHM servers is currently under active exploitation by a sophis...

#Cyber #Security #News #Cybersecurity #Vulnerability #Cyber #Security #Cyber #security #news #vulnerability

Origin | Interest | Match ##

CVE-2026-4670
(9.8 CRITICAL)

EPSS: 0.22%

updated 2026-05-04T18:20:39.803000

1 posts

Authentication bypass by primary weakness vulnerability in Progress Software MOVEit Automation allows Authentication Bypass. This issue affects MOVEit Automation: from 2025.0.0 before 2025.0.9, from 2024.0.0 before 2024.1.8, versions prior to 2024.0.0.

netsecio@mastodon.social at 2026-05-11T19:53:51.000Z ##

📰 MOVEit Automation Hit with Critical 9.8 CVSS Auth Bypass Flaw (CVE-2026-4670)

🚨 URGENT PATCH: A critical 9.8 CVSS auth bypass (CVE-2026-4670) is found in MOVEit Automation. Attacker could gain admin control. Given MOVEit's history, this is a major risk. Upgrade immediately! #MOVEit #CyberSecurity #Vulnerability #PatchNow

🔗 cyber.netsecops.io

##

CVE-2026-42511
(7.3 HIGH)

EPSS: 0.06%

updated 2026-04-30T15:31:40

2 posts

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it. A rogue DHCP server may be able to execute arbirary code as roo

informapirata@mastodon.uno at 2026-05-10T17:11:08.000Z ##

AISLE scopre CVE-2026-42511: una vulnerabilità di esecuzione di comandi remoti in FreeBSD vecchia di 21 anni.

La vulnerabilità è entrata per la prima volta in FreeBSD nella versione 2005 di FreeBSD-6.0, quando dhclientè stato importato il file di OpenBSD, ed è rimasta latente fino alla scoperta da parte di AISLE. Nel 2012, quando tale sistema operativo è stato dhclient-scriptcompletamente deprecato, è stata di fatto risolta la vulnerabilità.

aisle.com/blog/aisle-discovers

@informatica

##

campuscodi@mastodon.social at 2026-05-10T16:17:50.000Z ##

The FreeBSD team has patched a remote code execution in its operating system that impacts all versions released since 2005

Tracked as CVE-2026-42511, the vulnerability resides in the FreeBSD DHCP client and is extremely easy to exploit

aisle.com/blog/aisle-discovers

##

CVE-2025-20362
(6.5 MEDIUM)

EPSS: 46.39%

updated 2025-10-22T00:34:26

1 posts

A vulnerability in the VPN web server of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to access restricted URL endpoints without authentication that should otherwise be inaccessible without authentication. This vulnerability is due to improper validation of user-supplied i

Nuclei template

cyberveille@mastobot.ping.moi at 2026-05-11T22:00:25.000Z ##

📢 CVE-2025-20362 : Contournement d'authentification VPN activement exploité sur Cisco ASA et FTD
📝 ## 🔍 Contexte

Cet article est publié le 11 mai 2026 par CrowdSec sur sa platefo...
📖 cyberveille : cyberveille.ch/posts/2026-05-1
🌐 source : crowdsec.net/vulntracking-repo?
#CVE_2025_20362 #Cisco_ASA #Cyberveille

##

CVE-2017-0144
(8.1 HIGH)

EPSS: 94.32%

updated 2025-10-22T00:32:22

2 posts

The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via crafted packets, aka "Windows SMB Remote Code Execution Vulnerability." This vulnerability is different from those describe

21 repos

https://github.com/MedX267/EternalBlue-Vulnerability-Scanner

https://github.com/Mitsu-bis/Eternal-Blue-CVE-2017-0144-THM-Write-Up

https://github.com/sethwhy/BlueDoor

https://github.com/klairmanraj/Multi-VLAN-Enterprise-Network-Security-Infrastructure

https://github.com/quynhold/Detect-CVE-2017-0144-attack

https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144

https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint

https://github.com/dannic145/EternalBlue-Exploit-Demonstration

https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework-

https://github.com/ichhyak22/EternalBlue-Exploit-Demonstration-MS17-010

https://github.com/AtithKhawas/autoblue

https://github.com/FireTemple/Blackash-CVE-2017-0144

https://github.com/AnugiArrawwala/CVE-Research

https://github.com/klairmanraj/Multi-VLAN-Enterprise-Network-Vulnerability-Assessment

https://github.com/peterpt/eternal_scanner

https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution

https://github.com/denuwanjayasekara/CVE-Exploitation-Reports

https://github.com/kimocoder/eternalblue

https://github.com/klairmanraj/Vulnerability-Risk-Assessment-TVRA-Enterprise-Network

https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144

https://github.com/althany/CVE-2017-0144_Lab-Guide

alsoran@dfarq.homeip.net at 2026-05-12T11:00:06.000Z ## On May 12, 2017, ransomware named Wannacry started spreading across the globe, infecting and encrypting Windows systems by exploiting CVE-2017-0144, a flaw that a two-month-old Microsoft patch, MS17-010, had fixed. It quickly became one of the biggest Windows outbreaks ever. Why was it so bad, and what could have made it go better? […]

dfarq.homeip.net/why-the-wanna

##

alsoran@dfarq.homeip.net at 2026-05-12T11:00:06.000Z ##

Why the Wannacry outbreak was so bad

On May 12, 2017, ransomware named Wannacry started spreading across the globe, infecting and encrypting Windows systems by exploiting CVE-2017-0144, a flaw that a two-month-old Microsoft patch, MS17-010, had fixed. It quickly became one of the biggest Windows outbreaks ever. Why was it so bad, and what could have made it go better? […]

dfarq.homeip.net/why-the-wanna

##

CVE-2024-27355
(7.5 HIGH)

EPSS: 0.33%

updated 2025-09-15T17:17:49.997000

2 posts

An issue was discovered in phpseclib 1.x before 1.0.23, 2.x before 2.0.47, and 3.x before 3.0.36. When processing the ASN.1 object identifier of a certificate, a sub identifier may be provided that leads to a denial of service (CPU consumption for decodeOID).

thehackerwire@mastodon.social at 2026-05-12T18:24:16.000Z ##

🟠 CVE-2026-44167 - High (7.5)

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T18:24:16.000Z ##

🟠 CVE-2026-44167 - High (7.5)

phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43989
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-05-12T17:26:58.000Z ##

🟠 CVE-2026-43989 - High (8.5)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:22.000Z ##

🟠 CVE-2026-43989 - High (8.5)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:26:58.000Z ##

🟠 CVE-2026-43989 - High (8.5)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:22.000Z ##

🟠 CVE-2026-43989 - High (8.5)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43991
(0 None)

EPSS: 0.00%

4 posts

N/A

thehackerwire@mastodon.social at 2026-05-12T17:22:37.000Z ##

🟠 CVE-2026-43991 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:03.000Z ##

🟠 CVE-2026-43991 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:22:37.000Z ##

🟠 CVE-2026-43991 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:03.000Z ##

🟠 CVE-2026-43991 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43990
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-12T17:21:26.000Z ##

🟠 CVE-2026-43990 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell me...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:26.000Z ##

🟠 CVE-2026-43990 - High (8.4)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell me...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-43993
(0 None)

EPSS: 0.00%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-12T17:21:16.000Z ##

🟠 CVE-2026-43993 - High (8.2)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T17:21:16.000Z ##

🟠 CVE-2026-43993 - High (8.2)

JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. Thi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:19:03.000Z ##

🟠 CVE-2026-8161 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-12T12:19:03.000Z ##

🟠 CVE-2026-8161 - High (7.5)

multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-42858
(0 None)

EPSS: 0.03%

2 posts

N/A

thehackerwire@mastodon.social at 2026-05-11T18:17:33.000Z ##

🟠 CVE-2026-42858 - High (8.5)

Open edX Platform enables the authoring and delivery of online learning at any scale. The sync_provider_data endpoint in SAMLProviderDataViewSet allows authenticated Enterprise Admin users to supply an arbitrary URL via the metadata_url POST param...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

thehackerwire@mastodon.social at 2026-05-11T18:17:33.000Z ##

🟠 CVE-2026-42858 - High (8.5)

Open edX Platform enables the authoring and delivery of online learning at any scale. The sync_provider_data endpoint in SAMLProviderDataViewSet allows authenticated Enterprise Admin users to supply an arbitrary URL via the metadata_url POST param...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

CVE-2026-41050
(0 None)

EPSS: 0.00%

1 posts

N/A

beyondmachines1@infosec.exchange at 2026-05-10T15:01:07.000Z ##

Critical Rancher Fleet Vulnerability Allows Full Kubernetes Cluster Takeover

SUSE Rancher Fleet contains a critical vulnerability (CVE-2026-41050) that allows attackers to bypass multi-tenant isolation and gain cluster-admin privileges by exploiting the Helm deployer's failure to enforce ServiceAccount impersonation.

**If you're using Rancher Fleet to manage Kubernetes clusters, update ASAP to a patched version (Fleet 0.11.13/0.12.14/0.13.10/0.14.5, or Rancher 2.10.11/2.11.13/2.12.9/2.13.5/2.14.1). If you can't patch right away, disable Fleet-monitored repositories for untrusted tenants, audit your Helm charts for use of the lookup function, and rotate any secrets that may have been exposed.**
#cybersecurity #infosec #advisory #vulnerability
beyondmachines.net/event_detai

##

CVE-2026-6735
(0 None)

EPSS: 0.05%

1 posts

N/A

offseq@infosec.exchange at 2026-05-10T09:00:25.000Z ##

⚠️ HIGH-severity XSS (CVE-2026-6735) impacts PHP 8.2 – 8.5: improper input handling on PHP-FPM status page enables JavaScript injection via crafted URLs. Restrict access & watch for updates. radar.offseq.com/threat/cve-20 #OffSeq #PHP #XSS #AppSec

##

CVE-2026-42562
(0 None)

EPSS: 0.04%

1 posts

N/A

thehackerwire@mastodon.social at 2026-05-10T05:19:13.000Z ##

🟠 CVE-2026-42562 - High (8.3)

Plainpad is a self hosted note taking app. Prior to version 1.1.1, Plainpad allows a low-privilege authenticated user to self-escalate to administrator by submitting admin=true in PUT /api.php/v1/users/{id}. The endpoint directly persists the admi...

🔗 thehackerwire.com/vulnerabilit

#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

##

Visit counter For Websites