##
Updated at UTC 2026-05-13T20:40:57.903749
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-44009 | 9.8 | 0.00% | 2 | 0 | 2026-05-13T19:17:26.997000 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, This vulnerabili | |
| CVE-2026-44006 | 10.0 | 0.00% | 2 | 0 | 2026-05-13T19:17:26.827000 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, It is possible to | |
| CVE-2026-44004 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T19:17:26.547000 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, sandboxed code ca | |
| CVE-2026-43998 | 8.5 | 0.00% | 2 | 0 | 2026-05-13T19:17:25.790000 | vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root p | |
| CVE-2026-43997 | 10.0 | 0.00% | 2 | 0 | 2026-05-13T19:17:25.613000 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to | |
| CVE-2026-42869 | 10.0 | 0.12% | 1 | 0 | 2026-05-13T18:31:17.630000 | SOCFortress CoPilot focuses on providing a single pane of glass for all your sec | |
| CVE-2026-0263 | None | 0.00% | 4 | 0 | 2026-05-13T18:31:07 | A buffer overflow vulnerability in the IKEv2 processing of Palo Alto Networks PA | |
| CVE-2026-6281 | 8.8 | 0.00% | 2 | 0 | 2026-05-13T18:31:07 | A potential vulnerability was reported in some Lenovo Personal Cloud Storage dev | |
| CVE-2026-40631 | 8.7 | 0.00% | 2 | 0 | 2026-05-13T18:31:06 | An authenticated attacker with the Resource Administrator or Administrator role | |
| CVE-2026-40618 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:06 | When an SSL profile is configured on a virtual server on BIG-IP Virtual Edition | |
| CVE-2026-41225 | 9.1 | 0.00% | 2 | 0 | 2026-05-13T18:31:06 | A vulnerability exists in iControl REST where a highly privileged, authenticated | |
| CVE-2026-42409 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:06 | When an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respo | |
| CVE-2026-42406 | 8.7 | 0.00% | 2 | 0 | 2026-05-13T18:31:06 | A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, a | |
| CVE-2026-42924 | 8.7 | 0.00% | 4 | 0 | 2026-05-13T18:31:06 | An authenticated attacker with the Resource Administrator or Administrator role | |
| CVE-2026-39458 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:05 | When a BIG-IP DNS profile enabled with DNS cache is configured on a virtual serv | |
| CVE-2026-39455 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:05 | When the BIG-IP Configuration utility is configured to use Lightweight Directory | |
| CVE-2026-40423 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:05 | When a SIP profile is configured on a virtual server, undisclosed traffic can ca | |
| CVE-2026-40067 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:05 | When a BIG-IP APM access policy is configured on a virtual server, undisclosed t | |
| CVE-2026-40061 | 8.7 | 0.00% | 2 | 0 | 2026-05-13T18:31:05 | When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iContro | |
| CVE-2026-40060 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:05 | When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual ser | |
| CVE-2026-40629 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:05 | When SSL profiles are configured on a virtual server, undisclosed traffic can ca | |
| CVE-2026-41956 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T18:31:05 | When a classification profile is configured on a UDP virtual server, undisclosed | |
| CVE-2026-40621 | 9.8 | 0.00% | 2 | 0 | 2026-05-13T18:30:57 | ELECOM wireless LAN access point devices do not require authentication to access | |
| CVE-2026-32661 | 9.8 | 0.14% | 2 | 0 | 2026-05-13T18:30:57 | Stack-based buffer overflow vulnerability exists in GUARDIANWALL MailSuite and G | |
| CVE-2026-42260 | 8.2 | 0.03% | 4 | 0 | 2026-05-13T18:27:58.823000 | Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web | |
| CVE-2026-45091 | 9.1 | 0.01% | 2 | 0 | 2026-05-13T18:27:58.823000 | sealed-env is a cross-stack, zero-trust secret management library for Node.js an | |
| CVE-2026-43938 | 8.1 | 0.03% | 4 | 0 | 2026-05-13T18:24:58.737000 | YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, | |
| CVE-2026-43937 | 8.8 | 0.07% | 2 | 0 | 2026-05-13T18:24:58.737000 | YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin O | |
| CVE-2026-44008 | 9.8 | 0.00% | 2 | 0 | 2026-05-13T18:17:47.830000 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method ne | |
| CVE-2026-44007 | 9.1 | 0.00% | 2 | 0 | 2026-05-13T18:17:47.830000 | vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.1, when a NodeVM is | |
| CVE-2026-44005 | 10.0 | 0.00% | 2 | 0 | 2026-05-13T18:17:47.830000 | vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge | |
| CVE-2026-0265 | 0 | 0.00% | 2 | 0 | 2026-05-13T18:17:47.830000 | An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en | |
| CVE-2026-0264 | 0 | 0.00% | 2 | 0 | 2026-05-13T18:17:47.830000 | A buffer overflow vulnerability in the DNS proxy and DNS Server features of Palo | |
| CVE-2026-44578 | 8.6 | 0.00% | 2 | 2 | 2026-05-13T18:17:16.127000 | Next.js is a React framework for building full-stack web applications. From 13.4 | |
| CVE-2026-44579 | 7.5 | 0.00% | 2 | 3 | 2026-05-13T18:17:16.127000 | Next.js is a React framework for building full-stack web applications. From to | |
| CVE-2026-44183 | 9.8 | 0.04% | 2 | 0 | 2026-05-13T17:31:40.840000 | Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in | |
| CVE-2026-42315 | 8.1 | 0.06% | 1 | 0 | 2026-05-13T17:26:28.013000 | pyLoad is a free and open-source download manager written in Python. Prior to 0. | |
| CVE-2026-44574 | 8.1 | 0.00% | 2 | 1 | 2026-05-13T17:25:25.693000 | Next.js is a React framework for building full-stack web applications. From 15.4 | |
| CVE-2026-44289 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T17:01:38.423000 | protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior t | |
| CVE-2026-42266 | 8.8 | 0.00% | 4 | 0 | 2026-05-13T16:32:31.457000 | jupyterlab is an extensible environment for interactive and reproducible computi | |
| CVE-2026-42945 | 8.1 | 0.00% | 4 | 1 | 2026-05-13T16:27:11.127000 | NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo | |
| CVE-2026-40698 | 8.7 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, a | |
| CVE-2026-41227 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | On an HTTP/2 virtual server with Layer 7 DoS Protection configured, undisclosed | |
| CVE-2026-41218 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | When BIG-IP PEM iRules are configured on a virtual server (iRules using commands | |
| CVE-2026-41217 | 7.9 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | A vulnerability exists in an undisclosed BIG-IP TMOS Shell (tmsh) command that m | |
| CVE-2026-41957 | 8.8 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | An authenticated remote code execution vulnerability through undisclosed vectors | |
| CVE-2026-41953 | 8.7 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | A vulnerability exists in BIG-IP systems where a highly privileged, authenticate | |
| CVE-2026-42930 | 8.7 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | When running in Appliance mode, an authenticated attacker assigned the 'Administ | |
| CVE-2026-42920 | 7.5 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | When a Client SSL profile is configured with Allow Dynamic Record Sizing on a UD | |
| CVE-2026-6282 | 8.1 | 0.00% | 2 | 0 | 2026-05-13T16:27:11.127000 | A potential improper file path validation vulnerability was reported in some Len | |
| CVE-2026-44167 | 7.5 | 0.02% | 2 | 0 | 2026-05-13T16:27:01 | ### Impact Anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 | |
| CVE-2026-44258 | 0 | 0.05% | 2 | 0 | 2026-05-13T16:10:57.817000 | efw4.X is an Enterprise Framework for Web. Prior to 4.08.010, the elfinder_check | |
| CVE-2026-8108 | 7.8 | 0.01% | 2 | 0 | 2026-05-13T15:52:56.850000 | The installation of Fuji Tellus adds a driver to the kernel which grants all use | |
| CVE-2026-45185 | 9.8 | 0.06% | 19 | 1 | 2026-05-13T15:52:25.637000 | Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable u | |
| CVE-2026-42062 | 9.8 | 0.00% | 2 | 0 | 2026-05-13T15:47:10.327000 | ELECOM wireless LAN access point devices contain an OS command injection in proc | |
| CVE-2026-8072 | 0 | 0.03% | 1 | 0 | 2026-05-13T15:36:46.970000 | Insecure generation of credentials in the local SAT (Technical Support) access f | |
| CVE-2026-25705 | 8.4 | 0.04% | 2 | 0 | 2026-05-13T15:35:35.267000 | A vulnerability has been identified in [Rancher's Extensions](https://rancherman | |
| CVE-2026-32185 | 5.5 | 0.04% | 1 | 0 | 2026-05-13T15:34:52.573000 | Files or directories accessible to external parties in Microsoft Teams allows an | |
| CVE-2026-41089 | 9.8 | 0.09% | 4 | 0 | 2026-05-13T15:34:52.573000 | Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker | |
| CVE-2026-41096 | 9.8 | 0.07% | 5 | 0 | 2026-05-13T15:34:52.573000 | Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attac | |
| CVE-2026-40361 | 8.4 | 0.06% | 2 | 0 | 2026-05-13T15:34:52.573000 | Use after free in Microsoft Office Word allows an unauthorized attacker to execu | |
| CVE-2026-35433 | 7.3 | 0.11% | 2 | 0 | 2026-05-13T15:34:52.573000 | Improper input validation in .NET allows an unauthorized attacker to elevate pri | |
| CVE-2026-32177 | 7.3 | 0.09% | 2 | 0 | 2026-05-13T15:34:52.573000 | Heap-based buffer overflow in .NET allows an unauthorized attacker to elevate pr | |
| CVE-2026-43989 | 8.5 | 0.01% | 4 | 0 | 2026-05-13T14:54:50.290000 | JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-securit | |
| CVE-2026-42860 | 8.5 | 0.03% | 1 | 0 | 2026-05-13T14:50:59.870000 | The Open edx Enterprise Service app provides enterprise features to the Open edX | |
| CVE-2026-8159 | 7.5 | 0.04% | 2 | 0 | 2026-05-13T14:44:31.283000 | multiparty@4.2.3 and lower versions are vulnerable to denial of service via regu | |
| CVE-2026-8162 | 7.5 | 0.04% | 4 | 0 | 2026-05-13T14:43:47.950000 | multiparty@4.2.3 and lower versions are vulnerable to denial of service via unca | |
| CVE-2026-42882 | 9.4 | 0.12% | 1 | 0 | 2026-05-13T14:19:06 | ## Background The original concern is functional: a resource pattern should tre | |
| CVE-2026-42864 | 9.9 | 0.05% | 2 | 0 | 2026-05-13T14:18:25 | ### Impact The `POST /api/v2/firefighter/raid/jira_bot` endpoint (`CreateJiraB | |
| CVE-2026-42313 | 8.3 | 0.04% | 1 | 0 | 2026-05-13T14:17:50 | ### Summary The `set_config_value()` API method (`@permission(Perms.SETTINGS)`) | |
| CVE-2026-2291 | 7.3 | 0.03% | 2 | 0 | 2026-05-13T14:17:14.120000 | dnsmasqs extract_name() function can be abused to cause a heap buffer overflow, | |
| CVE-2026-42613 | 9.4 | 0.05% | 1 | 0 | 2026-05-13T13:52:16 | # Bug Report: Registration Privilege Escalation via Missing Server-Side Validati | |
| CVE-2026-28910 | 3.3 | 0.01% | 2 | 0 | 2026-05-13T00:49:16 | This issue was addressed with improved permissions checking. This issue is fixed | |
| CVE-2026-41712 | 7.5 | 0.03% | 4 | 0 | 2026-05-12T21:31:33 | Spring AI's chat memory component contained a problematic default that, when not | |
| CVE-2026-44277 | 9.8 | 0.04% | 6 | 1 | 2026-05-12T18:57:02.307000 | A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, Fo | |
| CVE-2026-26083 | 9.8 | 0.04% | 3 | 0 | 2026-05-12T18:30:45 | A missing authorization vulnerability in Fortinet FortiSandbox 5.0.0 through 5.0 | |
| CVE-2025-35979 | None | 0.01% | 1 | 0 | 2026-05-12T18:30:44 | Exposure of sensitive information caused by shared microarchitectural predictor | |
| CVE-2026-28972 | 6.5 | 0.04% | 2 | 0 | 2026-05-12T18:30:37 | An out-of-bounds write issue was addressed with improved input validation. This | |
| CVE-2026-6722 | 9.8 | 0.23% | 2 | 0 | 2026-05-12T17:48:21.643000 | In PHP versions 8.2.* before 8.2.31, 8.3.* before 8.3.31, 8.4.* before 8.4.21, a | |
| CVE-2026-8177 | 7.5 | 0.02% | 1 | 0 | 2026-05-12T16:48:58.260000 | XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when | |
| CVE-2026-6001 | 8.8 | 0.04% | 2 | 0 | 2026-05-12T16:47:58.570000 | Authorization bypass through User-Controlled key vulnerability in ABIS Technolog | |
| CVE-2026-8043 | 9.6 | 0.09% | 4 | 0 | 2026-05-12T16:38:24.040000 | External control of a file name in Ivanti Xtraction before version 2026.2 allows | |
| CVE-2026-28986 | 7.5 | 0.04% | 2 | 0 | 2026-05-12T15:32:40 | A race condition was addressed with additional validation. This issue is fixed i | |
| CVE-2026-8111 | 8.8 | 0.32% | 2 | 0 | 2026-05-12T15:31:52 | SQL injection in the web console of Ivanti Endpoint Manager before version 2024 | |
| CVE-2026-8110 | 7.8 | 0.02% | 4 | 0 | 2026-05-12T15:31:49 | Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before | |
| CVE-2026-35071 | 8.2 | 0.03% | 2 | 0 | 2026-05-12T15:31:49 | Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper ne | |
| CVE-2026-7432 | 7.8 | 0.03% | 2 | 0 | 2026-05-12T15:31:48 | A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally a | |
| CVE-2026-31431 | 7.8 | 2.57% | 1 | 100 | 2026-05-12T15:31:18 | In the Linux kernel, the following vulnerability has been resolved: crypto: alg | |
| CVE-2026-7256 | 8.8 | 0.83% | 2 | 0 | 2026-05-12T15:11:29.503000 | ** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI pro | |
| CVE-2026-44295 | 8.7 | 0.00% | 2 | 0 | 2026-05-12T15:06:24 | ## Summary `pbjs` static code generation could emit unsafe JavaScript identifie | |
| CVE-2026-44291 | 8.1 | 0.00% | 2 | 0 | 2026-05-12T15:01:25 | ## Summary protobufjs used plain objects with inherited prototypes for internal | |
| CVE-2026-44290 | 7.5 | 0.00% | 2 | 0 | 2026-05-12T15:01:15 | ## Summary protobufjs allowed certain schema option paths to traverse through i | |
| CVE-2026-42290 | 7.8 | 0.00% | 2 | 0 | 2026-05-12T14:59:46 | ## Summary `pbts` invoked JSDoc by building a shell command string from input f | |
| CVE-2026-25787 | 9.1 | 0.04% | 3 | 0 | 2026-05-12T14:19:41.400000 | Affected devices do not properly validate and sanitize Technology Object (TO) na | |
| CVE-2026-34260 | 9.6 | 0.01% | 5 | 0 | 2026-05-12T14:19:41.400000 | SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerabil | |
| CVE-2025-40946 | 8.3 | 0.02% | 2 | 0 | 2026-05-12T14:19:41.400000 | A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blu | |
| CVE-2026-22924 | 9.1 | 0.04% | 2 | 0 | 2026-05-12T14:19:41.400000 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). Th | |
| CVE-2026-22925 | 7.5 | 0.04% | 2 | 0 | 2026-05-12T14:19:41.400000 | A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). Th | |
| CVE-2026-27662 | 7.7 | 0.03% | 2 | 0 | 2026-05-12T14:19:41.400000 | Affected devices do not properly restrict access to the web browser via the Cont | |
| CVE-2026-44412 | 7.8 | 0.01% | 2 | 0 | 2026-05-12T14:19:41.400000 | A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 | |
| CVE-2026-35227 | 0 | 0.10% | 1 | 0 | 2026-05-12T14:15:46.747000 | An unauthenticated remote attacker may exhaust all available TCP connections in | |
| CVE-2026-4890 | 7.5 | 0.18% | 1 | 0 | 2026-05-12T14:15:46.747000 | A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allo | |
| CVE-2026-43434 | 7.8 | 0.01% | 1 | 0 | 2026-05-12T14:10:27.343000 | In the Linux kernel, the following vulnerability has been resolved: rust_binder | |
| CVE-2026-43441 | 7.5 | 0.05% | 1 | 0 | 2026-05-12T14:10:27.343000 | In the Linux kernel, the following vulnerability has been resolved: net: bondin | |
| CVE-2026-45213 | 7.6 | 0.03% | 4 | 0 | 2026-05-12T14:03:52.757000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-42742 | 8.5 | 0.03% | 2 | 0 | 2026-05-12T14:03:52.757000 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2019-14192 | 9.8 | 0.38% | 4 | 0 | 2026-05-12T12:32:32 | An issue was discovered in Das U-Boot through 2019.07. There is an unbounded mem | |
| CVE-2026-42741 | 8.5 | 0.03% | 2 | 0 | 2026-05-12T12:32:23 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-25786 | 9.1 | 0.04% | 3 | 0 | 2026-05-12T12:32:22 | Affected devices do not properly validate and sanitize PLC/station name rendered | |
| CVE-2025-40947 | 7.5 | 0.23% | 2 | 0 | 2026-05-12T12:32:22 | A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.1 | |
| CVE-2026-33893 | 7.5 | 0.04% | 2 | 0 | 2026-05-12T12:32:22 | A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.00 | |
| CVE-2026-44411 | 7.8 | 0.01% | 2 | 0 | 2026-05-12T12:32:22 | A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 | |
| CVE-2026-41551 | 9.1 | 0.05% | 2 | 0 | 2026-05-12T12:32:22 | A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected ve | |
| CVE-2026-2465 | 8.8 | 0.04% | 4 | 0 | 2026-05-12T12:32:22 | Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering | |
| CVE-2026-45214 | 8.5 | 0.03% | 4 | 0 | 2026-05-12T12:32:22 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-41713 | 8.2 | 0.03% | 2 | 0 | 2026-05-12T12:32:22 | A malicious user could craft input that is stored in conversation memory and lat | |
| CVE-2026-45211 | 8.5 | 0.03% | 2 | 0 | 2026-05-12T12:32:22 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2026-45218 | 7.7 | 0.03% | 2 | 0 | 2026-05-12T12:32:22 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injecti | |
| CVE-2025-40833 | 7.5 | 0.04% | 2 | 0 | 2026-05-12T12:32:21 | The affected devices contain a null pointer dereference vulnerability while proc | |
| CVE-2025-6577 | 9.8 | 0.03% | 2 | 0 | 2026-05-12T12:32:14 | Improper neutralization of special elements used in an SQL command ('SQL injecti | |
| CVE-2025-40949 | 9.1 | 0.17% | 2 | 0 | 2026-05-12T12:32:14 | A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.1 | |
| CVE-2026-2993 | 7.5 | 0.10% | 2 | 0 | 2026-05-12T09:31:33 | The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable | |
| CVE-2026-39432 | 8.2 | 0.03% | 3 | 0 | 2026-05-12T09:31:31 | Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Inco | |
| CVE-2026-7287 | 7.5 | 0.26% | 2 | 0 | 2026-05-12T06:31:46 | ** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep() | |
| CVE-2026-34259 | 8.2 | 0.01% | 2 | 0 | 2026-05-12T03:31:33 | Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, | |
| CVE-2026-34263 | 9.6 | 0.02% | 5 | 0 | 2026-05-12T03:31:32 | Due to improper Spring Security configuration, SAP Commerce cloud allows an unau | |
| CVE-2026-45223 | 8.8 | 0.08% | 1 | 0 | 2026-05-11T21:31:46 | Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coor | |
| CVE-2026-44413 | 8.2 | 0.00% | 2 | 0 | 2026-05-11T18:31:59 | In JetBrains TeamCity before 2026.1 2025.11.5 authenticated users could expose s | |
| CVE-2026-43639 | 8.0 | 0.05% | 1 | 0 | 2026-05-11T18:31:59 | Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerabili | |
| CVE-2026-45006 | 8.8 | 0.11% | 1 | 0 | 2026-05-11T18:31:59 | OpenClaw before 2026.4.23 contains an improper access control vulnerability in t | |
| CVE-2026-45004 | 7.8 | 0.01% | 1 | 0 | 2026-05-11T18:31:59 | OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in | |
| CVE-2026-43640 | 8.1 | 0.06% | 1 | 0 | 2026-05-11T18:31:59 | Bitwarden Server prior to v2026.4.1 does not require master-password re-authenti | |
| CVE-2026-33357 | 7.5 | 0.03% | 1 | 0 | 2026-05-11T18:31:55 | In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5. | |
| CVE-2026-25244 | 9.8 | 0.00% | 1 | 0 | 2026-05-11T17:53:48 | ### Summary A command injection vulnerability exists in `@wdio/browserstack-serv | |
| CVE-2026-43500 | 7.8 | 0.01% | 4 | 13 | 2026-05-11T17:16:34.290000 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also | |
| CVE-2026-45109 | 7.5 | 0.00% | 2 | 0 | 2026-05-11T16:21:19 | ### Impact It was found that the fix addressing [CVE-2026-44575](https://githu | |
| CVE-2026-44575 | 7.5 | 0.00% | 4 | 1 | 2026-05-11T15:55:27 | ### Impact App Router applications that rely on middleware or proxy-based check | |
| CVE-2026-44573 | 7.5 | 0.00% | 2 | 1 | 2026-05-11T15:55:26 | ### Impact Applications using the Pages Router with `i18n` configured and middl | |
| CVE-2026-43433 | 7.8 | 0.01% | 1 | 0 | 2026-05-11T09:31:34 | In the Linux kernel, the following vulnerability has been resolved: rust_binder | |
| CVE-2024-27355 | 7.5 | 0.33% | 2 | 0 | 2026-05-08T18:24:30 | ### Impact Any application using that loads untrusted ASN1 files (eg. X509 certi | |
| CVE-2026-7482 | 9.1 | 0.10% | 2 | 4 | 2026-05-08T17:26:03 | Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGU | |
| CVE-2026-41050 | 9.9 | 0.04% | 4 | 0 | 2026-05-07T01:26:07 | ### Impact Fleet's Helm deployer did not fully apply ServiceAccount impersonati | |
| CVE-2026-25243 | 8.8 | 0.09% | 2 | 1 | 2026-05-06T16:16:41.060000 | Redis is an in-memory data structure store. In versions of redis-server up to 8. | |
| CVE-2026-41940 | 9.8 | 74.24% | 9 | 67 | template | 2026-05-04T18:09:42.300000 | cPanel and WHM versions after 11.40 contain an authentication bypass vulnerabili |
| CVE-2026-21535 | 8.2 | 0.09% | 2 | 0 | 2026-02-20T00:31:59 | Improper access control in Microsoft Teams allows an unauthorized attacker to di | |
| CVE-2017-0144 | 8.1 | 94.32% | 2 | 22 | 2025-10-22T00:32:22 | The SMBv1 server in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 | |
| CVE-2025-27421 | 7.5 | 0.19% | 1 | 0 | 2025-03-11T17:18:07 | ## Goroutine Leak in Abacus SSE Implementation ### Summary A critical goroutin | |
| CVE-2026-45411 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-46300 | 0 | 0.00% | 6 | 0 | N/A | ||
| CVE-2026-4798 | 0 | 0.06% | 2 | 0 | N/A | ||
| CVE-2026-3425 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-30893 | 0 | 0.08% | 2 | 0 | N/A | ||
| CVE-2026-23479 | 0 | 0.10% | 2 | 1 | N/A | ||
| CVE-2026-44548 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-4058 | 0 | 0.00% | 2 | 0 | N/A | ||
| CVE-2026-44547 | 0 | 0.03% | 4 | 0 | N/A | ||
| CVE-2026-7261 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-44257 | 0 | 0.21% | 2 | 0 | N/A | ||
| CVE-2026-42854 | 0 | 0.20% | 2 | 0 | N/A | ||
| CVE-2026-42288 | 0 | 0.27% | 2 | 0 | N/A | ||
| CVE-2026-42899 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-32175 | 0 | 0.08% | 1 | 0 | N/A | ||
| CVE-2026-43992 | 0 | 0.03% | 4 | 0 | N/A | ||
| CVE-2026-43991 | 0 | 0.03% | 4 | 0 | N/A | ||
| CVE-2026-43990 | 0 | 0.02% | 2 | 0 | N/A | ||
| CVE-2026-43993 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-8161 | 0 | 0.04% | 2 | 1 | N/A | ||
| CVE-2026-41431 | 0 | 0.04% | 1 | 0 | N/A | ||
| CVE-2026-42858 | 0 | 0.03% | 1 | 0 | N/A |
updated 2026-05-13T19:17:26.997000
2 posts
🔴 CVE-2026-44009 - Critical (9.8)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, This vulnerability is fixed in 3.11.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44009 - Critical (9.8)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, This vulnerability is fixed in 3.11.2.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T19:17:26.827000
2 posts
🔴 CVE-2026-44006 - Critical (10)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, It is possible to reach BaseHandler.getPrototypeOf, which can be used to get arbitrary prototypes. This vulnerability is fixed in 3.11.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44006/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44006 - Critical (10)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, It is possible to reach BaseHandler.getPrototypeOf, which can be used to get arbitrary prototypes. This vulnerability is fixed in 3.11.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44006/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T19:17:26.547000
2 posts
🟠 CVE-2026-44004 - High (7.5)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, sandboxed code can call Buffer.alloc() with an arbitrary size to allocate memory directly on the host heap. Because Buffer.alloc is a synchronous C++ native call, vm2's timeout option ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44004/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44004 - High (7.5)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, sandboxed code can call Buffer.alloc() with an arbitrary size to allocate memory directly on the host heap. Because Buffer.alloc is a synchronous C++ native call, vm2's timeout option ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44004/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T19:17:25.790000
2 posts
🟠 CVE-2026-43998 - High (8.5)
vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the allowed root directory in host context. Because pat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43998 - High (8.5)
vm2 is an open source vm/sandbox for Node.js. In 3.10.5, NodeVM's require.root path restriction can be bypassed using filesystem symlinks, allowing sandboxed code to load modules from outside the allowed root directory in host context. Because pat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T19:17:25.613000
2 posts
🔴 CVE-2026-43997 - Critical (10)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Sy...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43997/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-43997 - Critical (10)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.0, it is possible to obtain the host Object. There are various ways to use the host Object, to escape the sandbox, one example would be using HostObject.getOwnPropertySymbols to obtain Sy...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43997/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:17.630000
1 posts
🚨 CVE-2026-42869 (CRITICAL): socfortress CoPilot <0.1.57 uses a hardcoded JWT secret, letting attackers forge admin tokens and seize control. Upgrade to 0.1.57+ and set JWT_SECRET securely! Details: https://radar.offseq.com/threat/cve-2026-42869-cwe-287-improper-authentication-in--a2c3bf34 #OffSeq #Vuln #CVE #InfoSec
##updated 2026-05-13T18:31:07
4 posts
RE: https://infosec.exchange/@cR0w/116561921535290325
https://security.paloaltonetworks.com/CVE-2026-0263
##This issue requires IKEv2 VPN tunnels that is configured with Post Quantum Cryptography (PQC).
New. These are only the top three:
Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled https://security.paloaltonetworks.com/CVE-2026-0265
CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution https://security.paloaltonetworks.com/CVE-2026-0264
CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing https://security.paloaltonetworks.com/CVE-2026-0263
More https://security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability
##RE: https://infosec.exchange/@cR0w/116561921535290325
https://security.paloaltonetworks.com/CVE-2026-0263
##This issue requires IKEv2 VPN tunnels that is configured with Post Quantum Cryptography (PQC).
New. These are only the top three:
Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled https://security.paloaltonetworks.com/CVE-2026-0265
CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution https://security.paloaltonetworks.com/CVE-2026-0264
CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing https://security.paloaltonetworks.com/CVE-2026-0263
More https://security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability
##updated 2026-05-13T18:31:07
2 posts
🟠 CVE-2026-6281 - High (8.8)
A potential vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user on the local network to execute arbitrary commands on the device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6281/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6281 - High (8.8)
A potential vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user on the local network to execute arbitrary commands on the device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6281/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:06
2 posts
🟠 CVE-2026-40631 - High (8.7)
An authenticated attacker with the Resource Administrator or Administrator role can modify configuration objects through iControl SOAP resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40631 - High (8.7)
An authenticated attacker with the Resource Administrator or Administrator role can modify configuration objects through iControl SOAP resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (EoTS) ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40631/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:06
2 posts
🟠 CVE-2026-40618 - High (7.5)
When an SSL profile is configured on a virtual server on BIG-IP Virtual Edition (VE) without Intel QuickAssist Technology (QAT) or on BIG-IP hardware platforms with the database variable crypto.hwacceleration set to disabled, undisclosed traffic ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40618/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40618 - High (7.5)
When an SSL profile is configured on a virtual server on BIG-IP Virtual Edition (VE) without Intel QuickAssist Technology (QAT) or on BIG-IP hardware platforms with the database variable crypto.hwacceleration set to disabled, undisclosed traffic ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40618/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:06
2 posts
🔴 CVE-2026-41225 - Critical (9.1)
A vulnerability exists in iControl REST where a highly privileged, authenticated attacker with at least the Manager role can create configuration objects that allow running arbitrary commands.
Note: Software versions which have reached End of T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41225/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41225 - Critical (9.1)
A vulnerability exists in iControl REST where a highly privileged, authenticated attacker with at least the Manager role can create configuration objects that allow running arbitrary commands.
Note: Software versions which have reached End of T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41225/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:06
2 posts
🟠 CVE-2026-42409 - High (7.5)
When an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respond command are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42409/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42409 - High (7.5)
When an HTTP/2 profile and an iRule containing the HTTP::redirect or HTTP::respond command are configured on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) process to terminate. Note: Software versio...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42409/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:06
2 posts
🟠 CVE-2026-42406 - High (8.7)
A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands. Note: Software versions...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42406 - High (8.7)
A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Certificate Manager role can modify configuration objects that allow running arbitrary commands. Note: Software versions...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42406/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:06
4 posts
🟠 CVE-2026-42924 - High (8.7)
An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (E...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42924 - High (8.7)
An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (E...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42924 - High (8.7)
An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (E...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42924 - High (8.7)
An authenticated attacker with the Resource Administrator or Administrator role can create SNMP configuration objects through iControl SOAP resulting in privilege escalation. Note: Software versions which have reached End of Technical Support (E...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:05
2 posts
🟠 CVE-2026-39458 - High (7.5)
When a BIG-IP DNS profile enabled with DNS cache is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39458/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39458 - High (7.5)
When a BIG-IP DNS profile enabled with DNS cache is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) a...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39458/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:05
2 posts
🟠 CVE-2026-39455 - High (7.5)
When the BIG-IP Configuration utility is configured to use Lightweight Directory Access Protocol (LDAP) authentication, undisclosed traffic can cause the httpd process to exhaust the available file descriptors. Note: Software versions which ha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39455/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39455 - High (7.5)
When the BIG-IP Configuration utility is configured to use Lightweight Directory Access Protocol (LDAP) authentication, undisclosed traffic can cause the httpd process to exhaust the available file descriptors. Note: Software versions which ha...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39455/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:05
2 posts
🟠 CVE-2026-40423 - High (7.5)
When a SIP profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40423/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40423 - High (7.5)
When a SIP profile is configured on a virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40423/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:05
2 posts
🟠 CVE-2026-40067 - High (7.5)
When a BIG-IP APM access policy is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40067 - High (7.5)
When a BIG-IP APM access policy is configured on a virtual server, undisclosed traffic can cause the apmd process to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40067/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:05
2 posts
🟠 CVE-2026-40061 - High (8.7)
When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40061 - High (8.7)
When BIG-IP DNS is provisioned, a vulnerability exists in an undisclosed iControl REST and BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with the Resource Administrator or Administrator role to execute arbitrary system ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40061/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:05
2 posts
🟠 CVE-2026-40060 - High (7.5)
When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40060/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40060 - High (7.5)
When a BIG-IP Advanced WAF or ASM security policy is configured on a virtual server, undisclosed requests can cause the bd process to terminate.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40060/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:05
2 posts
🟠 CVE-2026-40629 - High (7.5)
When SSL profiles are configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing new client connections. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40629/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40629 - High (7.5)
When SSL profiles are configured on a virtual server, undisclosed traffic can cause the virtual server to stop processing new client connections. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40629/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:31:05
2 posts
🟠 CVE-2026-41956 - High (7.5)
When a classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evalua...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41956/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41956 - High (7.5)
When a classification profile is configured on a UDP virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evalua...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41956/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:30:57
2 posts
🔴 CVE-2026-40621 - Critical (9.8)
ELECOM wireless LAN access point devices do not require authentication to access some specific URLs. The affected product may be operated without authentication.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40621/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-40621 - Critical (9.8)
ELECOM wireless LAN access point devices do not require authentication to access some specific URLs. The affected product may be operated without authentication.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40621/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:30:57
2 posts
🚨 CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26). Remote code execution possible. Restrict network access & monitor pop3wallpasswd. Patch pending. https://radar.offseq.com/threat/cve-2026-32661-stack-based-buffer-overflow-in-cano-fe8551b1 #OffSeq #CVE202632661 #infosec #vuln
##🚨 CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26). Remote code execution possible. Restrict network access & monitor pop3wallpasswd. Patch pending. https://radar.offseq.com/threat/cve-2026-32661-stack-based-buffer-overflow-in-cano-fe8551b1 #OffSeq #CVE202632661 #infosec #vuln
##updated 2026-05-13T18:27:58.823000
4 posts
🟠 CVE-2026-42260 - High (8.2)
Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42260 - High (8.2)
Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42260 - High (8.2)
Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42260 - High (8.2)
Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not reso...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:27:58.823000
2 posts
🔴 CVE-2026-45091 - Critical (9.1)
sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45091/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-45091 - Critical (9.1)
sealed-env is a cross-stack, zero-trust secret management library for Node.js and Java/Spring Boot. In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embedded the operator's literal TOTP secret in the JWS payload of every...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45091/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:24:58.737000
4 posts
🟠 CVE-2026-43938 - High (8.1)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43938 - High (8.1)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43938 - High (8.1)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43938 - High (8.1)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5 and 3.2.12, the application's database logger (YAFNET.Core/Logger/DbLogger.cs) captures the incoming request's User-Agent header into a JObject, serializes it with JsonConvert, an...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43938/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:24:58.737000
2 posts
🟠 CVE-2026-43937 - High (8.8)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43937 - High (8.8)
YetAnotherForum.NET (YAF.NET) is a C# ASP.NET forum. Prior to 4.0.5, Any admin OnPost… handler executes its side effects before the ResultFilterAttribute rewrites the response to a 302 to /Info/4. The most impactful abuse is /Admin/RunSql, whose...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43937/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:17:47.830000
2 posts
🔴 CVE-2026-44008 - Critical (9.8)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method neutralizeArraySpeciesBatch works with objects from the other side but can call into this side via getter on the array prototype exposing objects of the wrong side into ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44008/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44008 - Critical (9.8)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.2, the new method neutralizeArraySpeciesBatch works with objects from the other side but can call into this side via getter on the array prototype exposing objects of the wrong side into ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44008/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:17:47.830000
2 posts
🔴 CVE-2026-44007 - Critical (9.1)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.1, when a NodeVM is created with nesting: true, sandbox code can unconditionally require('vm2') regardless of the outer VM's require configuration — including require: false. With acces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44007 - Critical (9.1)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.1, when a NodeVM is created with nesting: true, sandbox code can unconditionally require('vm2') regardless of the outer VM's require configuration — including require: false. With acces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44007/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:17:47.830000
2 posts
🔴 CVE-2026-44005 - Critical (10)
vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying host objects with otherReflectSet() and otherRef...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44005/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44005 - Critical (10)
vm2 is an open source vm/sandbox for Node.js. From 3.9.6 to 3.10.5, vm2's bridge exposes mutable proxies for real host-realm intrinsic prototypes and then forwards sandbox writes into the underlying host objects with otherReflectSet() and otherRef...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44005/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:17:47.830000
2 posts
New. These are only the top three:
Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled https://security.paloaltonetworks.com/CVE-2026-0265
CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution https://security.paloaltonetworks.com/CVE-2026-0264
CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing https://security.paloaltonetworks.com/CVE-2026-0263
More https://security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability
##New. These are only the top three:
Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled https://security.paloaltonetworks.com/CVE-2026-0265
CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution https://security.paloaltonetworks.com/CVE-2026-0264
CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing https://security.paloaltonetworks.com/CVE-2026-0263
More https://security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability
##updated 2026-05-13T18:17:47.830000
2 posts
New. These are only the top three:
Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled https://security.paloaltonetworks.com/CVE-2026-0265
CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution https://security.paloaltonetworks.com/CVE-2026-0264
CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing https://security.paloaltonetworks.com/CVE-2026-0263
More https://security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability
##New. These are only the top three:
Palo Alto: CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled https://security.paloaltonetworks.com/CVE-2026-0265
CVE-2026-0264 PAN-OS: Heap-Based Buffer Overflow in DNS Proxy and DNS Server Allows Unauthenticated Remote Code Execution https://security.paloaltonetworks.com/CVE-2026-0264
CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing https://security.paloaltonetworks.com/CVE-2026-0263
More https://security.paloaltonetworks.com/ #PaloAlto #infosec #vilnerability
##updated 2026-05-13T18:17:16.127000
2 posts
2 repos
🟠 CVE-2026-44578 - High (8.6)
Next.js is a React framework for building full-stack web applications. From 13.4.13 to before 15.5.16 and 16.2.5, self-hosted applications using the built-in Node.js server can be vulnerable to server-side request forgery through crafted WebSocket...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44578/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44578 - High (8.6)
Next.js is a React framework for building full-stack web applications. From 13.4.13 to before 15.5.16 and 16.2.5, self-hosted applications using the built-in Node.js server can be vulnerable to server-side request forgery through crafted WebSocket...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44578/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T18:17:16.127000
2 posts
3 repos
https://github.com/iamfarzad/fbcounsulting_v2
🟠 CVE-2026-44579 - High (7.5)
Next.js is a React framework for building full-stack web applications. From to before 15.5.16 and 16.2.5, applications using Partial Prerendering through the Cache Components feature can be vulnerable to connection exhaustion through crafted POST...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44579/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44579 - High (7.5)
Next.js is a React framework for building full-stack web applications. From to before 15.5.16 and 16.2.5, applications using Partial Prerendering through the Cache Components feature can be vulnerable to connection exhaustion through crafted POST...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44579/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T17:31:40.840000
2 posts
🔴 CVE-2026-44183 - Critical (9.8)
Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44183/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44183 - Critical (9.8)
Cleanuparr is a tool for automating the cleanup of unwanted or blocked files in Sonarr, Radarr, and supported download clients like qBittorrent. Prior to 2.9.10, TrustedNetworkAuthenticationHandler.ResolveClientIp parses the leftmost entry of the...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44183/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T17:26:28.013000
1 posts
🟠 CVE-2026-42315 - High (8.1)
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, when passing a folder name in the set_package_data() API function call inside the data object with key "_folder", there is no sanitization at all, allowi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42315/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T17:25:25.693000
2 posts
1 repos
🟠 CVE-2026-44574 - High (8.1)
Next.js is a React framework for building full-stack web applications. From 15.4.0 to before 15.5.16 and 16.2.5, applications that rely on middleware to protect dynamic routes can be vulnerable to authorization bypass. In affected deployments, spe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44574/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44574 - High (8.1)
Next.js is a React framework for building full-stack web applications. From 15.4.0 to before 15.5.16 and 16.2.5, applications that rely on middleware to protect dynamic routes can be vulnerable to authorization bypass. In affected deployments, spe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44574/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T17:01:38.423000
2 posts
🟠 CVE-2026-44289 - High (7.5)
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs could recurse without a depth limit while decoding nested protobuf data. This affected both skipping unknown group fields and generated d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44289/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44289 - High (7.5)
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs could recurse without a depth limit while decoding nested protobuf data. This affected both skipping unknown group fields and generated d...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44289/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:32:31.457000
4 posts
🟠 CVE-2026-42266 - High (8.8)
jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42266/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42266 - High (8.8)
jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42266/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42266 - High (8.8)
jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42266/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42266 - High (8.8)
jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. From 4.0.0 to 4.5.6, the allow-list of extensions that can be installed from PyPI Extension Manager (allowed_extensions...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42266/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
4 posts
1 repos
RE: https://infosec.exchange/@cR0w/116568840324508660
Plenty of prerequisites but worth looking into.
https://my.f5.com/manage/s/article/K000161019
##NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. (CVE-2026-42945)
🟠 CVE-2026-42945 - High (8.1)
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42945/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##RE: https://infosec.exchange/@cR0w/116568840324508660
Plenty of prerequisites but worth looking into.
https://my.f5.com/manage/s/article/K000161019
##NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. (CVE-2026-42945)
🟠 CVE-2026-42945 - High (8.1)
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42945/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-40698 - High (8.7)
A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can create SNMP configuration objects through iControl REST or the TMOS shell (tmsh) resulting in p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40698/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-40698 - High (8.7)
A vulnerability exists in BIG-IP and BIG-IQ systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can create SNMP configuration objects through iControl REST or the TMOS shell (tmsh) resulting in p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-40698/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-41227 - High (7.5)
On an HTTP/2 virtual server with Layer 7 DoS Protection configured, undisclosed traffic can result in an increase in memory consumption causing the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41227/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41227 - High (7.5)
On an HTTP/2 virtual server with Layer 7 DoS Protection configured, undisclosed traffic can result in an increase in memory consumption causing the Traffic Management Microkernel (TMM) process to terminate. Note: Software versions which have re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41227/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-41218 - High (7.5)
When BIG-IP PEM iRules are configured on a virtual server (iRules using commands starting with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, and the urlcatquery command), undisclosed traffic can cause the Traffic Management Microkernel (TMM) to term...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41218 - High (7.5)
When BIG-IP PEM iRules are configured on a virtual server (iRules using commands starting with CLASSIFICATION::, CLASSIFY::, PEM::, PSC::, and the urlcatquery command), undisclosed traffic can cause the Traffic Management Microkernel (TMM) to term...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-41217 - High (7.9)
A vulnerability exists in an undisclosed BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with resource administrator or administrator role to execute arbitrary system commands with higher privileges. In Appliance mode dep...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41217/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41217 - High (7.9)
A vulnerability exists in an undisclosed BIG-IP TMOS Shell (tmsh) command that may allow an authenticated attacker with resource administrator or administrator role to execute arbitrary system commands with higher privileges. In Appliance mode dep...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41217/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-41957 - High (8.8)
An authenticated remote code execution vulnerability through undisclosed vectors exists in the BIG-IP and BIG-IQ Configuration utility.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41957/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41957 - High (8.8)
An authenticated remote code execution vulnerability through undisclosed vectors exists in the BIG-IP and BIG-IQ Configuration utility.
Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41957/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-41953 - High (8.7)
A vulnerability exists in BIG-IP systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can modify configuration objects resulting in privilege escalation. Note: Software versions which have reac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41953/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41953 - High (8.7)
A vulnerability exists in BIG-IP systems where a highly privileged, authenticated attacker with at least the Resource Administrator role can modify configuration objects resulting in privilege escalation. Note: Software versions which have reac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41953/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-42930 - High (8.7)
When running in Appliance mode, an authenticated attacker assigned the 'Administrator' role may be able to bypass Appliance mode restrictions on a BIG-IP system.
Note: Software versions which have reached End of Technical Support (EoTS) are not...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42930/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42930 - High (8.7)
When running in Appliance mode, an authenticated attacker assigned the 'Administrator' role may be able to bypass Appliance mode restrictions on a BIG-IP system.
Note: Software versions which have reached End of Technical Support (EoTS) are not...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42930/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-42920 - High (7.5)
When a Client SSL profile is configured with Allow Dynamic Record Sizing on a UDP virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.
Note: Software versions which have reached End of Technical Su...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42920 - High (7.5)
When a Client SSL profile is configured with Allow Dynamic Record Sizing on a UDP virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.
Note: Software versions which have reached End of Technical Su...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42920/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:11.127000
2 posts
🟠 CVE-2026-6282 - High (8.1)
A potential improper file path validation vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user to move or access files belonging to other users on the same device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6282/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6282 - High (8.1)
A potential improper file path validation vulnerability was reported in some Lenovo Personal Cloud Storage devices that could allow a remote authenticated user to move or access files belonging to other users on the same device.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6282/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:27:01
2 posts
🟠 CVE-2026-44167 - High (7.5)
phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44167 - High (7.5)
phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T16:10:57.817000
2 posts
🚨 CVE-2026-44258: CRITICAL OS command injection in efwGrp efw4.X (<4.08.010). Attackers can copy/move files outside home dir, bypassing controls. Upgrade to 4.08.010+ ASAP! https://radar.offseq.com/threat/cve-2026-44258-cwe-78-improper-neutralization-of-s-147a3557 #OffSeq #CVE202644258 #infosec #patchnow
##🚨 CVE-2026-44258: CRITICAL OS command injection in efwGrp efw4.X (<4.08.010). Attackers can copy/move files outside home dir, bypassing controls. Upgrade to 4.08.010+ ASAP! https://radar.offseq.com/threat/cve-2026-44258-cwe-78-improper-neutralization-of-s-147a3557 #OffSeq #CVE202644258 #infosec #patchnow
##updated 2026-05-13T15:52:56.850000
2 posts
🟠 CVE-2026-8108 - High (7.8)
The installation of Fuji Tellus adds a driver to the kernel which grants all users read and write permissions.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8108/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8108 - High (7.8)
The installation of Fuji Tellus adds a driver to the kernel which grants all users read and write permissions.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8108/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T15:52:25.637000
19 posts
1 repos
https://github.com/liamromanis101/Dead.Letter-CVE-2026-45185
🚨 CVE-2026-45185 (Dead.Letter)
Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-45185
#nttdata #zen #secdb #infosec
#deadletter #cve202645185 #exim #gnutls
Krytyczna podatność w Eximie – serwerze pocztowym obsługującym pół Internetu. Znaleziona ze wsparciem AI.
W 2023 roku około 59% publicznych serwerów pocztowych to właśnie Exim. Właśnie załatano oraz opublikowano szczegóły podatności o ksywce Dead Letter, dzięki której atakujący mogą wykonywać kod na serwerze (RCE), bez uwierzytelnienia, w pełni zdalnie. Luka CVE-2026-45185 otrzymała “wycenę” 9.8/10 w skali CVSS. Podatne są Eximy w wersjach od 4.97...
##Exim Security Shock: CVE-2026-45185 Patch Reveals Dangerous Use-After-Free Flaw in GnuTLS Builds
Critical Security Update Exposes Deep Flaws in Email Infrastructure A newly disclosed vulnerability in the Exim mail transfer agent has sent shockwaves through the cybersecurity community after researchers confirmed a serious use-after-free bug tied to BDAT handling in systems built with GnuTLS. The flaw, tracked as CVE-2026-45185, affects Exim versions 4.97 through 4.99.2…
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Discussion: https://news.ycombinator.com/item?id=48111748
XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Patches are out: https://www.exim.org/static/doc/security/EXIM-Security-2026-05-01.1/EXIM-Security-2026-05-01.1.txt
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Comments: https://news.ycombinator.com/item?id=48111748
Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim - https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##🚀 Ah, another day, another #CVE nobody asked for. Humans vs. #AI in a race to exploit #Exim, because *obviously* that's what we need—Skynet learning to hack email servers. 😂 But hey, at least the buzzwords and pentest pitches are here to save us from the tedium of actual #security work. 📉
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim #Skynet #Hacking #HackerNews #ngated
Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
#HackerNews #DeadLetter #CVE202645185 #UnauthenticatedRCE #Exim #LLMVsHumans
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##🚨 CVE-2026-45185 (Dead.Letter)
Exim before 4.99.3, in certain GnuTLS configurations, has a remotely reachable use-after-free in the BDAT body parsing path. It is triggered when a client sends a TLS close_notify mid-body during a CHUNKING transfer, followed by a final cleartext byte on the same TCP connection. This can lead to heap corruption. An unauthenticated network attacker exploiting this vulnerability could execute arbitrary code.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-45185
#nttdata #zen #secdb #infosec
#deadletter #cve202645185 #exim #gnutls
Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Discussion: https://news.ycombinator.com/item?id=48111748
XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Patches are out: https://www.exim.org/static/doc/security/EXIM-Security-2026-05-01.1/EXIM-Security-2026-05-01.1.txt
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
Link: https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Comments: https://news.ycombinator.com/item?id=48111748
🚀 Ah, another day, another #CVE nobody asked for. Humans vs. #AI in a race to exploit #Exim, because *obviously* that's what we need—Skynet learning to hack email servers. 😂 But hey, at least the buzzwords and pentest pitches are here to save us from the tedium of actual #security work. 📉
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim #Skynet #Hacking #HackerNews #ngated
Dead.letter (CVE-2026-45185) Humans vs. LLM for Unauthenticated RCE Race on Exim
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
#HackerNews #DeadLetter #CVE202645185 #UnauthenticatedRCE #Exim #LLMVsHumans
##Dead.Letter (CVE-2026-45185) – How XBOW found an unauthenticated RCE on Exim
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##Dead.Letter (CVE-2026-45185) How XBOW found an unauthenticated RCE on Exim https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
##updated 2026-05-13T15:47:10.327000
2 posts
🔴 CVE-2026-42062 - Critical (9.8)
ELECOM wireless LAN access point devices contain an OS command injection in processing of username parameter. If processing a crafted request, an arbitrary OS command may be executed. No authentication is required.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-42062 - Critical (9.8)
ELECOM wireless LAN access point devices contain an OS command injection in processing of username parameter. If processing a crafted request, an arbitrary OS command may be executed. No authentication is required.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42062/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T15:36:46.970000
1 posts
🔴 CVE-2026-8072 (CRITICAL, 9.2): Ingeteam Ingecon Sun EMS Board uses weak hashing for SAT access credentials, risking privilege escalation. No mitigation yet — review access and monitor for updates. https://radar.offseq.com/threat/cve-2026-8072-cwe-327-use-of-a-broken-or-risky-cry-6e7aa5de #OffSeq #ICS #Vulnerability
##updated 2026-05-13T15:35:35.267000
2 posts
🟠 CVE-2026-25705 - High (8.4)
A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25705/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-25705 - High (8.4)
A vulnerability has been identified in [Rancher's Extensions](https://ranchermanager.docs.rancher.com/integrations-in-rancher/rancher-extensions) where malicious code can be injected in Rancher through a path traversal in the `compressedEndpoint` ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25705/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T15:34:52.573000
1 posts
Microsoft Teams Android Vulnerability (CVE-2026-32185) Exposes Local Spoofing Risk in Enterprise Environments
Introduction A newly identified security vulnerability affecting Microsoft Teams on Android has raised significant concerns across enterprise IT and cybersecurity communities. Tracked as CVE-2026-32185, the flaw reveals how weaknesses in file and directory access handling can be exploited to spoof local devices. Although no active exploitation has been…
##updated 2026-05-13T15:34:52.573000
4 posts
📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE
Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday
##May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...
##checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
updated 2026-05-13T15:34:52.573000
5 posts
📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE
Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday
##May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...
##Microsoft Patch Tuesday 05/2026:
- opravy 120 zranitelností ve Windows, Officech, ale také třeba Malování(!)
- 17 kritických (z toho 14x RCE)
- krom toho mnoho (130+) oprav Edge nebo Teamsů
Velmi zajímavě vypadá zranitelnost CVE-2026-41096 ve Windows DNS klientovi(!), která umožňuje vzdálené spuštění kódu podstrčením připravených DNS odpovědí. S tím bych se vyloženě bál připojit se k sítím s cizím DNS.
##checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
updated 2026-05-13T15:34:52.573000
2 posts
CVE-2026-40361 - Microsoft Word Remote Code Execution Vulnerability:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40361
What's next - and RCE in Notepad?
##CVE-2026-40361 - Microsoft Word Remote Code Execution Vulnerability:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40361
What's next - and RCE in Notepad?
##updated 2026-05-13T15:34:52.573000
2 posts
Even .NET Framework has an update, with its own fixes for CVE-2026-32177 and CVE-2026-35433.
support.microsoft.com/en-us/topic/...
So, start your update engines :)
May 12, 2026-KB5087051 Cumulat...
CVE-2026-35433 – .NET Elevation of Privilege
github.com/dotnet/annou...
Microsoft Security Advisory CV...
updated 2026-05-13T15:34:52.573000
2 posts
Even .NET Framework has an update, with its own fixes for CVE-2026-32177 and CVE-2026-35433.
support.microsoft.com/en-us/topic/...
So, start your update engines :)
May 12, 2026-KB5087051 Cumulat...
CVE-2026-32177 – .NET Elevation of Privilege
github.com/dotnet/annou...
Microsoft Security Advisory CV...
updated 2026-05-13T14:54:50.290000
4 posts
🟠 CVE-2026-43989 - High (8.5)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43989 - High (8.5)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43989 - High (8.5)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43989 - High (8.5)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the upload_wasm MCP tool accepted a filesystem path from the agent and uploaded whatever bytes the path resolved to, with no validation of location, symlink targe...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43989/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T14:50:59.870000
1 posts
🟠 CVE-2026-42860 - High (8.5)
The Open edx Enterprise Service app provides enterprise features to the Open edX platform. From 7.0.2 to 7.0.4, the sync_provider_data endpoint in SAMLProviderDataViewSet fetches SAML metadata from a URL stored in SAMLProviderConfig.metadata_sourc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42860/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T14:44:31.283000
2 posts
🟠 CVE-2026-8159 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8159/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8159 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8159/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T14:43:47.950000
4 posts
🟠 CVE-2026-8162 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8162 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8162 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8162 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a Content-Disposition header whose filename* parameter contains a malformed percent-encoding, the parser ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8162/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T14:19:06
1 posts
🚨 CVE-2026-42882 (CRITICAL): oxyno-zeta s3-proxy <5.0.0 has a path traversal bug, letting unauthenticated attackers bypass auth to access or modify protected S3 objects. Patch to v5.0.0 now! https://radar.offseq.com/threat/cve-2026-42882-cwe-22-improper-limitation-of-a-pat-5be1c7df #OffSeq #CVE202642882 #CloudSecurity #Vuln
##updated 2026-05-13T14:18:25
2 posts
🔥 CVE-2026-42864: CRITICAL vuln in ManoManoTech firefighter-incident (<0.0.54). Missing auth lets attackers fetch arbitrary URLs & exfil AWS creds if IMDSv2 not enforced. Update to 0.0.54+ & check your cloud configs! https://radar.offseq.com/threat/cve-2026-42864-cwe-306-missing-authentication-for--60c5ba57 #OffSeq #CVE202642864 #CloudSecurity
##🔴 CVE-2026-42864 - Critical (9.9)
FireFighter is an incident management application. Prior to 0.0.54, the POST /api/v2/firefighter/raid/jira_bot endpoint (CreateJiraBotView) is reachable without authentication (permission_classes = [permissions.AllowAny]). Its attachments payload ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42864/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T14:17:50
1 posts
🟠 CVE-2026-42313 - High (8.3)
pyLoad is a free and open-source download manager written in Python. Prior to 0.5.0b3.dev100, the set_config_value() API method (@Permission(Perms.SETTINGS)) in src/pyload/core/api/__init__.py gates security-sensitive options behind a hand-maintai...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42313/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-13T14:17:14.120000
2 posts
If you use #dnsmasq on @fedora or @centos Stream - be aware that there are recently disclosed CVEs - https://www.kb.cert.org/vuls/id/471747
@SUSE at least rates one of them a 9.2 on the CVSS 4.0 scale
https://www.suse.com/security/cve/CVE-2026-2291.html
Fedora updates for stable releases are about to hit testing: https://bodhi.fedoraproject.org/updates/?search=dnsmasq-2.92rel2
and if you have the #CentOSHyperscale repo enabled you can `sudo dnf install centos-release-hyperscale-testing && sudo dnf update 'dnsmasq*'`
Please give feedback for the Fedora builds and for the Hyperscale ones if you give them a spin!
https://gitlab.com/CentOS/Hyperscale/rpms/dnsmasq/-/work_items/1
As of the time of posting there is no advisory from #RedHat yet
##If you use #dnsmasq on @fedora or @centos Stream - be aware that there are recently disclosed CVEs - https://www.kb.cert.org/vuls/id/471747
@SUSE at least rates one of them a 9.2 on the CVSS 4.0 scale
https://www.suse.com/security/cve/CVE-2026-2291.html
Fedora updates for stable releases are about to hit testing: https://bodhi.fedoraproject.org/updates/?search=dnsmasq-2.92rel2
and if you have the #CentOSHyperscale repo enabled you can `sudo dnf install centos-release-hyperscale-testing && sudo dnf update 'dnsmasq*'`
Please give feedback for the Fedora builds and for the Hyperscale ones if you give them a spin!
https://gitlab.com/CentOS/Hyperscale/rpms/dnsmasq/-/work_items/1
As of the time of posting there is no advisory from #RedHat yet
##updated 2026-05-13T13:52:16
1 posts
⚠️ CRITICAL: Grav CMS Login plugin (<2.0.0-beta.2) has a flaw in input validation — unauthenticated attackers can self-register as admin.super if registration is enabled. Patch to 2.0.0-beta.2+ or disable registration! CVE-2026-42613 https://radar.offseq.com/threat/cve-2026-42613-cwe-20-improper-input-validation-in-0960c87a #OffSeq #Grav #Infosec
##updated 2026-05-13T00:49:16
2 posts
@winterknight1337 It seems to be rubbish. The vector doesn't reflect the attack at all. For example, the attack needs user interaction, but the vector doesn't include it. Anyhow, we will publish the blog and videos soon (targeting Friday).
##@winterknight1337 It seems to be rubbish. The vector doesn't reflect the attack at all. For example, the attack needs user interaction, but the vector doesn't include it. Anyhow, we will publish the blog and videos soon (targeting Friday).
##updated 2026-05-12T21:31:33
4 posts
🟠 CVE-2026-41712 - High (7.5)
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41712 - High (7.5)
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41712 - High (7.5)
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41712 - High (7.5)
Spring AI's chat memory component contained a problematic default that, when not explicitly overridden, could result in unintended data exposure between users.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41712/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T18:57:02.307000
6 posts
1 repos
Fortinet Patches Critical Remote Code Execution Flaws in FortiAuthenticator and FortiSandbox
Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, which allow unauthenticated attackers to execute remote code on FortiAuthenticator and FortiSandbox systems.
**Plan a very quick patch to these products, Fortinet products are constant targets of hackers. Upgrade FortiAuthenticator to 8.0.3, 6.6.9, or 6.5.7, and FortiSandbox to 5.0.2 or 4.4.9.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/fortinet-patches-critical-remote-code-execution-flaws-in-fortiauthenticator-and-fortisandbox-e-d-3-q-c/gD2P6Ple2L
Fortinet Releases Emergency Security Fixes for FortiAuthenticator and FortiSandbox Remote Code Execution Flaws
Introduction Cybersecurity giant Fortinet has released urgent security patches for two critical vulnerabilities affecting its widely deployed enterprise products, FortiAuthenticator and FortiSandbox. The flaws, identified as CVE-2026-44277 and CVE-2026-26083, could allow attackers to execute arbitrary commands or malicious code on vulnerable systems without…
##Fortinet Disrupts Critical RCE Flaws in FortiSandbox, FortiAuthenticator
Fortinet has patched a critical remote code execution vulnerability in its FortiAuthenticator and FortiSandbox products, which could have allowed unauthenticated attackers to run unauthorized code or commands. The company has released fixed builds to address the flaw, tracked as CVE-2026-44277, and…
#RemoteCodeExecution #Fortiauthenticator #Cve202644277 #Fortinet #IdentityAndAccessManagement
##🔴 CVE-2026-44277 - Critical (9.8)
A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44277/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Fortinet Patches Critical Remote Code Execution Flaws in FortiAuthenticator and FortiSandbox
Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, which allow unauthenticated attackers to execute remote code on FortiAuthenticator and FortiSandbox systems.
**Plan a very quick patch to these products, Fortinet products are constant targets of hackers. Upgrade FortiAuthenticator to 8.0.3, 6.6.9, or 6.5.7, and FortiSandbox to 5.0.2 or 4.4.9.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/fortinet-patches-critical-remote-code-execution-flaws-in-fortiauthenticator-and-fortisandbox-e-d-3-q-c/gD2P6Ple2L
🔴 CVE-2026-44277 - Critical (9.8)
A improper access control vulnerability in Fortinet FortiAuthenticator 8.0.2, FortiAuthenticator 8.0.0, FortiAuthenticator 6.6.0 through 6.6.8, FortiAuthenticator 6.5.0 through 6.5.6 may allow attacker to execute unauthorized code or commands via
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44277/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T18:30:45
3 posts
Fortinet Patches Critical Remote Code Execution Flaws in FortiAuthenticator and FortiSandbox
Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, which allow unauthenticated attackers to execute remote code on FortiAuthenticator and FortiSandbox systems.
**Plan a very quick patch to these products, Fortinet products are constant targets of hackers. Upgrade FortiAuthenticator to 8.0.3, 6.6.9, or 6.5.7, and FortiSandbox to 5.0.2 or 4.4.9.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/fortinet-patches-critical-remote-code-execution-flaws-in-fortiauthenticator-and-fortisandbox-e-d-3-q-c/gD2P6Ple2L
Fortinet Releases Emergency Security Fixes for FortiAuthenticator and FortiSandbox Remote Code Execution Flaws
Introduction Cybersecurity giant Fortinet has released urgent security patches for two critical vulnerabilities affecting its widely deployed enterprise products, FortiAuthenticator and FortiSandbox. The flaws, identified as CVE-2026-44277 and CVE-2026-26083, could allow attackers to execute arbitrary commands or malicious code on vulnerable systems without…
##Fortinet Patches Critical Remote Code Execution Flaws in FortiAuthenticator and FortiSandbox
Fortinet patched two critical vulnerabilities, CVE-2026-44277 and CVE-2026-26083, which allow unauthenticated attackers to execute remote code on FortiAuthenticator and FortiSandbox systems.
**Plan a very quick patch to these products, Fortinet products are constant targets of hackers. Upgrade FortiAuthenticator to 8.0.3, 6.6.9, or 6.5.7, and FortiSandbox to 5.0.2 or 4.4.9.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/fortinet-patches-critical-remote-code-execution-flaws-in-fortiauthenticator-and-fortisandbox-e-d-3-q-c/gD2P6Ple2L
updated 2026-05-12T18:30:44
1 posts
Your hardware's software has CVEs too!
www.cve.org/CVERecord?id...
cve.org/CVERecord?id=C...
updated 2026-05-12T18:30:37
2 posts
Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
https://xint.io/blog/kernel-vulnerabilities-ios-ipados
Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
https://xint.io/blog/kernel-vulnerabilities-ios-ipados
updated 2026-05-12T17:48:21.643000
2 posts
Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution
PHP released emergency updates to fix five vulnerabilities, including two critical use-after-free flaws (CVE-2026-6722 and CVE-2026-7261) that allow unauthenticated remote code execution via the SOAP extension.
**If you run PHP on your web servers, update immediately to version 8.2.31, 8.3.31, 8.4.21, or 8.5.6. If you can't patch right away, disable the SOAP extension as a temporary measure until the update is applied.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-php-soap-extension-vulnerabilities-enable-remote-code-execution-g-4-t-d-9/gD2P6Ple2L
Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution
PHP released emergency updates to fix five vulnerabilities, including two critical use-after-free flaws (CVE-2026-6722 and CVE-2026-7261) that allow unauthenticated remote code execution via the SOAP extension.
**If you run PHP on your web servers, update immediately to version 8.2.31, 8.3.31, 8.4.21, or 8.5.6. If you can't patch right away, disable the SOAP extension as a temporary measure until the update is applied.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-php-soap-extension-vulnerabilities-enable-remote-code-execution-g-4-t-d-9/gD2P6Ple2L
updated 2026-05-12T16:48:58.260000
1 posts
🟠 CVE-2026-8177 - High (7.5)
XML::LibXML versions through 2.0210 for Perl read out-of-bounds heap memory when parsing XML node names containing truncated UTF-8 byte sequences.
A node name ending in the middle of a multi byte UTF-8 sequence causes the parser to read past the ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8177/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T16:47:58.570000
2 posts
🟠 CVE-2026-6001 - High (8.8)
Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers.
This issue affects BAPSİS: before v.202604152042.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6001 - High (8.8)
Authorization bypass through User-Controlled key vulnerability in ABIS Technology Ltd. Co. BAPSİS allows Exploitation of Trusted Identifiers.
This issue affects BAPSİS: before v.202604152042.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6001/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T16:38:24.040000
4 posts
til that Ivanti doesn't just make insecure endpoint management software. they also make insecure reporting software :neobot_giggle:
##🔴 CVE-2026-8043 - Critical (9.6)
External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8043/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##til that Ivanti doesn't just make insecure endpoint management software. they also make insecure reporting software :neobot_giggle:
##🔴 CVE-2026-8043 - Critical (9.6)
External control of a file name in Ivanti Xtraction before version 2026.2 allows a remote authenticated attacker to read sensitive files and write arbitrary HTML files to a web directory, leading to information disclosure and possible client-side ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8043/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:32:40
2 posts
Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
https://xint.io/blog/kernel-vulnerabilities-ios-ipados
Here is a brief overview of two kernel-level vulnerabilities uncovered by Xint Code in iOS and iPadOS and now patched: CVE-2026-28972 and CVE-2026-28986
https://xint.io/blog/kernel-vulnerabilities-ios-ipados
updated 2026-05-12T15:31:52
2 posts
🟠 CVE-2026-8111 - High (8.8)
SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8111/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8111 - High (8.8)
SQL injection in the web console of Ivanti Endpoint Manager before version 2024 SU6 allows a remote authenticated attacker to achieve remote code execution.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8111/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:31:49
4 posts
🟠 CVE-2026-8110 - High (7.8)
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8110/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8110 - High (7.8)
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8110/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8110 - High (7.8)
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8110/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8110 - High (7.8)
Incorrect permissions assignment in the agent of Ivanti Endpoint Manager before version 2024 SU6 allows a local authenticated attacker to escalate their privileges.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8110/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:31:49
2 posts
🟠 CVE-2026-35071 - High (8.2)
Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35071/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35071 - High (8.2)
Dell PowerScale InsightIQ, versions 6.0.0 through 6.2.0, contains an improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability. A high privileged attacker with local access could potentially exploit t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35071/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:31:48
2 posts
🟠 CVE-2026-7432 - High (7.8)
A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7432 - High (7.8)
A race condition in Ivanti Secure Access Client before 22.8R6 allows a locally authenticated user to escalate privileges to SYSTEM
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:31:18
1 posts
100 repos
https://github.com/ExploitEoom/CVE-2026-31431
https://github.com/rvizx/CVE-2026-31431
https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail
https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs
https://github.com/SilverRuler/copy-fail-CVE-2026-31431
https://github.com/Linux-zs/cve-2026-31431-mitigation
https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection
https://github.com/ncmprbll/copy-fail-rs
https://github.com/Smarttfoxx/copyfail
https://github.com/Dabbleam/CVE-2026-31431-mitigation
https://github.com/lonelyor/CVE-2026-31431-exp
https://github.com/yxdm02/CVE-2026-31431
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC
https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431
https://github.com/wgnet/wg.copyfail.patch
https://github.com/atgreen/block-copyfail
https://github.com/Xerxes-2/CVE-2026-31431-rs
https://github.com/freelabz/CVE-2026-31431
https://github.com/pascal-gujer/CVE-2026-31431
https://github.com/cozystack/copy-fail-blocker
https://github.com/badsectorlabs/copyfail-go
https://github.com/samanzamani/copy-fail-checker
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431
https://github.com/wuwu001/CVE-2026-31431-exploit
https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431
https://github.com/pedromizz/copy-fail
https://github.com/bigwario/copy-fail-CVE-2026-31431-C
https://github.com/SeanRickerd/cve-2026-31431
https://github.com/gbonacini/CVE-2026-31431
https://github.com/wesmar/CVE-2026-31431
https://github.com/Huchangzhi/autorootlinux
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://github.com/EynaExp/Copy-Fail-CVE-2026-31431-modernized
https://github.com/darioomatos/cve-2026-31431-copyfail
https://github.com/mCub3/CVE-2026-31431
https://github.com/XsanFlip/CVE-2026-31431-Patch
https://github.com/tgies/copy-fail-c
https://github.com/Alfredooe/CVE-2026-31431
https://github.com/desultory/CVE-2026-31431
https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite
https://github.com/bootsareme/copyfail-deconstructed
https://github.com/rootsecdev/cve_2026_31431
https://github.com/ashok523/cve-2026-31431
https://github.com/qi4L/CVE-2026-31431-Container-Escape
https://github.com/diemoeve/copyfail-rs
https://github.com/G01d3nW01f/CVE-2026-31431
https://github.com/Sl4cK0TH/CVE-2026-31431-PoC
https://github.com/sudoytang/copyfail-arm64
https://github.com/krisiasty/vcheck
https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation
https://github.com/AdityaBhatt3010/CVE-2026-31431
https://github.com/Dullpurple-sloop726/CVE-2026-31431-Linux-Copy-Fail
https://github.com/suominen/CVE-2026-31431
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/polyakovavv/copyfail
https://github.com/ben-slates/CVE-2026-31431-Exploit
https://github.com/adysec/cve-2026-31431
https://github.com/sgkdev/page_inject
https://github.com/sec17br/CVE-2026-31431-Copy-Fail
https://github.com/malwarekid/CVE-2026-31431
https://github.com/0xShe/CVE-2026-31431
https://github.com/cyber-joker/copy-fail-python
https://github.com/xn0kkx/CVE-2026-31431_CopyFail_LinuxKernel_LPE
https://github.com/toxy4ny/copy-fail-exploit-on-c-redteam
https://github.com/MartinPham/copy-fail-CVE-2026-31431-php
https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431
https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431
https://github.com/Boos4721/copyfail-rs
https://github.com/gagaltotal/cve-2026-31431-copy-fail
https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe
https://github.com/JuanBindez/CVE-2026-31431
https://github.com/0xBlackash/CVE-2026-31431
https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE
https://github.com/ZephrFish/CopyFail-CVE-2026-31431
https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit
https://github.com/H1d3r/copy-fail_LPE_Interactive
https://github.com/abdullaabdullazade/CVE-2026-31431
https://github.com/AliHzSec/CVE-2026-31431
https://github.com/kadir/copy-fail-CVE-2026-31431-IOC
https://github.com/aestechno/cve-2026-31431-ansible
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC
https://github.com/professional-slacker/alg_check
https://github.com/ErdemOzgen/copy-fail-cve-2026-31431
https://github.com/theori-io/copy-fail-CVE-2026-31431
https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit
https://github.com/jbnetwork-git/copy-fail-check
https://github.com/wvverez/CVE-2026-31431-Copy-Fail
https://github.com/0xN7y/CVE-2026-31431
https://github.com/philfry/cve-2026-31431-ftrace
https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script
https://github.com/rfxn/copyfail
https://github.com/RoflSecurity/copy_fail
https://github.com/povzayd/CVE-2026-31431
https://github.com/b5null/CVE-2026-31431-C
https://github.com/sammwyy/copyfail-rs
https://github.com/mrunalp/block-copyfail
https://github.com/MrAriaNet/cPanel-Fix
https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431
https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431
updated 2026-05-12T15:11:29.503000
2 posts
🟠 CVE-2026-7256 - High (8.8)
** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7256/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7256 - High (8.8)
** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI program of Zyxel WRE6505 v2 firmware version V1.00(ABDV.3)C0 could allow an adjacent attacker on the LAN to execute operating system (OS) commands on a vulnerable device ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7256/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:06:24
2 posts
🟠 CVE-2026-44295 - High (8.7)
protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbjs static code generation could emit unsafe JavaScript identifiers derived from schema-controlled names. When generating static JavaScript from a crafted schema...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44295/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44295 - High (8.7)
protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbjs static code generation could emit unsafe JavaScript identifiers derived from schema-controlled names. When generating static JavaScript from a crafted schema...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44295/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:01:25
2 posts
🟠 CVE-2026-44291 - High (8.1)
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs used plain objects with inherited prototypes for internal type lookup tables used by generated encode and decode functions. If Object.pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44291/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44291 - High (8.1)
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs used plain objects with inherited prototypes for internal type lookup tables used by generated encode and decode functions. If Object.pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44291/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T15:01:15
2 posts
🟠 CVE-2026-44290 - High (7.5)
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs allowed certain schema option paths to traverse through inherited object properties while applying options. A crafted protobuf schema or ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44290/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44290 - High (7.5)
protobufjs compiles protobuf definitions into JavaScript (JS) functions. Prior to 7.5.6 and 8.0.2, protobufjs allowed certain schema option paths to traverse through inherited object properties while applying options. A crafted protobuf schema or ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44290/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:59:46
2 posts
🟠 CVE-2026-42290 - High (7.8)
protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbts invoked JSDoc by building a shell command string from input file paths and executing it through child_process.exec. File paths containing shell metacharacter...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42290/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42290 - High (7.8)
protobufjs-cli is the command line add-on for protobuf.js. Prior to 1.2.1 and 2.0.2, pbts invoked JSDoc by building a shell command string from input file paths and executing it through child_process.exec. File paths containing shell metacharacter...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42290/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
3 posts
📰 Siemens Patches Critical Flaws in SIMATIC S7 PLCs, RUGGEDCOM Devices
Siemens drops 18 security advisories for ICS Patch Tuesday, fixing critical flaws in SIMATIC S7 PLCs and RUGGEDCOM devices. Key bugs (CVE-2026-25786, CVE-2026-25787) could lead to device takeover. 🏭 #ICSsecurity #OTsecurity #Siemens #PLC
##🔴 CVE-2026-25787 - Critical (9.1)
Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25787 - Critical (9.1)
Affected devices do not properly validate and sanitize Technology Object (TO) name rendered on the "Motion Control Diagnostics" page of the web interface. This could allow an authenticated attacker who is authorized to download a TIA project into ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25787/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
5 posts
🔴 CVE-2026-34260 - Critical (9.6)
SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws
SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.
**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-security-patch-day-may-2026-critical-rce-and-sql-injection-flaws-w-6-7-x-n/gD2P6Ple2L
🔴 CVE-2026-34260 - Critical (9.6)
SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user i...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34260/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws
SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.
**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-security-patch-day-may-2026-critical-rce-and-sql-injection-flaws-w-6-7-x-n/gD2P6Ple2L
🚨 CRITICAL: SQL injection (CVE-2026-34260, CVSS 9.6) in SAP S/4HANA (SAP_BASIS 751-816). Authenticated attackers can access sensitive data & crash apps. No patch yet — restrict access & monitor logs. https://radar.offseq.com/threat/cve-2026-34260-cwe-89-improper-neutralization-of-s-4864cd58 #OffSeq #SAP #Infosec #SQLInjection
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2025-40946 - High (8.3)
A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All ver...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40946/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-40946 - High (8.3)
A vulnerability has been identified in blueplanet 100 NX3 M8 (All versions), blueplanet 100 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 105 TL3 (All versions), blueplanet 105 TL3 GEN2 (All versions < V6.1.4.9), blueplanet 110 TL3 (All ver...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40946/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🔴 CVE-2026-22924 - Critical (9.1)
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.
This could allow an attacker to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-22924 - Critical (9.1)
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application does not properly restrict unauthenticated connections and is susceptible to resource exhaustion conditions.
This could allow an attacker to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22924/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2026-22925 - High (7.5)
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets
This could allow an attacker to render the service un...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22925/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22925 - High (7.5)
A vulnerability has been identified in SIMATIC CN 4100 (All versions < V5.0). The affected application is susceptible to resource exhaustion when subjected to high volume of TCP SYN packets
This could allow an attacker to render the service un...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22925/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2026-27662 - High (7.7)
Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place.
This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potenti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27662 - High (7.7)
Affected devices do not properly restrict access to the web browser via the Control Panel when no corresponding security mechanisms are in place.
This could allow an unauthenticated attacker to gain unauthorized access to the web browser, potenti...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27662/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:19:41.400000
2 posts
🟠 CVE-2026-44412 - High (7.8)
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.
This could allow an attacker to execut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44412 - High (7.8)
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected applications contain a stack based overflow vulnerability while parsing specially crafted PAR files.
This could allow an attacker to execut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44412/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:15:46.747000
1 posts
#OT #Advisory VDE-2026-042
CODESYS Modbus TCP Server - Improper resource management
CODESYS Modbus is an add‑on for the CODESYS Development System that provides a fully integrated Modbus protocol stack along with diagnostic capabilities. A flaw in the CODESYS Modbus TCP Server protocol stack library results in a vulnerability. When a Modbus TCP server is configured, this vulnerable protocol stack is downloaded to and executed by CODESYS Control runtime systems.
#CVE CVE-2026-35227
https://certvde.com/en/advisories/vde-2026-042/
#CSAF https://codesys.csaf-tp.certvde.com/.well-known/csaf/white/2026/advisory2026-05_vde-2026-042.json
##updated 2026-05-12T14:15:46.747000
1 posts
🟠 CVE-2026-4890 - High (7.5)
A Denial of Service (DoS) vulnerability in the DNSSEC validation of dnsmasq allows remote attackers to cause a denial of service via a crafted DNS packet.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4890/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:10:27.343000
1 posts
🟠 CVE-2026-43434 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: check ownership before using vma
When installing missing pages (or zapping them), Rust Binder will look
up the vma in the mm by address, and then call vm_insert_pag...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43434/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:10:27.343000
1 posts
🟠 CVE-2026-43441 - High (7.5)
In the Linux kernel, the following vulnerability has been resolved:
net: bonding: Fix nd_tbl NULL dereference when IPv6 is disabled
When booting with the 'ipv6.disable=1' parameter, the nd_tbl is never
initialized because inet6_init() exits befo...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43441/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:03:52.757000
4 posts
🟠 CVE-2026-45213 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45213 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45213 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45213 - High (7.6)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 BEAR woo-bulk-editor allows Blind SQL Injection.This issue affects BEAR: from n/a through <= 1.1.7.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45213/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T14:03:52.757000
2 posts
🟠 CVE-2026-42742 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through <= 3.4.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42742/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42742 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Views for WPForms views-for-wpforms-lite allows Blind SQL Injection.This issue affects Views for WPForms: from n/a through <= 3.4.6.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42742/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:32
4 posts
@eshard Very clever write-up from @eshard team on adding a missing USB-Ethernet peripheral to QEMU (SMSC LAN9514) to enable Time Travel Analysis of CVE-2019-14192 on unmodified RPi 3B+ U-Boot firmware.
Using the U-Boot driver as the hardware spec is such an elegant trick. Sparked some ideas for things I'm working on. Thanks for sharing it !
##Missing peripheral in QEMU? Adding it yourself is easier than you think.
We hit a wall analyzing CVE-2019-14192 on real Raspberry Pi 3B+ firmware, so we added the missing driver to #QEMU. Register by register, using U-Boot's own source as the spec.
##@eshard Very clever write-up from @eshard team on adding a missing USB-Ethernet peripheral to QEMU (SMSC LAN9514) to enable Time Travel Analysis of CVE-2019-14192 on unmodified RPi 3B+ U-Boot firmware.
Using the U-Boot driver as the hardware spec is such an elegant trick. Sparked some ideas for things I'm working on. Thanks for sharing it !
##Missing peripheral in QEMU? Adding it yourself is easier than you think.
We hit a wall analyzing CVE-2019-14192 on real Raspberry Pi 3B+ firmware, so we added the missing driver to #QEMU. Register by register, using U-Boot's own source as the spec.
##updated 2026-05-12T12:32:23
2 posts
🟠 CVE-2026-42741 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views – Display & Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42741/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42741 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views – Display & Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42741/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
3 posts
📰 Siemens Patches Critical Flaws in SIMATIC S7 PLCs, RUGGEDCOM Devices
Siemens drops 18 security advisories for ICS Patch Tuesday, fixing critical flaws in SIMATIC S7 PLCs and RUGGEDCOM devices. Key bugs (CVE-2026-25786, CVE-2026-25787) could lead to device takeover. 🏭 #ICSsecurity #OTsecurity #Siemens #PLC
##🔴 CVE-2026-25786 - Critical (9.1)
Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25786/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25786 - Critical (9.1)
Affected devices do not properly validate and sanitize PLC/station name rendered on the "communication" parameters page of the web interface.
This could allow an authenticated attacker who is authorized to download a TIA project into the product,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25786/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2025-40947 - High (7.5)
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGED...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40947/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-40947 - High (7.5)
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGED...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40947/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-33893 - High (7.5)
A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.0014), Teamcenter V2406 (All versions < V2406.0012), Teamcenter V2412 (All versions < V2412.0009), Teamcenter V2506 (All versions < V2506.0005), Teamcenter V...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33893/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-33893 - High (7.5)
A vulnerability has been identified in Teamcenter V2312 (All versions < V2312.0014), Teamcenter V2406 (All versions < V2406.0012), Teamcenter V2412 (All versions < V2412.0009), Teamcenter V2506 (All versions < V2506.0005), Teamcenter V...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33893/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-44411 - High (7.8)
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44411/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44411 - High (7.8)
A vulnerability has been identified in Solid Edge SE2026 (All versions < V226.0 Update 5). The affected application is vulnerable to uninitialized pointer access while parsing specially crafted PAR files. An attacker could leverage this vulnera...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44411/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🔴 CVE-2026-41551 - Critical (9.1)
A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized.
This could allow a remote attacker to access arbitrary files on the dev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41551 - Critical (9.1)
A vulnerability has been identified in ROS# (All versions < V2.2.2). Affected versions contain a path traversal vulnerability because user input is not properly sanitized.
This could allow a remote attacker to access arbitrary files on the dev...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
4 posts
🟠 CVE-2026-2465 - High (8.8)
Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.
This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2465 - High (8.8)
Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.
This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2465 - High (8.8)
Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.
This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2465 - High (8.8)
Incorrect Authorization vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard FOR-S allows Privilege Escalation.
This issue affects Turboard FOR-S: from 7.01.2026 before 18.02.2026.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2465/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
4 posts
🟠 CVE-2026-45214 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45214 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45214 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45214 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Xpro Xpro Elementor Addons xpro-elementor-addons allows Blind SQL Injection.This issue affects Xpro Elementor Addons: from n/a through <= 1.5.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45214/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-41713 - High (8.2)
A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41713 - High (8.2)
A malicious user could craft input that is stored in conversation memory and later interpreted by the model in an unintended way. Applications using the affected advisor with user-controlled input may be susceptible to manipulation of model behavi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41713/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-45211 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45211/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45211 - High (8.5)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saad Iqbal APIExperts Square for WooCommerce woosquare allows Blind SQL Injection.This issue affects APIExperts Square for WooCommerce: from n/a ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45211/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:22
2 posts
🟠 CVE-2026-45218 - High (7.7)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through <= 11.4.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45218 - High (7.7)
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WP Travel WP Travel wp-travel allows Blind SQL Injection.This issue affects WP Travel: from n/a through <= 11.4.0.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45218/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:21
2 posts
🟠 CVE-2025-40833 - High (7.5)
The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-40833 - High (7.5)
The affected devices contain a null pointer dereference vulnerability while processing specially crafted IPv4 requests. This could allow an attacker to cause denial of service condition. A manual restart is required to recover the system.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40833/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:14
2 posts
🔴 CVE-2025-6577 - Critical (9.8)
Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection.
This issue affects E-Commerce Website: before 4.5.001.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6577/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-6577 - Critical (9.8)
Improper neutralization of special elements used in an SQL command ('SQL injection') vulnerability in Akilli Commerce Software Technologies Ltd. Co. E-Commerce Website allows SQL Injection.
This issue affects E-Commerce Website: before 4.5.001.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-6577/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T12:32:14
2 posts
🔴 CVE-2025-40949 - Critical (9.1)
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGED...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40949/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2025-40949 - Critical (9.1)
A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions < V2.17.1), RUGGEDCOM ROX MX5000RE (All versions < V2.17.1), RUGGEDCOM ROX RX1400 (All versions < V2.17.1), RUGGEDCOM ROX RX1500 (All versions < V2.17.1), RUGGED...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-40949/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T09:31:33
2 posts
🟠 CVE-2026-2993 - High (7.5)
The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing S...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-2993 - High (7.5)
The AI Chatbot & Workflow Automation by AIWU plugin for WordPress is vulnerable to SQL Injection in versions up to, and including, 1.4.17 due to insufficient escaping on user supplied parameters and lack of sufficient preparation on the existing S...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-2993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T09:31:31
3 posts
🟠 CVE-2026-39432 - High (8.2)
Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.
This issue affects Timetics: from n/a through 1.0.53.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39432 - High (8.2)
Missing Authorization vulnerability in Arraytics Timetics allows Exploiting Incorrectly Configured Access Control Security Levels.
This issue affects Timetics: from n/a through 1.0.53.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39432/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔍 HIGH severity: CVE-2026-39432 in Arraytics Timetics ≤1.0.53 — Missing authorization (CWE-862) enables potential data exposure. No patch available yet. Restrict access, monitor advisories. https://radar.offseq.com/threat/cve-2026-39432-cwe-862-missing-authorization-in-ar-e310bf2a #OffSeq #Cybersecurity #Vuln #CVE202639432
##updated 2026-05-12T06:31:46
2 posts
🟠 CVE-2026-7287 - High (7.5)
** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-7287 - High (7.5)
** UNSUPPORTED WHEN ASSIGNED ** A buffer overflow vulnerability in the formWep(), formWlAc(), formPasswordSetup(), formUpgradeCert(), and formDelcert() functions of the “webs” binary in Zyxel NWA1100-N customized firmware version 1.00(AACE.1)C...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7287/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T03:31:33
2 posts
🟠 CVE-2026-34259 - High (8.2)
Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-34259 - High (8.2)
Due to an OS Command Execution vulnerability in SAP Forecasting & Replenishment, an authenticated attacker with administrative authorizations could abuse a non-remote-enabled function to execute arbitrary operating system commands. Successful expl...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34259/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-12T03:31:32
5 posts
🔴 CVE-2026-34263 - Critical (9.6)
Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34263/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws
SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.
**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-security-patch-day-may-2026-critical-rce-and-sql-injection-flaws-w-6-7-x-n/gD2P6Ple2L
🔴 CVE-2026-34263 - Critical (9.6)
Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentia...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34263/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##SAP Security Patch Day May 2026: Critical RCE and SQL Injection Flaws
SAP's May 2026 security update addresses 15 vulnerabilities, including two critical flaws (CVE-2026-34263 and CVE-2026-34260) that allow unauthenticated remote code execution and SQL injection.
**If you are using SAP products, review the advisory in detail. Prioritize patching the critical missing authentication check in SAP Commerce Cloud and the critical SQL injection vulnerability in SAP S/4HANA Enterprise Search for ABAP, followed by the high-severity OS command injection in SAP Forecasting & Replenishment. Then review the rest of the issues.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/sap-security-patch-day-may-2026-critical-rce-and-sql-injection-flaws-w-6-7-x-n/gD2P6Ple2L
🚨 CRITICAL (CVSS 9.6): CVE-2026-34263 hits SAP Commerce Cloud (HY_COM 2205, COM_CLOUD 2211/JDK21). Unauthenticated attackers can upload configs & inject code — full server compromise risk. Monitor & restrict config uploads! https://radar.offseq.com/threat/cve-2026-34263-cwe-459-incomplete-cleanup-in-sapse-30ad114e #OffSeq #SAP #Vuln
##updated 2026-05-11T21:31:46
1 posts
🟠 CVE-2026-45223 - High (8.8)
Crabbox before 0.9.0 contains an authentication bypass vulnerability in the coordinator user-token verification path where the verifyUserToken() function fails to reject payloads containing an admin claim, allowing attackers to escalate privileges...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45223/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:59
2 posts
📰 High-Severity Flaw in JetBrains TeamCity On-Premises Allows API Exposure (CVE-2026-44413)
PATCH NOW: A high-severity vulnerability (CVE-2026-44413) in JetBrains TeamCity On-Premises allows any authenticated user to expose server APIs. All versions up to 2025.11.4 are affected. Upgrade to 2026.1 immediately. 💻🔧 #TeamCity #JetBrains #CI/CD
##🟠 CVE-2026-44413 - High (8.2)
In JetBrains TeamCity before 2026.1
2025.11.5 authenticated users could expose server API to unauthorised access
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44413/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:59
1 posts
🟠 CVE-2026-43639 - High (8)
Bitwarden Server prior to v2026.4.0 contains a missing authorization vulnerability that allows a provider service user to add an arbitrary organization to their provider via `POST /providers/{providerId}/clients/existing`, resulting in takeover of...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43639/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:59
1 posts
🟠 CVE-2026-45006 - High (8.8)
OpenClaw before 2026.4.23 contains an improper access control vulnerability in the gateway tool's config.apply and config.patch operations that allows compromised models to write unsafe configuration changes by bypassing an incomplete denylist pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45006/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:59
1 posts
🟠 CVE-2026-45004 - High (7.8)
OpenClaw before 2026.4.23 contains an arbitrary code execution vulnerability in the bundled plugin setup resolver that loads setup-api.js from process.cwd() during provider setup metadata resolution. Attackers can execute arbitrary JavaScript unde...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45004/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:59
1 posts
🟠 CVE-2026-43640 - High (8.1)
Bitwarden Server prior to v2026.4.1 does not require master-password re-authentication when retrieving or rotating an organization's SCIM API key, allowing an authenticated user with SCIM management privileges to obtain the key using only a valid ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43640/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T18:31:55
1 posts
🟠 CVE-2026-33357 - High (7.5)
In Meari client applications embedding "com.meari.sdk" (including CloudEdge 5.5.0 build 220, Arenti 1.8.1 build 220, and related white-label <= 1.8.x), the integrated call path to openapi-euce.mearicloud.com can be abused to retrieve WAN IP dat...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-33357/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T17:53:48
1 posts
📰 WebdriverIO Flaw (CVSS 9.8) Allows CI/CD Takeover via Malicious Git Branches
Critical 9.8 CVSS command injection flaw (CVE-2026-25244) found in WebdriverIO. Malicious git branch names can lead to CI/CD server takeover. If you use @wdio/browserstack-service, update immediately! 🚨 #CyberSecurity #SupplyChain #DevSecOps
##updated 2026-05-11T17:16:34.290000
4 posts
13 repos
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/linnemanlabs/dirtyfrag-arm64
https://github.com/haydenjames/dirty-frag-check
https://github.com/AK777177/Dirty-Frag-Analysis
https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
https://github.com/XRSecCD/202605_dirty_frag
https://github.com/metalx1993/dirtyfrag-patches
https://github.com/liamromanis101/DirtyFrag-Detector
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
https://github.com/vorkampfer/dirty_frag_mitigation
Load-Bearing Assumptions: the rxrpc case (CVE-2026-43500) and the constraint that was never there https://lobste.rs/s/tuiapt #linux #security
https://www.linkedin.com/pulse/load-bearing-assumptions-rxrpc-case-cve-2026-43500-never-oldani-uzyae
Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧
🔗 https://itsfoss.com/news/linux-fully-patches-dirty-frag-exploit/
#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech
##Load-Bearing Assumptions: the rxrpc case (CVE-2026-43500) and the constraint that was never there https://lobste.rs/s/tuiapt #linux #security
https://www.linkedin.com/pulse/load-bearing-assumptions-rxrpc-case-cve-2026-43500-never-oldani-uzyae
Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧
🔗 https://itsfoss.com/news/linux-fully-patches-dirty-frag-exploit/
#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech
##updated 2026-05-11T16:21:19
2 posts
🟠 CVE-2026-45109 - High (7.5)
Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts with Turbopack. This vulnerability is fixed in 15.5...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45109/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45109 - High (7.5)
Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts with Turbopack. This vulnerability is fixed in 15.5...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45109/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T15:55:27
4 posts
1 repos
🟠 CVE-2026-45109 - High (7.5)
Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts with Turbopack. This vulnerability is fixed in 15.5...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45109/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44575 - High (7.5)
Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.16 and 16.2.5, App Router applications that rely on middleware or proxy-based checks for authorization can allow unauthorized access through transpor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44575/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45109 - High (7.5)
Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.18 and 16.2.6, it was found that the fix addressing CVE-2026-44575 did not apply to middleware.ts with Turbopack. This vulnerability is fixed in 15.5...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45109/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44575 - High (7.5)
Next.js is a React framework for building full-stack web applications. From 15.2.0 to before 15.5.16 and 16.2.5, App Router applications that rely on middleware or proxy-based checks for authorization can allow unauthorized access through transpor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44575/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T15:55:26
2 posts
1 repos
🟠 CVE-2026-44573 - High (7.5)
Next.js is a React framework for building full-stack web applications. From 12.2.0 to before 15.5.16 and 16.2.5, Applications using the Pages Router with i18n configured and middleware/proxy-based authorization can allow unauthorized access to pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44573/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44573 - High (7.5)
Next.js is a React framework for building full-stack web applications. From 12.2.0 to before 15.5.16 and 16.2.5, Applications using the Pages Router with i18n configured and middleware/proxy-based authorization can allow unauthorized access to pro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44573/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-11T09:31:34
1 posts
🟠 CVE-2026-43433 - High (7.8)
In the Linux kernel, the following vulnerability has been resolved:
rust_binder: avoid reading the written value in offsets array
When sending a transaction, its offsets array is first copied into the
target proc's vma, and then the values are r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43433/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-08T18:24:30
2 posts
🟠 CVE-2026-44167 - High (7.5)
phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44167 - High (7.5)
phpseclib is a PHP secure communications library. Prior to 1.0.29, 2.0.54, and 3.0.52, anyone loading untrusted ASN1 files (eg. X509 certificates, RSA PKCS8 private or public keys, etc). This is a bypass of CVE-2024-27355. This vulnerability is fi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44167/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-08T17:26:03
2 posts
4 repos
https://github.com/msuiche/gguf_cve2026_7482
https://github.com/szybnev/CVE-2026-7482
Ollama fixed CVE-2026-7482 in v0.17.1, a critical out-of-bounds read flaw that could leak API keys, prompts, and chat data from exposed servers via crafted GGUF files. 🔓
Researchers also disclosed unpatched Windows update flaws enabling persistent code execution through unsigned updates and path traversal in Ollama 0.12.10–0.17.5. ⚠️
🔗 https://thehackernews.com/2026/05/ollama-out-of-bounds-read-vulnerability.html
#TechNews #Ollama #LLM #AI #Cybersecurity #OpenSource #FOSS #Privacy #Infosec #Windows #Linux #Security #Servers #DataBreach #Technology
##Ollama fixed CVE-2026-7482 in v0.17.1, a critical out-of-bounds read flaw that could leak API keys, prompts, and chat data from exposed servers via crafted GGUF files. 🔓
Researchers also disclosed unpatched Windows update flaws enabling persistent code execution through unsigned updates and path traversal in Ollama 0.12.10–0.17.5. ⚠️
🔗 https://thehackernews.com/2026/05/ollama-out-of-bounds-read-vulnerability.html
#TechNews #Ollama #LLM #AI #Cybersecurity #OpenSource #FOSS #Privacy #Infosec #Windows #Linux #Security #Servers #DataBreach #Technology
##updated 2026-05-07T01:26:07
4 posts
🔴 CVE-2026-41050 - Critical (9.9)
Fleet's Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their `GitR...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41050/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 CRITICAL: SUSE Rancher Fleet Helm deployer (0.11.0 – 0.15.0) has a major auth flaw (CVE-2026-41050). Tenants with git push access can read secrets from any namespace in downstream clusters. Restrict access & monitor closely! https://radar.offseq.com/threat/cve-2026-41050-cwe-863-incorrect-authorization-in--5c35f924 #OffSeq #SUSE #Kubernetes
##🔴 CVE-2026-41050 - Critical (9.9)
Fleet's Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their `GitR...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41050/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔥 CRITICAL: SUSE Rancher Fleet Helm deployer (0.11.0 – 0.15.0) has a major auth flaw (CVE-2026-41050). Tenants with git push access can read secrets from any namespace in downstream clusters. Restrict access & monitor closely! https://radar.offseq.com/threat/cve-2026-41050-cwe-863-incorrect-authorization-in--5c35f924 #OffSeq #SUSE #Kubernetes
##updated 2026-05-06T16:16:41.060000
2 posts
1 repos
https://github.com/mgiay/CVE-2026-25589-25588-25243-23631-23479-REDIS
##Update urgency: SECURITY: There are security fixes in the release. Security fixes (CVE-2026-23479) Use-After-Free in unblock client flow may lead to Remote Code Execution (CVE-2026-25243) Invalid memory access in RESTORE may lead to Remote Code...
##Update urgency: SECURITY: There are security fixes in the release. Security fixes (CVE-2026-23479) Use-After-Free in unblock client flow may lead to Remote Code Execution (CVE-2026-25243) Invalid memory access in RESTORE may lead to Remote Code...
updated 2026-05-04T18:09:42.300000
9 posts
67 repos
https://github.com/0xBlackash/CVE-2026-41940
https://github.com/mahfuzreham/cpanel-cve-2026-41940
https://github.com/assetnote/cpanel2shell-scanner
https://github.com/Andrei-Dr/cpanel-cve-2026-41940-ioc
https://github.com/XsanFlip/poc-cpanel-cve-2026-41940
https://github.com/SreejaPuthan/cpanel-control-plane-exposure-check
https://github.com/kmaruthisrikar/CVE-2026-41940-cPanel-Auth-Bypass-Exploit
https://github.com/unteikyou/CVE-2026-41940-AuthBypass-Detector
https://github.com/habibkaratas/sorry-ransomware-analysis
https://github.com/Wesuiliye/CVE-2026-41940
https://github.com/Ishanoshada/CVE-2026-41940-Exploit-PoC
https://github.com/acuciureanu/cpanel2shell-honeypot
https://github.com/ilmndwntr/CVE-2026-41940-MASS-EXPLOIT
https://github.com/MrOplus/CVE-2026-41940
https://github.com/debugactiveprocess/cPanel-WHM-AuthBypass-Session-Checker
https://github.com/murrez/CVE-2026-41940
https://github.com/Underh0st/CPanel-Audit-Remediation-Tool
https://github.com/Ap0dexMe0/CVE-2026-41940
https://github.com/branixsolutions/Security-CVE-2026-41940-cPanel-WHM-WP2
https://github.com/rfxn/cpanel-sessionscribe
https://github.com/linko-iheb/cve-2026-41940-scanner
https://github.com/sercanokur/CVE-2026-41940-cPanel-WHM-Verification-Tool
https://github.com/cy3erm/CVE-2026-41940-POC
https://github.com/Christian93111/CVE-2026-41940
https://github.com/george1-adel/CVE-2026-41940_exploit
https://github.com/merdw/cPanel-CVE-2026-41940-Scanner
https://github.com/Richflexpix/cpanel-pwn
https://github.com/3tternp/CVE-2026-41940---cPanel-WHM-check
https://github.com/tfawnies/CVE-2026-41940-next
https://github.com/zedxod/CVE-2026-41940-POC
https://github.com/AmirrezaMarzban/portscan-CVE-2026-41940
https://github.com/vineet7800/cpanel-malware-cleaner-cve-2026
https://github.com/imbas007/POC_CVE-2026-41940
https://github.com/thekawix/CVE-2026-41940
https://github.com/ngksiva/cpanel-forensics
https://github.com/tc4dy/CVE-2026-41940-POC-Exploit
https://github.com/Unfold-Security/CVE-2026-41940-Detection
https://github.com/ynsmroztas/cPanelSniper
https://github.com/adriyansyah-mf/cve-2026-41940-poc
https://github.com/Kagantua/cPanelWHM-AuthBypass
https://github.com/Jenderal92/CVE-2026-41940
https://github.com/nickpaulsec/2026-41940-poc
https://github.com/itsismarcos/CVE-2026-41940
https://github.com/zycoder0day/CVE-2026-41940
https://github.com/rdyprtmx/poc-cve-2026-41940
https://github.com/sebinxavi/cve-checker-2026
https://github.com/YudaSamuel/cpanel-vuln-scanner
https://github.com/0xF55/cve-2026-41940-exploit
https://github.com/iSee857/cPanel-WHM-CVE-2026-41940-AuthBypass
https://github.com/devtint/CVE-2026-41940
https://github.com/realawaisakbar/CVE-2026-41940-Exploit-PoC
https://github.com/44pie/cpsniper
https://github.com/anach-ai/CVE-2026-41940
https://github.com/shahidmallaofficial/cpanel-cve-2026-41940-fix
https://github.com/senyx122/CVE-2026-41940
https://github.com/MrAriaNet/cPanel-Fix
https://github.com/dennisec/CVE-2026-41940
https://github.com/Lutfifakee-Project/CVE-2026-41940
https://github.com/0dev1337/cpanelscanner
https://github.com/Sachinart/CVE-2026-41940-cpanel-0day
https://github.com/bughunt4me/cpanelCVE-2026-41940
https://github.com/OhmGun/whmxploit---CVE-2026-41940
https://github.com/tahaXafous/CVE_2026_41940_scan_exploit
https://github.com/NULL200OK/cve-2026-41940-tool
https://github.com/ZildanZ/CVE-2026-41940
https://github.com/0xabdoulaye/CPANEL-CVE-2026-41940
https://github.com/Defacto-ridgepole254/CVE-2026-41940-Exploit-PoC
Ataque a sistemas cPanel explora falha CVE-2026-41940 para instalar backdoor
🔗 https://tugatech.com.pt/t83414-ataque-a-sistemas-cpanel-explora-falha-cve-2026-41940-para-instalar-backdoor
Seven FuelCMS CVEs documented. XSS callbacks now show IP and headers. Website Scanner detects exposed private keys passively. Scheduled scan exports. API risk filtering.
Also: free scanner for CVE-2026-41940, the cPanel auth bypass exploited for 64 days before a patch existed. No account needed.
##Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment
#CVE_2026_41940 #Mr_Rot13
https://blog.xlab.qianxin.com/mr_rot13-the-elusive-6-year-hacker-group-weaponizing-critical-cpanel-flaws-for-backdoor-deployment/
CVE-2026-41940 is under active mass exploitation.
Researchers say threat group “Mr_Rot13” is exploiting the critical cPanel flaw to steal credentials, deploy webshells, and gain persistent access across hosting infrastructure.
2,000+ attacking IPs observed globally.
##Critical cPanel Vulnerability CVE-2026-41940 Sparks Global Cyberattacks and Backdoor Infections
Massive Exploitation Campaign Targets cPanel Servers Worldwide A dangerous cyberattack campaign is rapidly spreading across the internet after hackers began exploiting the critical cPanel vulnerability identified as CVE-2026-41940. Security researchers have assigned the flaw a CVSS severity score of 9.3, placing it among the most dangerous web hosting vulnerabilities…
##Ataque a sistemas cPanel explora falha CVE-2026-41940 para instalar backdoor
🔗 https://tugatech.com.pt/t83414-ataque-a-sistemas-cpanel-explora-falha-cve-2026-41940-para-instalar-backdoor
Seven FuelCMS CVEs documented. XSS callbacks now show IP and headers. Website Scanner detects exposed private keys passively. Scheduled scan exports. API risk filtering.
Also: free scanner for CVE-2026-41940, the cPanel auth bypass exploited for 64 days before a patch existed. No account needed.
##Threat Actor Mr_Rot13 Actively Exploits CVE-2026-41940 for Backdoor Deployment
#CVE_2026_41940 #Mr_Rot13
https://blog.xlab.qianxin.com/mr_rot13-the-elusive-6-year-hacker-group-weaponizing-critical-cpanel-flaws-for-backdoor-deployment/
CVE-2026-41940 is under active mass exploitation.
Researchers say threat group “Mr_Rot13” is exploiting the critical cPanel flaw to steal credentials, deploy webshells, and gain persistent access across hosting infrastructure.
2,000+ attacking IPs observed globally.
##updated 2026-02-20T00:31:59
2 posts
CVE-2026-21535: unauthenticated info disclosure in Microsoft Teams. Network access is all an attacker needs, no credentials at all. The app sitting open on every corporate laptop right now. Go patch it. https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2026-patch-tuesday-fixes-120-flaws-no-zero-days/
##CVE-2026-21535: unauthenticated info disclosure in Microsoft Teams. Network access is all an attacker needs, no credentials at all. The app sitting open on every corporate laptop right now. Go patch it. https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2026-patch-tuesday-fixes-120-flaws-no-zero-days/
##updated 2025-10-22T00:32:22
2 posts
22 repos
https://github.com/MedX267/EternalBlue-Vulnerability-Scanner
https://github.com/klairmanraj/Multi-VLAN-Enterprise-Network-Vulnerability-Assessment
https://github.com/pelagornisandersi/WIndows-7-automated-exploitation-using-metasploit-framework-
https://github.com/AdityaBhatt3010/VAPT-Report-on-SMB-Exploitation-in-Windows-10-Finance-Endpoint
https://github.com/AtithKhawas/autoblue
https://github.com/AnugiArrawwala/CVE-Research
https://github.com/FireTemple/Blackash-CVE-2017-0144
https://github.com/peterpt/eternal_scanner
https://github.com/ducanh2oo3/Vulnerability-Research-CVE-2017-0144
https://github.com/quynhold/Detect-CVE-2017-0144-attack
https://github.com/trinadh-dasari-cyber/eternalblue-ms17-010-research
https://github.com/ichhyak22/EternalBlue-Exploit-Demonstration-MS17-010
https://github.com/kimocoder/eternalblue
https://github.com/denuwanjayasekara/CVE-Exploitation-Reports
https://github.com/EEsshq/CVE-2017-0144---EtneralBlue-MS17-010-Remote-Code-Execution
https://github.com/klairmanraj/Vulnerability-Risk-Assessment-TVRA-Enterprise-Network
https://github.com/althany/CVE-2017-0144_Lab-Guide
https://github.com/dannic145/EternalBlue-Exploit-Demonstration
https://github.com/Mitsu-bis/Eternal-Blue-CVE-2017-0144-THM-Write-Up
https://github.com/klairmanraj/Multi-VLAN-Enterprise-Network-Security-Infrastructure
https://github.com/luckyman2907/SMB-Protocol-Vulnerability_CVE-2017-0144
https://dfarq.homeip.net/why-the-wannacry-outbreak-was-so-bad-2/
##https://dfarq.homeip.net/why-the-wannacry-outbreak-was-so-bad/
##updated 2025-03-11T17:18:07
1 posts
@pierogiburo they escaped their clutches for millenia up until 2025
https://www.cve.org/CVERecord?id=CVE-2025-27421
🔴 CVE-2026-45411 - Critical (9.8)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.3, it is possible to catch a host exception using the yield* expression inside an async generator. When the generator is closed using the return function, the value is awaited on and exce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45411/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-45411 - Critical (9.8)
vm2 is an open source vm/sandbox for Node.js. Prior to 3.11.3, it is possible to catch a host exception using the yield* expression inside an async generator. When the generator is closed using the return function, the value is awaited on and exce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45411/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##(CVE-2026-46300)
- Malware in Hugging Face repositories and npm packages
- Foxconn ransomware attack impacting major tech companies [4/4]
et voilà il a reçu son nom de code CVE-2026-46300
##Apparently yet another one of those #DirtyFrag-like vulnerabilities in #Linux, this one called #Fragnesia
CVE-2026-46300
##As I was saying, we're not done with page cache LPEs.
Looks like a third variant just dropped (CVE-2026-46300):
https://github.com/v12-security/pocs/tree/main/fragnesia
https://github.com/v12-security/pocs/blob/d4043edc2acbd75d093e3f5795751b678c66b259/fragnesia/fragnesia.c
https://www.openwall.com/lists/oss-security/2026/05/13/3
Initial reading is defense against #DirtyFrag mitigates this, too, so perhaps not a full round of updates needed here.
##et voilà il a reçu son nom de code CVE-2026-46300
##As I was saying, we're not done with page cache LPEs.
Looks like a third variant just dropped (CVE-2026-46300):
https://github.com/v12-security/pocs/tree/main/fragnesia
https://github.com/v12-security/pocs/blob/d4043edc2acbd75d093e3f5795751b678c66b259/fragnesia/fragnesia.c
https://www.openwall.com/lists/oss-security/2026/05/13/3
Initial reading is defense against #DirtyFrag mitigates this, too, so perhaps not a full round of updates needed here.
##🟠 CVE-2026-4798 - High (7.5)
The Avada Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘product_order’ parameter in all versions up to, and including, 3.15.1 due to insufficient escaping on the user supplied parameter and lack of sufficient ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4798/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-4798 - High (7.5)
The Avada Builder plugin for WordPress is vulnerable to time-based SQL Injection via the ‘product_order’ parameter in all versions up to, and including, 3.15.1 due to insufficient escaping on the user supplied parameter and lack of sufficient ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-4798/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3425 - High (8.8)
The RTMKit Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.2 via the 'path' parameter of the 'get_content' AJAX action. This makes it possible for authenticated attackers, w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3425/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3425 - High (8.8)
The RTMKit Addons for Elementor plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.0.2 via the 'path' parameter of the 'get_content' AJAX action. This makes it possible for authenticated attackers, w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3425/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Wazuh – CVE-2026-30893 : un patch est disponible pour cette faille critique https://www.it-connect.fr/wazuh-cve-2026-30893-un-patch-est-disponible-pour-cette-faille-critique/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##Wazuh – CVE-2026-30893 : un patch est disponible pour cette faille critique https://www.it-connect.fr/wazuh-cve-2026-30893-un-patch-est-disponible-pour-cette-faille-critique/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
##2 posts
1 repos
https://github.com/mgiay/CVE-2026-25589-25588-25243-23631-23479-REDIS
##Update urgency: SECURITY: There are security fixes in the release. Security fixes (CVE-2026-23479) Use-After-Free in unblock client flow may lead to Remote Code Execution (CVE-2026-25243) Invalid memory access in RESTORE may lead to Remote Code...
##Update urgency: SECURITY: There are security fixes in the release. Security fixes (CVE-2026-23479) Use-After-Free in unblock client flow may lead to Remote Code Execution (CVE-2026-25243) Invalid memory access in RESTORE may lead to Remote Code...
🟠 CVE-2026-44548 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.3.2, top-level cross-site GET navigation from an attacker-controlled page to FundRaiserDelete.php, PropertyTypeDelete.php, or NoteDelete.php causes a logged-in ChurchCRM user with th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44548 - High (8.1)
ChurchCRM is an open-source church management system. Prior to 7.3.2, top-level cross-site GET navigation from an attacker-controlled page to FundRaiserDelete.php, PropertyTypeDelete.php, or NoteDelete.php causes a logged-in ChurchCRM user with th...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44547 - Critical (9.6)
ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44547 - Critical (9.6)
ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44547 - Critical (9.6)
ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-44547: CRITICAL improper authentication in ChurchCRM 7.2.0 – 7.3.0 (CVSS 9.6). Low-priv attackers can bypass auth and compromise data. Upgrade to 7.3.1 urgently! https://radar.offseq.com/threat/cve-2026-44547-cwe-287-improper-authentication-in--0654119a #OffSeq #ChurchCRM #Vuln #infosec
##🔴 CVE-2026-44547 - Critical (9.6)
ChurchCRM is an open-source church management system. From 7.2.0 to 7.2.2, The fix for CVE-2026-4058 is incomplete. The hardening commit was merged and then silently stripped from src/api/routes/public/public-user.php by an unrelated PR before any...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-44547: CRITICAL improper authentication in ChurchCRM 7.2.0 – 7.3.0 (CVSS 9.6). Low-priv attackers can bypass auth and compromise data. Upgrade to 7.3.1 urgently! https://radar.offseq.com/threat/cve-2026-44547-cwe-287-improper-authentication-in--0654119a #OffSeq #ChurchCRM #Vuln #infosec
##Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution
PHP released emergency updates to fix five vulnerabilities, including two critical use-after-free flaws (CVE-2026-6722 and CVE-2026-7261) that allow unauthenticated remote code execution via the SOAP extension.
**If you run PHP on your web servers, update immediately to version 8.2.31, 8.3.31, 8.4.21, or 8.5.6. If you can't patch right away, disable the SOAP extension as a temporary measure until the update is applied.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-php-soap-extension-vulnerabilities-enable-remote-code-execution-g-4-t-d-9/gD2P6Ple2L
Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution
PHP released emergency updates to fix five vulnerabilities, including two critical use-after-free flaws (CVE-2026-6722 and CVE-2026-7261) that allow unauthenticated remote code execution via the SOAP extension.
**If you run PHP on your web servers, update immediately to version 8.2.31, 8.3.31, 8.4.21, or 8.5.6. If you can't patch right away, disable the SOAP extension as a temporary measure until the update is applied.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-php-soap-extension-vulnerabilities-enable-remote-code-execution-g-4-t-d-9/gD2P6Ple2L
🚨 CRITICAL: CVE-2026-44257 in efwGrp efw4.X (<4.08.010) enables remote, unauthenticated command execution via crafted zip uploads and path traversal. Patch to 4.08.010 ASAP. https://radar.offseq.com/threat/cve-2026-44257-cwe-77-improper-neutralization-of-s-a113f36f #OffSeq #vuln #infosec #websecurity
##🚨 CRITICAL: CVE-2026-44257 in efwGrp efw4.X (<4.08.010) enables remote, unauthenticated command execution via crafted zip uploads and path traversal. Patch to 4.08.010 ASAP. https://radar.offseq.com/threat/cve-2026-44257-cwe-77-improper-neutralization-of-s-a113f36f #OffSeq #vuln #infosec #websecurity
##🔥 CRITICAL: CVE-2026-42854 in arduino-esp32 (<3.3.8) enables stack buffer overflow via HTTP multipart boundary — can crash device or allow RCE. Patch ASAP by upgrading to 3.3.8! https://radar.offseq.com/threat/cve-2026-42854-cwe-121-stack-based-buffer-overflow-caa5555e #OffSeq #CVE202642854 #IoTSecurity #Espressif
##🔥 CRITICAL: CVE-2026-42854 in arduino-esp32 (<3.3.8) enables stack buffer overflow via HTTP multipart boundary — can crash device or allow RCE. Patch ASAP by upgrading to 3.3.8! https://radar.offseq.com/threat/cve-2026-42854-cwe-121-stack-based-buffer-overflow-caa5555e #OffSeq #CVE202642854 #IoTSecurity #Espressif
##⚠️ CVE-2026-42288: ChurchCRM < 7.3.2 impacted by critical pre-auth RCE (CWE-94) via code injection in setup wizard. Unauthenticated attackers can take full control. Upgrade to 7.3.2+ ASAP! https://radar.offseq.com/threat/cve-2026-42288-cwe-94-improper-control-of-generati-052b937e #OffSeq #ChurchCRM #Vuln #RCE #PatchNow
##⚠️ CVE-2026-42288: ChurchCRM < 7.3.2 impacted by critical pre-auth RCE (CWE-94) via code injection in setup wizard. Unauthenticated attackers can take full control. Upgrade to 7.3.2+ ASAP! https://radar.offseq.com/threat/cve-2026-42288-cwe-94-improper-control-of-generati-052b937e #OffSeq #ChurchCRM #Vuln #RCE #PatchNow
##CVE-2026-42899 – ASP.NET Core Denial of Service
github.com/dotnet/annou...
Microsoft Security Advisory CV...
CVE-2026-32175 – .NET Core Tampering
github.com/dotnet/annou...
Microsoft Security Advisory CV...
🔴 CVE-2026-43992 - Critical (9.8)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-43992 - Critical (9.8)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-43992 - Critical (9.8)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-43992 - Critical (9.8)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, every MCP write tool (send_tokens, execute_contract, instantiate_contract, upload_wasm, ibc_transfer, etc.) accepted 'mnemonic: string' as an explicit tool-call p...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43992/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43991 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43991 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43991 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43991 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, substring-based blocklist in plugin-shell's command-safety check could be bypassed by adversarial argument constructions, allowing unauthorized command execution ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43991/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43990 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell me...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43990/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43990 - High (8.4)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, plugin-shell's run_command wrapped every agent-supplied command in 'sh -c' / 'cmd /C' and passed the full argument string to the shell's parser, allowing shell me...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43990/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43993 - High (8.2)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. Thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43993 - High (8.2)
JunoClaw is an agentic AI platform built on Juno Network. Prior to 0.x.y-security-1, the WAVS bridge's computeDataVerify called fetch() on agent-supplied URLs without validating scheme, port, or resolved IP, resulting in an SSRF vulnerability. Thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43993/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8161 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8161/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8161 - High (7.5)
multiparty@4.2.3 and lower versions are vulnerable to denial of service via uncaught exception. By sending a multipart/form-data request with a field name that collides with an inherited Object.prototype property such as __proto__, constructor, or...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8161/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41431 - High (8)
Zen is a firefox-based browser. Prior to 1.19.9b, Zen Browser ships a Mozilla Application Resource (MAR) updater (org.mozilla.updater) that has had all MAR signature verification stripped from the Firefox codebase it was forked from. The MAR files...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41431/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42858 - High (8.5)
Open edX Platform enables the authoring and delivery of online learning at any scale. The sync_provider_data endpoint in SAMLProviderDataViewSet allows authenticated Enterprise Admin users to supply an arbitrary URL via the metadata_url POST param...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42858/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##