##
Updated at UTC 2026-05-18T23:54:03.735668
| CVE | CVSS | EPSS | Posts | Repos | Nuclei | Updated | Description |
|---|---|---|---|---|---|---|---|
| CVE-2026-8836 | 9.8 | 0.00% | 2 | 0 | 2026-05-18T21:31:58 | A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_par | |
| CVE-2026-8851 | 8.1 | 0.00% | 2 | 0 | 2026-05-18T21:16:41.777000 | SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List ma | |
| CVE-2026-8838 | 9.8 | 0.00% | 2 | 0 | 2026-05-18T21:16:41.623000 | Unsafe use of Python's eval() on server-received data in the vector_in() functio | |
| CVE-2026-27130 | 9.9 | 0.00% | 2 | 0 | 2026-05-18T21:16:39.890000 | Dokploy is a free, self-hostable Platform as a Service (PaaS). Versions 0.26.6 a | |
| CVE-2026-25244 | 9.8 | 0.00% | 2 | 0 | 2026-05-18T21:16:39.547000 | WebdriverIO is a test automation framework for unit, e2e and component testing u | |
| CVE-2026-22810 | 8.2 | 0.00% | 2 | 0 | 2026-05-18T21:16:39.373000 | Joplin is an open source note-taking and to-do application that organises notes | |
| CVE-2025-56352 | 7.5 | 0.00% | 2 | 0 | 2026-05-18T20:27:23.023000 | In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the br | |
| CVE-2025-57282 | 8.8 | 0.00% | 2 | 0 | 2026-05-18T20:27:12.817000 | ngrok v4.3.3 and 5.0.0-beta.2 is vulnerable to Command Injection. | |
| CVE-2026-41085 | 8.8 | 0.00% | 2 | 0 | 2026-05-18T20:27:12.817000 | Thermo Fisher Scientific Torrent Suite Dx through 5.14.2 has a privilege escalat | |
| CVE-2026-8657 | 8.2 | 0.05% | 4 | 0 | 2026-05-18T20:27:12.817000 | Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype P | |
| CVE-2026-47092 | 7.8 | 0.00% | 2 | 0 | 2026-05-18T20:19:31.307000 | Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injecti | |
| CVE-2026-8724 | 4.7 | 0.01% | 2 | 0 | 2026-05-18T20:16:40.220000 | A security flaw has been discovered in Dataease 2.10.20. Impacted is the functio | |
| CVE-2026-45672 | 8.8 | 0.06% | 2 | 1 | 2026-05-18T20:16:39.537000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45301 | 8.1 | 0.03% | 2 | 0 | 2026-05-18T20:16:38.997000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45315 | 8.7 | 0.02% | 2 | 0 | 2026-05-18T20:11:38.523000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-41258 | 9.1 | 0.04% | 3 | 0 | 2026-05-18T19:59:59.590000 | OpenMRS is an open source electronic medical record system platform. From 2.7.0 | |
| CVE-2026-44717 | 9.8 | 0.25% | 3 | 0 | 2026-05-18T19:59:59.590000 | MCP Calculate Server is a mathematical calculation service based on MCP protocol | |
| CVE-2026-45402 | 8.1 | 0.03% | 2 | 0 | 2026-05-18T19:53:25.020000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-44570 | 8.3 | 0.04% | 2 | 0 | 2026-05-18T19:52:38.637000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-8524 | 8.8 | 0.07% | 1 | 0 | 2026-05-18T19:43:34.423000 | Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed | |
| CVE-2026-8529 | 8.8 | 0.07% | 1 | 0 | 2026-05-18T19:41:53.163000 | Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed | |
| CVE-2026-45035 | 0 | 0.05% | 2 | 0 | 2026-05-18T19:34:25.260000 | Tabby (formerly Terminus) is a highly configurable terminal emulator. Prior to 1 | |
| CVE-2026-8776 | 8.8 | 0.04% | 4 | 0 | 2026-05-18T19:22:47.003000 | A vulnerability has been found in Edimax BR-6428NS 1.10. This vulnerability affe | |
| CVE-2026-8518 | 8.8 | 0.08% | 2 | 0 | 2026-05-18T19:17:26.423000 | Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remot | |
| CVE-2026-6346 | 8.7 | 0.00% | 2 | 0 | 2026-05-18T18:39:52.200000 | Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail | |
| CVE-2026-8695 | 7.5 | 0.26% | 1 | 0 | 2026-05-18T18:38:29.277000 | radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() | |
| CVE-2026-44551 | 9.1 | 0.04% | 2 | 0 | 2026-05-18T18:35:23.590000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-8509 | 8.8 | 0.06% | 2 | 0 | 2026-05-18T18:34:39.533000 | Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8511 | 9.6 | 0.07% | 2 | 0 | 2026-05-18T18:34:17.750000 | Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote a | |
| CVE-2026-31431 | 7.8 | 2.57% | 1 | 100 | 2026-05-18T18:32:28 | In the Linux kernel, the following vulnerability has been resolved: crypto: alg | |
| CVE-2026-45230 | 9.1 | 0.00% | 2 | 0 | 2026-05-18T18:31:37 | DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /a | |
| CVE-2026-45495 | 8.8 | 0.00% | 2 | 0 | 2026-05-18T18:31:37 | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability | |
| CVE-2026-42822 | 10.0 | 0.00% | 4 | 0 | 2026-05-18T18:31:31 | Improper authentication in Azure Local Disconnected Operations allows an unautho | |
| CVE-2026-39079 | 7.5 | 0.00% | 2 | 0 | 2026-05-18T18:31:30 | An issue in prestashop upsshipping all versions through at least 2.4.0 allows a | |
| CVE-2026-44553 | 8.1 | 0.03% | 2 | 0 | 2026-05-18T18:29:30.137000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-7301 | 9.8 | 0.00% | 2 | 0 | 2026-05-18T17:44:44.047000 | SGLangs multimodal generation runtime scheduler's ROUTER socket binds to 0.0.0.0 | |
| CVE-2026-8686 | 7.5 | 0.03% | 2 | 0 | 2026-05-18T17:44:14.880000 | Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5. | |
| CVE-2026-8719 | 8.8 | 0.04% | 4 | 0 | 2026-05-18T17:44:03.697000 | The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPre | |
| CVE-2026-8739 | 5.3 | 0.03% | 2 | 0 | 2026-05-18T17:44:03.697000 | A vulnerability was detected in Sanluan PublicCMS 5.202506.d. The affected eleme | |
| CVE-2026-8737 | 5.3 | 0.05% | 2 | 0 | 2026-05-18T17:44:03.697000 | A weakness has been identified in Sanluan PublicCMS 5.202506.d. This issue affec | |
| CVE-2026-8507 | 9.8 | 0.01% | 2 | 0 | 2026-05-18T17:40:45.343000 | Crypt::OpenSSL::PKCS12 versions through 1.94 for Perl have out-of-bounds (OOB) w | |
| CVE-2026-45331 | 8.5 | 0.03% | 2 | 0 | 2026-05-18T17:36:58.370000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45671 | 8.0 | 0.04% | 2 | 0 | 2026-05-18T17:36:58.370000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45398 | 7.5 | 0.04% | 3 | 0 | 2026-05-18T17:36:58.370000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-45401 | 8.5 | 0.03% | 2 | 0 | 2026-05-18T17:36:58.370000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-44565 | 8.1 | 0.06% | 2 | 0 | 2026-05-18T17:36:58.370000 | Open WebUI is a self-hosted artificial intelligence platform designed to operate | |
| CVE-2026-44826 | 7.5 | 0.04% | 2 | 0 | 2026-05-18T17:26:40.167000 | Vvveb is a powerful and easy to use CMS with page builder to build websites, blo | |
| CVE-2026-46408 | 7.6 | 0.03% | 2 | 0 | 2026-05-18T17:26:40.167000 | Vvveb is a powerful and easy to use CMS with page builder to build websites, blo | |
| CVE-2026-46407 | 8.1 | 0.03% | 2 | 0 | 2026-05-18T17:26:40.167000 | Vvveb is a powerful and easy to use CMS with page builder to build websites, blo | |
| CVE-2026-45010 | 9.1 | 0.12% | 4 | 0 | 2026-05-18T17:25:39.493000 | phpMyFAQ before 4.1.2 contains an improper restriction of excessive authenticati | |
| CVE-2026-46366 | 7.5 | 0.06% | 2 | 0 | 2026-05-18T17:25:39.493000 | phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the ge | |
| CVE-2026-46364 | 9.8 | 0.05% | 3 | 0 | 2026-05-18T17:25:39.493000 | phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in | |
| CVE-2026-3220 | 8.8 | 0.03% | 2 | 3 | 2026-05-18T17:05:46.240000 | The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin | |
| CVE-2026-6495 | 7.1 | 0.03% | 2 | 0 | 2026-05-18T17:05:46.240000 | The Ajax Load More WordPress plugin before 7.8.4 does not sanitise and escape a | |
| CVE-2026-7304 | 9.8 | 0.00% | 2 | 0 | 2026-05-18T15:31:41 | SGLangs multimodal generation runtime is vulnerable to unauthenticated remote co | |
| CVE-2026-41948 | 7.7 | 0.00% | 2 | 0 | 2026-05-18T15:30:45 | Dify version 1.14.1 and prior contain a path traversal vulnerability that allows | |
| CVE-2026-7302 | 9.1 | 0.00% | 2 | 0 | 2026-05-18T15:30:38 | SGLangs multimodal generation runtime is vulnerable to an unauthenticated path t | |
| CVE-2026-42009 | 7.5 | 0.00% | 2 | 0 | 2026-05-18T15:30:38 | A flaw was found in gnutls. A remote attacker could exploit an issue in the Data | |
| CVE-2026-46333 | 5.5 | 0.03% | 15 | 4 | 2026-05-18T15:30:37 | In the Linux kernel, the following vulnerability has been resolved: ptrace: sli | |
| CVE-2026-31635 | 7.5 | 0.05% | 2 | 0 | 2026-05-18T15:16:25.370000 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix | |
| CVE-2026-7498 | 8.8 | 0.00% | 4 | 0 | 2026-05-18T09:31:56 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2026-6347 | 7.6 | 0.00% | 2 | 0 | 2026-05-18T09:31:56 | Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail | |
| CVE-2026-8786 | 6.3 | 0.03% | 2 | 0 | 2026-05-18T06:31:18 | A vulnerability has been found in Tencent WeKnora up to 0.3.6. Affected by this | |
| CVE-2026-8775 | 8.8 | 0.04% | 4 | 0 | 2026-05-18T03:32:43 | A flaw has been found in Edimax BR-6428NS 1.10. This affects the function formL2 | |
| CVE-2026-43500 | 7.8 | 0.01% | 4 | 14 | 2026-05-17T18:31:33 | In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also | |
| CVE-2026-8733 | 6.3 | 0.03% | 2 | 0 | 2026-05-17T06:30:32 | A vulnerability was found in Investintech SlimPDFReader up to 2.0.13. Affected b | |
| CVE-2026-8725 | 7.3 | 0.04% | 2 | 0 | 2026-05-17T03:30:29 | A weakness has been identified in CoreWorxLab CAAL up to 1.6.0. The affected ele | |
| CVE-2026-46728 | 8.2 | 0.00% | 4 | 0 | 2026-05-17T00:31:39 | Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification by | |
| CVE-2020-17103 | 7.0 | 0.35% | 4 | 3 | 2026-05-16T15:31:13 | , aka 'Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerabili | |
| CVE-2026-45375 | 9.0 | 0.04% | 2 | 0 | 2026-05-16T01:16:17.333000 | SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, S | |
| CVE-2026-43904 | 7.8 | 0.01% | 2 | 0 | 2026-05-16T01:16:16.447000 | OpenImageIO is a toolset for reading, writing, and manipulating image files of a | |
| CVE-2026-35194 | 8.1 | 0.05% | 2 | 0 | 2026-05-16T00:32:14 | Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and | |
| CVE-2026-45400 | 8.5 | 0.03% | 2 | 0 | 2026-05-15T23:55:30 | ### Summary In the open-webui project, a parsing difference between the urlparse | |
| CVE-2026-45675 | 8.1 | 0.05% | 2 | 0 | 2026-05-15T23:55:05 | ## Summary The LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check- | |
| CVE-2026-44554 | 8.1 | 0.04% | 2 | 0 | 2026-05-15T23:52:50 | # Knowledge Base Destruction and RAG Poisoning via Unauthorized Collection Overw | |
| CVE-2026-44555 | 7.6 | 0.04% | 2 | 0 | 2026-05-15T23:52:35 | # Base Model Routing Bypasses Access Control via Model Chaining ## Affected Com | |
| CVE-2026-44552 | 8.7 | 0.03% | 2 | 0 | 2026-05-15T23:52:30 | # Redis Cache Keys tool_servers and terminal_servers Missing Instance Prefix Ena | |
| CVE-2026-44714 | 7.5 | 0.03% | 1 | 0 | 2026-05-15T23:49:54 | ### Summary `ScriptExecution.correctlySpends()` contains two fast-path verificat | |
| CVE-2026-42155 | None | 0.04% | 2 | 0 | 2026-05-15T23:48:44 | Affected Version: OpenMage LTS ≤ 20.16.0 (confirmed on `20.16.0`) Affected File | |
| CVE-2026-23998 | 7.5 | 0.02% | 2 | 0 | 2026-05-15T23:48:24 | ### Summary A vulnerability in Fleet’s Windows MDM management endpoint could al | |
| CVE-2026-27886 | None | 0.11% | 2 | 0 | 2026-05-15T23:44:52 | ### Summary of CVE-2026-27886 Vulnerability Details - CVE: CVE-2026-27886 - CVS | |
| CVE-2026-46367 | 7.6 | 0.01% | 2 | 0 | 2026-05-15T21:31:45 | phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Ut | |
| CVE-2026-8696 | 7.5 | 0.23% | 2 | 0 | 2026-05-15T21:31:45 | radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() fu | |
| CVE-2026-46359 | 7.5 | 0.03% | 2 | 0 | 2026-05-15T21:31:42 | phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::set | |
| CVE-2026-8558 | 8.8 | 0.08% | 2 | 0 | 2026-05-15T21:16:39.133000 | Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-43907 | 8.3 | 0.04% | 2 | 0 | 2026-05-15T19:43:22.767000 | OpenImageIO is a toolset for reading, writing, and manipulating image files of a | |
| CVE-2026-42897 | 8.1 | 12.34% | 25 | 1 | 2026-05-15T19:35:52.963000 | Improper neutralization of input during web page generation ('cross-site scripti | |
| CVE-2026-34253 | 8.2 | 0.07% | 1 | 0 | 2026-05-15T18:31:42 | A buffer underflow vulnerability has been identified in the ogg123 utility from | |
| CVE-2026-39054 | 7.3 | 1.69% | 2 | 0 | 2026-05-15T18:31:41 | Oinone Pamirs 7.0.0 contains a command injection vulnerability in CommandHelper. | |
| CVE-2026-38728 | 7.5 | 0.10% | 1 | 0 | 2026-05-15T18:31:38 | An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to c | |
| CVE-2026-42334 | 7.5 | 0.04% | 2 | 0 | 2026-05-15T18:25:21.933000 | Mongoose is a MongoDB object modeling tool designed to work in an asynchronous e | |
| CVE-2026-43908 | 8.8 | 0.04% | 2 | 0 | 2026-05-15T18:07:55.057000 | OpenImageIO is a toolset for reading, writing, and manipulating image files of a | |
| CVE-2026-24712 | 7.3 | 2.87% | 2 | 0 | 2026-05-15T15:31:42 | Northern.tech CFEngine Enterprise and Community before 3.21.8, 3.24.3, and 3.27. | |
| CVE-2026-44523 | 10.0 | 0.01% | 2 | 0 | 2026-05-15T15:16:52.960000 | Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum | |
| CVE-2026-42031 | 9.8 | 9.11% | 2 | 0 | template | 2026-05-15T14:59:11.840000 | CKAN is an open-source DMS (data management system) for powering data hubs and d |
| CVE-2026-44592 | 9.4 | 0.02% | 2 | 0 | 2026-05-15T14:44:49.877000 | Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_D | |
| CVE-2026-41702 | 7.8 | 0.01% | 1 | 0 | 2026-05-15T09:31:42 | VMware Fusion contains a TOCTOU (Time-of-check Time-of-use) vulnerability that o | |
| CVE-2026-45665 | 8.1 | 0.03% | 2 | 0 | 2026-05-15T01:55:56 | ### Summary A Stored Cross-Site Scripting (XSS) vulnerability exists in the Bann | |
| CVE-2026-8574 | 8.3 | 0.07% | 1 | 0 | 2026-05-15T00:31:38 | Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allow | |
| CVE-2026-8520 | 8.3 | 0.06% | 2 | 0 | 2026-05-15T00:31:37 | Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attac | |
| CVE-2026-8526 | 8.8 | 0.07% | 1 | 0 | 2026-05-15T00:31:37 | Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8513 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allo | |
| CVE-2026-8512 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8510 | 7.5 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 all | |
| CVE-2026-8514 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote | |
| CVE-2026-8530 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:31:36 | Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 al | |
| CVE-2026-8527 | 8.8 | 0.08% | 1 | 0 | 2026-05-15T00:31:36 | Insufficient validation of untrusted input in Downloads in Google Chrome prior t | |
| CVE-2026-8525 | 8.3 | 0.06% | 1 | 0 | 2026-05-15T00:31:36 | Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 al | |
| CVE-2026-8523 | 8.3 | 0.07% | 1 | 0 | 2026-05-15T00:31:36 | Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote | |
| CVE-2026-8534 | 8.3 | 0.07% | 1 | 0 | 2026-05-15T00:31:36 | Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.77 | |
| CVE-2026-8548 | 8.3 | 0.07% | 1 | 0 | 2026-05-15T00:31:36 | Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8542 | 8.3 | 0.07% | 1 | 0 | 2026-05-15T00:30:30 | Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allow | |
| CVE-2026-8515 | 8.3 | 0.07% | 2 | 0 | 2026-05-15T00:30:29 | Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote | |
| CVE-2026-8575 | 8.3 | 0.07% | 1 | 0 | 2026-05-14T22:16:51.050000 | Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote a | |
| CVE-2026-8533 | 8.3 | 0.07% | 1 | 0 | 2026-05-14T22:16:47.413000 | Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed | |
| CVE-2026-8531 | 8.8 | 0.06% | 2 | 0 | 2026-05-14T22:16:47.267000 | Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.16 | |
| CVE-2026-8519 | 8.8 | 0.07% | 2 | 0 | 2026-05-14T22:16:46.123000 | Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 al | |
| CVE-2026-8521 | 7.5 | 0.03% | 2 | 0 | 2026-05-14T21:30:54 | Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a | |
| CVE-2026-8540 | 8.8 | 0.08% | 1 | 0 | 2026-05-14T21:30:54 | Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote a | |
| CVE-2026-8549 | 8.8 | 0.08% | 1 | 0 | 2026-05-14T21:30:54 | Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remot | |
| CVE-2026-8547 | 7.5 | 0.07% | 1 | 0 | 2026-05-14T21:30:54 | Insufficient policy enforcement in Passwords in Google Chrome on Windows prior t | |
| CVE-2026-8555 | 8.8 | 0.08% | 1 | 0 | 2026-05-14T21:30:54 | Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowe | |
| CVE-2026-8621 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:30:53 | Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that al | |
| CVE-2026-44586 | 8.3 | 0.05% | 2 | 0 | 2026-05-14T21:22:56.313000 | SiYuan is an open-source personal knowledge management system. From 2.1.12 to be | |
| CVE-2026-8522 | 8.8 | 0.08% | 2 | 0 | 2026-05-14T21:19:23.923000 | Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allo | |
| CVE-2026-8517 | 8.8 | 0.07% | 2 | 0 | 2026-05-14T21:19:23.923000 | Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.1 | |
| CVE-2026-8532 | 8.8 | 0.08% | 1 | 0 | 2026-05-14T21:19:23.923000 | Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remot | |
| CVE-2026-8544 | 8.8 | 0.08% | 1 | 0 | 2026-05-14T21:19:23.923000 | Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remot | |
| CVE-2026-8551 | 8.8 | 0.08% | 1 | 0 | 2026-05-14T21:19:23.923000 | Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a r | |
| CVE-2026-8557 | 7.5 | 0.07% | 1 | 0 | 2026-05-14T21:19:23.923000 | Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed | |
| CVE-2026-44516 | 7.6 | 0.03% | 2 | 0 | 2026-05-14T20:54:42 | ### Summary The `LoggingRestClientCustomizer` in the `web` module automatically | |
| CVE-2026-44542 | 9.1 | 0.64% | 2 | 0 | 2026-05-14T20:54:33 | ### **Summary** Attacker-controlled path input is joined with a trusted base pa | |
| CVE-2026-45338 | 7.7 | 0.03% | 2 | 0 | 2026-05-14T20:19:57 | ## Summary A Server-Side Request Forgery (SSRF) vulnerability exists in `_proce | |
| CVE-2026-42945 | 8.1 | 0.15% | 27 | 22 | 2026-05-14T20:17:05.413000 | NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_mo | |
| CVE-2026-45303 | 7.7 | 0.03% | 2 | 0 | 2026-05-14T20:16:11 | ### Summary Through the HTML rendering view, scripts can be injected and execute | |
| CVE-2026-44578 | 8.6 | 4.00% | 2 | 7 | template | 2026-05-14T18:34:38.530000 | Next.js is a React framework for building full-stack web applications. From 13.4 |
| CVE-2026-43284 | 7.8 | 0.01% | 4 | 28 | 2026-05-14T18:33:53 | In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: | |
| CVE-2026-20182 | 10.0 | 25.95% | 13 | 1 | 2026-05-14T18:33:03 | May 2026: This security advisory provides the details and fix information for a | |
| CVE-2025-15024 | 8.8 | 0.04% | 2 | 0 | 2026-05-14T18:33:03 | Improper Control of Generation of Code ('Code Injection') vulnerability in Yorda | |
| CVE-2026-41615 | 9.6 | 0.10% | 2 | 0 | 2026-05-14T18:33:03 | Exposure of sensitive information to an unauthorized actor in Microsoft Authenti | |
| CVE-2026-44513 | 8.8 | 0.12% | 2 | 0 | 2026-05-14T18:30:57.103000 | Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, a | |
| CVE-2026-44827 | 8.8 | 0.12% | 2 | 0 | 2026-05-14T18:30:57.103000 | Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, di | |
| CVE-2025-15023 | 8.8 | 0.04% | 2 | 0 | 2026-05-14T18:19:37.060000 | Incorrect Authorization vulnerability in Yordam Information Technology Consultin | |
| CVE-2026-6473 | 8.8 | 0.06% | 1 | 0 | 2026-05-14T15:32:05 | Integer wraparound in multiple PostgreSQL server features allows an unprivileged | |
| CVE-2026-43660 | 7.5 | 0.12% | 1 | 0 | 2026-05-13T21:16:47.520000 | A validation issue was addressed with improved logic. This issue is fixed in Saf | |
| CVE-2026-28883 | 7.5 | 0.05% | 1 | 0 | 2026-05-13T21:16:41.903000 | A use-after-free issue was addressed with improved memory management. This issue | |
| CVE-2026-8043 | 9.6 | 0.10% | 1 | 0 | 2026-05-13T20:34:20.310000 | External control of a file name in Ivanti Xtraction before version 2026.2 allows | |
| CVE-2026-34659 | 9.6 | 3.74% | 2 | 0 | 2026-05-13T19:38:48.113000 | Adobe Connect versions 2025.9.15, 2025.8.157 and earlier are affected by a Deser | |
| CVE-2026-0265 | None | 0.08% | 1 | 1 | 2026-05-13T18:31:07 | An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software en | |
| CVE-2026-40701 | 4.8 | 0.03% | 1 | 0 | 2026-05-13T16:27:11.127000 | NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_ssl_module | |
| CVE-2026-45091 | 9.1 | 0.01% | 2 | 1 | 2026-05-13T16:24:39 | In sealed-env enterprise mode, versions 0.1.0-alpha.1 through 0.1.0-alpha.3 embe | |
| CVE-2026-40361 | 8.4 | 0.07% | 2 | 0 | 2026-05-13T15:34:52.573000 | Use after free in Microsoft Office Word allows an unauthorized attacker to execu | |
| CVE-2026-36983 | 7.3 | 5.71% | 2 | 0 | 2026-05-12T19:36:42.187000 | D-Link DCS-932L v2.18.01 is vulnerable to Command Injection in the function sub_ | |
| CVE-2026-40369 | 7.8 | 0.02% | 4 | 1 | 2026-05-12T18:30:50 | Untrusted pointer dereference in Windows Kernel allows an authorized attacker to | |
| CVE-2026-8051 | 7.2 | 1.46% | 2 | 0 | 2026-05-12T15:31:49 | OS command injection in Ivanti Virtual Traffic Manager before version 22.9r4 all | |
| CVE-2026-0300 | 9.8 | 14.43% | 1 | 8 | 2026-05-12T15:31:19 | A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Capti | |
| CVE-2026-7256 | 8.8 | 1.21% | 2 | 0 | 2026-05-12T06:31:46 | ** UNSUPPORTED WHEN ASSIGNED ** A command injection vulnerability in the CGI pro | |
| CVE-2026-7411 | 10.0 | 0.13% | 1 | 1 | 2026-05-11T16:22:43 | In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, inadequat | |
| CVE-2026-7412 | 8.6 | 0.03% | 1 | 0 | 2026-05-06T16:16:12.510000 | In Eclipse BaSyx Java Server SDK versions prior to 2.0.0-milestone-10, the Opera | |
| CVE-2026-39987 | 9.8 | 81.84% | 1 | 9 | template | 2026-04-27T16:30:09 | ## Summary Marimo (19.6k stars) has a Pre-Auth RCE vulnerability. The terminal |
| CVE-2017-9841 | 9.8 | 94.21% | 1 | 17 | template | 2026-04-21T18:00:56.903000 | Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows rem |
| CVE-2026-34197 | 8.8 | 75.81% | 2 | 12 | template | 2026-04-16T19:59:38.107000 | Improper Input Validation, Improper Control of Generation of Code ('Code Injecti |
| CVE-2026-3172 | 8.1 | 0.06% | 1 | 0 | 2026-04-15T00:35:42.020000 | Buffer overflow in parallel HNSW index build in pgvector 0.6.0 through 0.8.1 all | |
| CVE-2026-32201 | 6.5 | 8.71% | 1 | 1 | 2026-04-14T18:30:55 | Improper input validation in Microsoft Office SharePoint allows an unauthorized | |
| CVE-2026-24154 | 7.6 | 0.03% | 2 | 0 | 2026-04-03T19:04:33.083000 | NVIDIA Jetson Linux has vulnerability in initrd, where an unprivileged attacker | |
| CVE-2026-4289 | 7.3 | 0.04% | 1 | 1 | 2026-03-17T00:31:40 | A security vulnerability has been detected in Tiandy Easy7 Integrated Management | |
| CVE-2026-20127 | 10.0 | 58.95% | 1 | 7 | 2026-02-25T18:31:45 | A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controlle | |
| CVE-2018-4063 | 8.8 | 1.88% | 2 | 0 | 2025-12-15T15:18:49.987000 | An exploitable remote code execution vulnerability exists in the upload.cgi func | |
| CVE-2023-22518 | 9.8 | 94.38% | 2 | 9 | template | 2025-10-24T13:38:59.063000 | All versions of Confluence Data Center and Server are affected by this unexploit |
| CVE-2023-38831 | 7.8 | 93.88% | 2 | 61 | 2025-10-22T00:32:49 | RARLabs WinRAR before 6.23 allows attackers to execute arbitrary code when a use | |
| CVE-2025-6793 | 9.4 | 87.03% | 1 | 0 | 2025-07-14T17:16:32.440000 | Marvell QConvergeConsole QLogicDownloadImpl Directory Traversal Arbitrary File D | |
| CVE-2024-48760 | 9.8 | 66.58% | 1 | 0 | 2025-01-23T18:32:22 | An issue in GestioIP v3.5.7 allows a remote attacker to execute arbitrary code v | |
| CVE-2023-30253 | 8.8 | 90.43% | 1 | 8 | 2025-01-14T17:15:11.487000 | Dolibarr before 17.0.1 allows remote code execution by an authenticated user via | |
| CVE-2024-49767 | 7.5 | 1.09% | 2 | 0 | 2025-01-03T12:15:26.257000 | Werkzeug is a Web Server Gateway Interface web application library. Applications | |
| CVE-2022-21894 | 4.4 | 42.69% | 2 | 6 | 2024-11-21T06:45:39.280000 | Secure Boot Security Feature Bypass Vulnerability | |
| CVE-2023-24932 | 6.7 | 0.58% | 2 | 4 | 2024-08-01T15:32:23 | Secure Boot Security Feature Bypass Vulnerability | |
| CVE-2012-1182 | None | 78.55% | 1 | 1 | 2023-02-02T05:05:16 | The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6. | |
| CVE-2026-46300 | 0 | 0.00% | 8 | 5 | N/A | ||
| CVE-2026-44633 | 0 | 0.03% | 2 | 0 | N/A | ||
| CVE-2026-43906 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-43905 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-43903 | 0 | 0.01% | 2 | 0 | N/A | ||
| CVE-2026-43909 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-44699 | 0 | 0.04% | 2 | 0 | N/A | ||
| CVE-2026-24401 | 0 | 0.04% | 1 | 0 | N/A |
updated 2026-05-18T21:31:58
2 posts
🔴 CVE-2026-8836 - Critical (9.8)
A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters result...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8836/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-8836 - Critical (9.8)
A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters result...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8836/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T21:16:41.777000
2 posts
🟠 CVE-2026-8851 - High (8.1)
SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8851/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8851 - High (8.1)
SOGo 5.12.7 contains a SQL injection vulnerability in the Access Control List management functionality that allows authenticated users to extract arbitrary data from the database by injecting SQL subqueries through the uid parameter of the addUser...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8851/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T21:16:41.623000
2 posts
🔴 CVE-2026-8838 - Critical (9.8)
Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client.
To remediate this issue,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-8838 - Critical (9.8)
Unsafe use of Python's eval() on server-received data in the vector_in() function in amazon-redshift-python-driver before 2.1.14 allows a rogue server or man-in-the-middle actor to execute arbitrary code on the client.
To remediate this issue,...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8838/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T21:16:39.890000
2 posts
🔴 CVE-2026-27130 - Critical (9.9)
Dokploy is a free, self-hostable Platform as a Service (PaaS). Versions 0.26.6 and below have OS command injection through the appName parameter. 3 chained issues cause this problem: inadequate input sanitization, lack of schema validation and dir...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27130/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-27130 - Critical (9.9)
Dokploy is a free, self-hostable Platform as a Service (PaaS). Versions 0.26.6 and below have OS command injection through the appName parameter. 3 chained issues cause this problem: inadequate input sanitization, lack of schema validation and dir...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27130/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T21:16:39.547000
2 posts
🔴 CVE-2026-25244 - Critical (9.8)
WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25244/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-25244 - Critical (9.8)
WebdriverIO is a test automation framework for unit, e2e and component testing using WebDriver, WebDriver BiDi and Appium. Versions below 9.24.0 contain a command injection vulnerability leading to remote code execution (RCE) in test orchestration...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-25244/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T21:16:39.373000
2 posts
🟠 CVE-2026-22810 - High (8.2)
Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22810/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-22810 - High (8.2)
Joplin is an open source note-taking and to-do application that organises notes and lists into notebooks. Versions prior to 3.5.7 contain a path traversal vulnerability in the importer which allows overwriting arbitrary files on disk. The OneNote ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-22810/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T20:27:23.023000
2 posts
🟠 CVE-2025-56352 - High (7.5)
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the broker mishandles protocol violations during CONNECT packet parsing. When receiving a CONNECT packet with a zero-length Client ID while CleanSession is set to 0, the bro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-56352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-56352 - High (7.5)
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), the broker mishandles protocol violations during CONNECT packet parsing. When receiving a CONNECT packet with a zero-length Client ID while CleanSession is set to 0, the bro...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-56352/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T20:27:12.817000
2 posts
🟠 CVE-2025-57282 - High (8.8)
ngrok v4.3.3 and 5.0.0-beta.2 is vulnerable to Command Injection.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57282/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-57282 - High (8.8)
ngrok v4.3.3 and 5.0.0-beta.2 is vulnerable to Command Injection.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-57282/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T20:27:12.817000
2 posts
🟠 CVE-2026-41085 - High (8.8)
Thermo Fisher Scientific Torrent Suite Dx through 5.14.2 has a privilege escalation vulnerability that may allow an authenticated user with limited access privileges to gain unauthorized administrator-level privileges through exploitation of speci...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41085/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41085 - High (8.8)
Thermo Fisher Scientific Torrent Suite Dx through 5.14.2 has a privilege escalation vulnerability that may allow an authenticated user with limited access privileges to gain unauthorized administrator-level privileges through exploitation of speci...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41085/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T20:27:12.817000
4 posts
⚠️ HIGH severity: CVE-2026-8657 in jsondiffpatch <0.7.6 enables remote prototype pollution via patch APIs. Patch status unconfirmed — avoid untrusted input & monitor vendor updates. Details: https://radar.offseq.com/threat/cve-2026-8657-prototype-pollution-in-jsondiffpatch-73cb7b51 #OffSeq #infosec #NodeJS #vuln
##🟠 CVE-2026-8657 - High (8.2)
Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or J...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8657/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ HIGH severity: CVE-2026-8657 in jsondiffpatch <0.7.6 enables remote prototype pollution via patch APIs. Patch status unconfirmed — avoid untrusted input & monitor vendor updates. Details: https://radar.offseq.com/threat/cve-2026-8657-prototype-pollution-in-jsondiffpatch-73cb7b51 #OffSeq #infosec #NodeJS #vuln
##🟠 CVE-2026-8657 - High (8.2)
Versions of the package jsondiffpatch before 0.7.6 are vulnerable to Prototype Pollution via the jsondiffpatch.patch() and jsondiffpatch/formatters/jsonpatch.patch() APIs. An attacker can perform prototype pollution by supplying crafted delta or J...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8657/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T20:19:31.307000
2 posts
🟠 CVE-2026-47092 - High (7.8)
Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability that allows local attackers to execute arbitrary commands by manipulating the COMSPEC environment variable. Attackers can set COMSPEC to an arbitrary ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47092/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-47092 - High (7.8)
Claude HUD through 0.0.12, patched in commit 234d9aa, contains a command injection vulnerability that allows local attackers to execute arbitrary commands by manipulating the COMSPEC environment variable. Attackers can set COMSPEC to an arbitrary ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-47092/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T20:16:40.220000
2 posts
MEDIUM severity: CVE-2026-8724 in Dataease 2.10.20 allows SQL injection via SqlparserUtils.transFilter. Exploit requires high-priv user. No patch yet — restrict access & monitor for suspicious queries. More: https://radar.offseq.com/threat/cve-2026-8724-sql-injection-in-dataease-6c315564 #OffSeq #SQLInjection #InfoSec
##MEDIUM severity: CVE-2026-8724 in Dataease 2.10.20 allows SQL injection via SqlparserUtils.transFilter. Exploit requires high-priv user. No patch yet — restrict access & monitor for suspicious queries. More: https://radar.offseq.com/threat/cve-2026-8724-sql-injection-in-dataease-6c315564 #OffSeq #SQLInjection #InfoSec
##updated 2026-05-18T20:16:39.537000
2 posts
1 repos
🟠 CVE-2026-45672 - High (8.8)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45672/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45672 - High (8.8)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.12, the /api/v1/utils/code/execute endpoint executes arbitrary Python code via Jupyter for any verified user, even when the admin has s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45672/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T20:16:38.997000
2 posts
🟠 CVE-2026-45301 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45301 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.3.16, a missing permission check in all files related API endpoints allows any authenticated user to list, access and delete every file u...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T20:11:38.523000
2 posts
🟠 CVE-2026-45315 - High (8.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45315/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45315 - High (8.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.3, the audio transcription upload endpoint takes the file extension from the user-supplied filename and saves the file under CACHE_DIR/...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45315/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T19:59:59.590000
3 posts
🚨 CRITICAL: CVE-2026-41258 impacts OpenMRS Core 2.7.0-2.7.8 & 2.8.0-2.8.5. Privileged users can inject Java via Velocity templates, risking full system compromise. Patch to 2.7.9/2.8.6 now. Details: https://radar.offseq.com/threat/cve-2026-41258-cwe-94-improper-control-of-generati-7a28d9cd #OffSeq #OpenMRS #vuln #healthcare
##🚨 CRITICAL: CVE-2026-41258 impacts OpenMRS Core 2.7.0-2.7.8 & 2.8.0-2.8.5. Privileged users can inject Java via Velocity templates, risking full system compromise. Patch to 2.7.9/2.8.6 now. Details: https://radar.offseq.com/threat/cve-2026-41258-cwe-94-improper-control-of-generati-7a28d9cd #OffSeq #OpenMRS #vuln #healthcare
##🔴 CVE-2026-41258 - Critical (9.1)
OpenMRS is an open source electronic medical record system platform. From 2.7.0 to before 2.7.9 and 2.8.6, the ConceptReferenceRangeUtility.evaluateCriteria() method in OpenMRS Core evaluates database-stored criteria strings as Apache Velocity tem...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41258/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T19:59:59.590000
3 posts
🛡️ CRITICAL RCE: CVE-2026-44717 impacts 611711Dark mcp_calculate_server <0.1.1. Unsanitized eval() use enables remote code execution. Upgrade to 0.1.1 immediately to mitigate. Details: https://radar.offseq.com/threat/cve-2026-44717-cwe-94-improper-control-of-generati-2fa37fa7 #OffSeq #CVE #infosec #security
##🛡️ CRITICAL RCE: CVE-2026-44717 impacts 611711Dark mcp_calculate_server <0.1.1. Unsanitized eval() use enables remote code execution. Upgrade to 0.1.1 immediately to mitigate. Details: https://radar.offseq.com/threat/cve-2026-44717-cwe-94-improper-control-of-generati-2fa37fa7 #OffSeq #CVE #infosec #security
##🔴 CVE-2026-44717 - Critical (9.8)
MCP Calculate Server is a mathematical calculation service based on MCP protocol and SymPy library. Prior to 0.1.1, the use of eval() to evaluate mathematical expressions without proper input sanitization leads to remote code execution. This vulne...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44717/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T19:53:25.020000
2 posts
🟠 CVE-2026-45402 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45402/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45402 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, multiple endpoints accept a user-supplied file_id and attach the referenced file to a resource the caller controls (folder knowledge...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45402/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T19:52:38.637000
2 posts
🟠 CVE-2026-44570 - High (8.3)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, resto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44570/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44570 - High (8.3)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.19, authorization controls surrounding the memories API were inconsistent, resulting in the ability of a standard user to delete, resto...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44570/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T19:43:34.423000
1 posts
🟠 CVE-2026-8524 - High (8.8)
Out of bounds write in WebAudio in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8524/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T19:41:53.163000
1 posts
🟠 CVE-2026-8529 - High (8.8)
Heap buffer overflow in Codecs in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted video file. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8529/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T19:34:25.260000
2 posts
🚨 CVE-2026-45035 (CRITICAL, CVSS 9.4): Tabby < 1.0.233 exposes users to RCE via tabby:// links. Any click can run OS commands with user privileges. Patch to 1.0.233+ ASAP! https://radar.offseq.com/threat/cve-2026-45035-cwe-78-improper-neutralization-of-s-e1b4240b #OffSeq #RCE #Tabby #Vuln
##🚨 CVE-2026-45035 (CRITICAL, CVSS 9.4): Tabby < 1.0.233 exposes users to RCE via tabby:// links. Any click can run OS commands with user privileges. Patch to 1.0.233+ ASAP! https://radar.offseq.com/threat/cve-2026-45035-cwe-78-improper-neutralization-of-s-e1b4240b #OffSeq #RCE #Tabby #Vuln
##updated 2026-05-18T19:22:47.003000
4 posts
🟠 CVE-2026-8776 - High (8.8)
A vulnerability has been found in Edimax BR-6428NS 1.10. This vulnerability affects the function formPPTPSetup of the file /goform/formPPTPSetup of the component POST Request Handler. Such manipulation of the argument pptpUserName leads to buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8776/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-8776: HIGH severity buffer overflow in Edimax BR-6428NS v1.10 (formPPTPSetup, pptpUserName). Public exploit, remote attack possible. Vendor unresponsive. Assess exposure & mitigate risk now! https://radar.offseq.com/threat/cve-2026-8776-buffer-overflow-in-edimax-br-6428ns-a86f6683 #OffSeq #Vulnerability #IoTSecurity
##🟠 CVE-2026-8776 - High (8.8)
A vulnerability has been found in Edimax BR-6428NS 1.10. This vulnerability affects the function formPPTPSetup of the file /goform/formPPTPSetup of the component POST Request Handler. Such manipulation of the argument pptpUserName leads to buffer ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8776/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-8776: HIGH severity buffer overflow in Edimax BR-6428NS v1.10 (formPPTPSetup, pptpUserName). Public exploit, remote attack possible. Vendor unresponsive. Assess exposure & mitigate risk now! https://radar.offseq.com/threat/cve-2026-8776-buffer-overflow-in-edimax-br-6428ns-a86f6683 #OffSeq #Vulnerability #IoTSecurity
##updated 2026-05-18T19:17:26.423000
2 posts
🟠 CVE-2026-8518 - High (8.8)
Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8518/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8518 - High (8.8)
Use after free in Blink in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8518/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:39:52.200000
2 posts
🟠 CVE-2026-6346 - High (8.7)
Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with acces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6346 - High (8.7)
Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields before including them in support packet generation, which allows a Mattermost System Admin or any party with acces...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6346/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:38:29.277000
1 posts
🟠 CVE-2026-8695 - High (7.5)
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_threads_list() function that allows remote attackers to trigger memory corruption by sending a valid qfThreadInfo response followed by a malformed qsThreadInfo response. Attackers c...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8695/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:35:23.590000
2 posts
🔴 CVE-2026-44551 - Critical (9.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44551 - Critical (9.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the LDAP authentication endpoint does not validate that the submitted password is non-empty before performing a Simple Bind against ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:34:39.533000
2 posts
🟠 CVE-2026-8509 - High (8.8)
Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8509 - High (8.8)
Heap buffer overflow in WebML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8509/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:34:17.750000
2 posts
🔴 CVE-2026-8511 - Critical (9.6)
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-8511 - Critical (9.6)
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8511/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:32:28
1 posts
100 repos
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/Shotafry/CopyFail-Exploits-CVE-2026-31431
https://github.com/insomnisec/Detections-CVE-2026-31431
https://github.com/wvverez/CVE-2026-31431-Copy-Fail
https://github.com/Koshmare-Blossom/Copyfail-sh
https://github.com/lonelyor/CVE-2026-31431-exp
https://github.com/vishwanathakuthota/copy-fail-CVE-2026-31431
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Statically-PoC
https://github.com/Alfredooe/CVE-2026-31431
https://github.com/MrAriaNet/cPanel-Fix
https://github.com/AdityaBhatt3010/CVE-2026-31431
https://github.com/krisiasty/vcheck
https://github.com/SeanRickerd/cve-2026-31431
https://github.com/desultory/CVE-2026-31431
https://github.com/gagaltotal/cve-2026-31431-copy-fail
https://github.com/First-John/CVE-2026-43500
https://github.com/painoob/Copy-Fail-Exploit-CVE-2026-31431
https://github.com/JuanBindez/CVE-2026-31431
https://github.com/bigwario/copy-fail-CVE-2026-31431-C
https://github.com/Webhosting4U/Copy-Fail_Detect_and_mitigate_CVE-2026-31431
https://github.com/Boos4721/copyfail-rs
https://github.com/philfry/cve-2026-31431-ftrace
https://github.com/KanbaraAkihito/CVE-2026-31431-copyfail-rs
https://github.com/gbonacini/CVE-2026-31431
https://github.com/guiimoraes/CVE-2026-31431
https://github.com/tgies/copy-fail-c
https://github.com/iss4cf0ng/CVE-2026-31431-Linux-Copy-Fail
https://github.com/0xShe/CVE-2026-31431
https://github.com/yandex-cloud-examples/yc-mk8s-copy-fail-mitigation
https://github.com/AliHzSec/CVE-2026-31431
https://github.com/aestechno/cve-2026-31431-ansible
https://github.com/povzayd/CVE-2026-31431
https://github.com/XsanFlip/CVE-2026-31431-Patch
https://github.com/jbnetwork-git/copy-fail-check
https://github.com/RoflSecurity/copy_fail
https://github.com/samanzamani/copy-fail-checker
https://github.com/mahdi13830510/CVE-2026-31431-mitigation-suite
https://github.com/theori-io/copy-fail-CVE-2026-31431
https://github.com/diemoeve/copyfail-rs
https://github.com/ncmprbll/copy-fail-rs
https://github.com/sammwyy/copyfail-rs
https://github.com/professional-slacker/alg_check
https://github.com/Sl4cK0TH/CVE-2026-31431-PoC
https://github.com/qi4L/CVE-2026-31431-Container-Escape
https://github.com/yuspring/cve-2026-31431-poc
https://github.com/toxy4ny/copy-fail-exploit-on-c-redteam
https://github.com/yxdm02/CVE-2026-31431
https://github.com/kadir/copy-fail-CVE-2026-31431-IOC
https://github.com/ben-slates/CVE-2026-31431-Exploit
https://github.com/wesmar/CVE-2026-31431
https://github.com/liamromanis101/CVE-2026-31431-Copy-Fail---Vulnerability-Detection-Script
https://github.com/ExploitEoom/CVE-2026-31431
https://github.com/kvakirsanov/CVE-2026-31431-live-process-code-injection
https://github.com/Dabbleam/CVE-2026-31431-mitigation
https://github.com/malwarekid/CVE-2026-31431
https://github.com/bootsareme/copyfail-deconstructed
https://github.com/adityasingh108/CVE-2026-31431-Metasploit-exploit
https://github.com/beatbeast007/Linux-CopyFail-C-Version-CVE-2026-31431
https://github.com/Xerxes-2/CVE-2026-31431-rs
https://github.com/Dullpurple-sloop726/CVE-2026-31431-Linux-Copy-Fail
https://github.com/ZephrFish/CopyFail-CVE-2026-31431
https://github.com/rfxn/copyfail
https://github.com/cyber-joker/copy-fail-python
https://github.com/Crihexe/copy-fail-tiny-elf-CVE-2026-31431
https://github.com/sudoytang/copyfail-arm64
https://github.com/EynaExp/Copy-Fail-CVE-2026-31431-modernized
https://github.com/suominen/CVE-2026-31431
https://github.com/pascal-gujer/CVE-2026-31431
https://github.com/sgkdev/page_inject
https://github.com/sec17br/CVE-2026-31431-Copy-Fail
https://github.com/abdullaabdullazade/CVE-2026-31431
https://github.com/darioomatos/cve-2026-31431-copyfail
https://github.com/H1d3r/copy-fail_LPE_Interactive
https://github.com/ErdemOzgen/copy-fail-cve-2026-31431
https://github.com/Huchangzhi/autorootlinux
https://github.com/wuwu001/CVE-2026-31431-exploit
https://github.com/Percivalll/Copy-Fail-CVE-2026-31431-Kubernetes-PoC
https://github.com/rvizx/CVE-2026-31431
https://github.com/MartinPham/copy-fail-CVE-2026-31431-php
https://github.com/cozystack/copy-fail-blocker
https://github.com/0xBlackash/CVE-2026-31431
https://github.com/rootsecdev/cve_2026_31431
https://github.com/4xura/CVE-2026-31431-Copy-Fail
https://github.com/b5null/CVE-2026-31431-C
https://github.com/mrunalp/block-copyfail
https://github.com/xn0kkx/CVE-2026-31431_CopyFail_LinuxKernel_LPE
https://github.com/Smarttfoxx/copyfail
https://github.com/Sndav/CVE-2026-31431-Advanced-Exploit
https://github.com/M4xSec/CVE-2026-31431-RCE-Exploit
https://github.com/wgnet/wg.copyfail.patch
https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe
https://github.com/shadowabi/CVE-2026-31431-CopyFail-Universal-LPE
https://github.com/scriptzteam/Paranoid-Copy-Fail-CVE-2026-31431
https://github.com/atgreen/block-copyfail
https://github.com/xeloxa/copyfail-exploit
https://github.com/pedromizz/copy-fail
https://github.com/rippsec/CVE-2026-31431-Copy-Fail
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://blog.frehi.be/2026/05/18/security-updates-debian-vs-ubuntu-almalinux-vs-rocky-linux/
##updated 2026-05-18T18:31:37
2 posts
🔴 CVE-2026-45230 - Critical (9.1)
DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /api/delete-file endpoint and filesToDelete array parameters that allows unauthenticated attackers to delete arbitrary files by supplying ../ sequences that bypass direc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-45230 - Critical (9.1)
DumbAssets through 1.0.11 contains a path traversal vulnerability in the POST /api/delete-file endpoint and filesToDelete array parameters that allows unauthenticated attackers to delete arbitrary files by supplying ../ sequences that bypass direc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45230/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:31:37
2 posts
🟠 CVE-2026-45495 - High (8.8)
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45495/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45495 - High (8.8)
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45495/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:31:31
4 posts
RE: https://infosec.exchange/@perfect10_bot/116596917951373116
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42822
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could gain elevated privileges beyond those normally available to them, allowing actions such as accessing restricted information or performing operations that are typically limited to more highly privileged users or administrators.
:blob_neutral_face:
fr, wtaf is this advisory?
##🔴 CVE-2026-42822 - Critical (10)
Improper authentication in Azure Local Disconnected Operations allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42822/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##RE: https://infosec.exchange/@perfect10_bot/116596917951373116
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42822
What privileges could be gained by an attacker who successfully exploited the vulnerability?
An attacker could gain elevated privileges beyond those normally available to them, allowing actions such as accessing restricted information or performing operations that are typically limited to more highly privileged users or administrators.
:blob_neutral_face:
fr, wtaf is this advisory?
##🔴 CVE-2026-42822 - Critical (10)
Improper authentication in Azure Local Disconnected Operations allows an unauthorized attacker to elevate privileges over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42822/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:31:30
2 posts
🟠 CVE-2026-39079 - High (7.5)
An issue in prestashop upsshipping all versions through at least 2.4.0 allows a remote attacker to obtain sensitive information via the /modules/upsshipping/logs/, and /modules/upsshipping/lib/UPSBaseApi.php components
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39079/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-39079 - High (7.5)
An issue in prestashop upsshipping all versions through at least 2.4.0 allows a remote attacker to obtain sensitive information via the /modules/upsshipping/logs/, and /modules/upsshipping/lib/UPSBaseApi.php components
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-39079/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T18:29:30.137000
2 posts
🟠 CVE-2026-44553 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44553/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44553 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, administrative role changes and user deletions do not iterate SESSION_POOL to disconnect affected sessions. As a result, a user whos...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44553/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:44:44.047000
2 posts
🔴 CVE-2026-7301 - Critical (9.8)
SGLangs multimodal generation runtime scheduler's ROUTER socket binds to 0.0.0.0 by default and contains a sink that calls pickle.loads() on incoming messages, enabling RCE when exposed to the internet.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-7301 - Critical (9.8)
SGLangs multimodal generation runtime scheduler's ROUTER socket binds to 0.0.0.0 by default and contains a sink that calls pickle.loads() on incoming messages, enabling RCE when exposed to the internet.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7301/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:44:14.880000
2 posts
🟠 CVE-2026-8686 - High (7.5)
Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet.
To remediate this issue, users should upgrade to v5.0.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8686 - High (7.5)
Missing bounds validation in the MQTT v5.0 property parser in coreMQTT before 5.0.1 allows an MQTT broker to cause a denial of service by sending a crafted packet.
To remediate this issue, users should upgrade to v5.0.1.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8686/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:44:03.697000
4 posts
⚠️ CVE-2026-8719 (HIGH, CVSS 8.8): AI Engine for WordPress v3.4.9 lets any OAuth token holder with Subscriber+ escalate to admin via MCP tools. Restrict OAuth, monitor for fixes. https://radar.offseq.com/threat/cve-2026-8719-cwe-269-improper-privilege-managemen-4682432a #OffSeq #WordPress #Vuln #PrivilegeEscalation
##🟠 CVE-2026-8719 - High (8.8)
The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CVE-2026-8719 (HIGH, CVSS 8.8): AI Engine for WordPress v3.4.9 lets any OAuth token holder with Subscriber+ escalate to admin via MCP tools. Restrict OAuth, monitor for fixes. https://radar.offseq.com/threat/cve-2026-8719-cwe-269-improper-privilege-managemen-4682432a #OffSeq #WordPress #Vuln #PrivilegeEscalation
##🟠 CVE-2026-8719 - High (8.8)
The AI Engine – The Chatbot, AI Framework & MCP for WordPress plugin for WordPress is vulnerable to Privilege Escalation in version 3.4.9. This is due to missing WordPress capability enforcement in the MCP OAuth bearer-token authorization path, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8719/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:44:03.697000
2 posts
🔒 MEDIUM severity: Sanluan PublicCMS 5.202506.d suffers from a hard-coded cryptographic key (CVE-2026-8739), enabling remote exploitation. No patch yet — restrict access, monitor for updates. Exploit code public. https://radar.offseq.com/threat/cve-2026-8739-use-of-hard-coded-cryptographic-key--58e8ec15 #OffSeq #Vuln #PublicCMS
##🔒 MEDIUM severity: Sanluan PublicCMS 5.202506.d suffers from a hard-coded cryptographic key (CVE-2026-8739), enabling remote exploitation. No patch yet — restrict access, monitor for updates. Exploit code public. https://radar.offseq.com/threat/cve-2026-8739-use-of-hard-coded-cryptographic-key--58e8ec15 #OffSeq #Vuln #PublicCMS
##updated 2026-05-18T17:44:03.697000
2 posts
🔎 MEDIUM severity: CVE-2026-8737 affects Sanluan PublicCMS 5.202506.d — missing authentication in Trade Address Query Handler. Public exploit is out. Restrict access & monitor for abuse. https://radar.offseq.com/threat/cve-2026-8737-missing-authentication-in-sanluan-pu-b0beddb1 #OffSeq #Sanluan #Vulnerability #InfoSec
##🔎 MEDIUM severity: CVE-2026-8737 affects Sanluan PublicCMS 5.202506.d — missing authentication in Trade Address Query Handler. Public exploit is out. Restrict access & monitor for abuse. https://radar.offseq.com/threat/cve-2026-8737-missing-authentication-in-sanluan-pu-b0beddb1 #OffSeq #Sanluan #Vulnerability #InfoSec
##updated 2026-05-18T17:40:45.343000
2 posts
🚨 CVE-2026-8507 (HIGH): Out-of-bounds write in Crypt::OpenSSL::PKCS12 <=1.94 for Perl. Parsing PKCS12 files with >=1GiB OCTET/BIT STRING may lead to RCE. Patch available for cloud-hosted service — update ASAP. No known exploits. https://radar.offseq.com/threat/cve-2026-8507-cwe-787-out-of-bounds-write-in-jonas-652bf5a8 #OffSeq #Vuln #Perl
##🚨 CVE-2026-8507 (HIGH): Out-of-bounds write in Crypt::OpenSSL::PKCS12 <=1.94 for Perl. Parsing PKCS12 files with >=1GiB OCTET/BIT STRING may lead to RCE. Patch available for cloud-hosted service — update ASAP. No known exploits. https://radar.offseq.com/threat/cve-2026-8507-cwe-787-out-of-bounds-write-in-jonas-652bf5a8 #OffSeq #Vuln #Perl
##updated 2026-05-18T17:36:58.370000
2 posts
🟠 CVE-2026-45331 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45331 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, validate_url() in backend/open_webui/retrieval/web/utils.py calls validators.ipv6(ip, private=True), but the validators library does...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45331/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:36:58.370000
2 posts
🟠 CVE-2026-45671 - High (8)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is refer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45671/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45671 - High (8)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, any authenticated user can permanently delete files owned by other users via DELETE /api/v1/files/{id} when the target file is refer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45671/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:36:58.370000
3 posts
🟠 CVE-2026-45398 - High (7.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45398/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45398 - High (7.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, _validate_collection_access() checks the user-memory-* and file-* collection name prefixes but does not check knowledge base collect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45398/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##Tenable Research Advisories listed these two items yesterday.
- Microsoft Foundry Toolkit for VS Code: Command Injection via Python Interpreter Path Leading to Arbitrary Code Execution https://www.tenable.com/security/research/tra-2026-40 #Linux #macOS #Microsoft #Python
- CVE-2026-45398 - IDOR: Retrieval API Bypasses Knowledge Base Access Controls https://www.tenable.com/security/research/tra-2026-39 @tenable #infosec #vulnerability #threatresearch
##updated 2026-05-18T17:36:58.370000
2 posts
🟠 CVE-2026-45401 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45401/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45401 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, the validate_url() function in backend/open_webui/retrieval/web/utils.py only validates the initial URL submitted by the caller. The...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45401/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:36:58.370000
2 posts
🟠 CVE-2026-44565 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitiz...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44565/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44565 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.10, when uploading an audio file, the name of the file is derived from the original HTTP upload request and is not validated or sanitiz...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44565/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:26:40.167000
2 posts
🟠 CVE-2026-44826 - High (7.5)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44826/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44826 - High (7.5)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.2, Vvveb CMS does not validate the sign of the quantity parameter on the cart-add endpoint. Submitting a negative integer is acc...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44826/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:26:40.167000
2 posts
🟠 CVE-2026-46408 - High (7.6)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownershi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46408/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46408 - High (7.6)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the checkout endpoint accepts a user-controlled cart_id and uses it to enter the payment flow without verifying cart ownershi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46408/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:26:40.167000
2 posts
🟠 CVE-2026-46407 - High (8.1)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token li...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46407/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46407 - High (8.1)
Vvveb is a powerful and easy to use CMS with page builder to build websites, blogs or ecommerce stores. Prior to 1.0.8.3, the backend admin/auth-token endpoint allows an authenticated administrator to load another administrator's REST API token li...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46407/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:25:39.493000
4 posts
🔴 CVE-2026-45010 - Critical (9.1)
phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45010/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-45010 (CRITICAL): phpMyFAQ <4.1.2 lets unauthenticated attackers brute-force TOTP codes at /admin/check — no rate limiting or session binding. Full admin access risk. Restrict endpoint & monitor now! https://radar.offseq.com/threat/cve-2026-45010-improper-restriction-of-excessive-a-d0ea2259 #OffSeq #infosec #phpMyFAQ #CVE
##🔴 CVE-2026-45010 - Critical (9.1)
phpMyFAQ before 4.1.2 contains an improper restriction of excessive authentication attempts vulnerability in the /admin/check endpoint, which accepts arbitrary user-id parameters without session binding or rate limiting. Unauthenticated attackers ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45010/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CVE-2026-45010 (CRITICAL): phpMyFAQ <4.1.2 lets unauthenticated attackers brute-force TOTP codes at /admin/check — no rate limiting or session binding. Full admin access risk. Restrict endpoint & monitor now! https://radar.offseq.com/threat/cve-2026-45010-improper-restriction-of-excessive-a-d0ea2259 #OffSeq #infosec #phpMyFAQ #CVE
##updated 2026-05-18T17:25:39.493000
2 posts
🟠 CVE-2026-46366 - High (7.5)
phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46366 - High (7.5)
phpMyFAQ before 4.1.2 contains an information disclosure vulnerability in the getIdFromSolutionId() method that lacks permission filtering, allowing unauthenticated attackers to enumerate restricted FAQ entries and read their titles via the /solut...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46366/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:25:39.493000
3 posts
🔴 CVE-2026-46364 - Critical (9.8)
phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46364/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-46364 - Critical (9.8)
phpMyFAQ before 4.1.2 contains an unauthenticated SQL injection vulnerability in BuiltinCaptcha::garbageCollector() and BuiltinCaptcha::saveCaptcha() methods that interpolate unsanitized User-Agent headers into DELETE and INSERT queries. Unauthent...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46364/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🚨 CRITICAL: CVE-2026-46364 in phpMyFAQ <4.1.2 allows unauthenticated SQL injection via /api/captcha. Attackers can exfiltrate user creds, admin tokens, and SMTP info. Restrict endpoint & use WAF until patch is confirmed. https://radar.offseq.com/threat/cve-2026-46364-improper-neutralization-of-special--9adafcbf #OffSeq #SQLInjection #Infosec
##updated 2026-05-18T17:05:46.240000
2 posts
3 repos
https://github.com/solarlynxsqueeze/CVE-2026-32202
🟠 CVE-2026-3220 - High (8.8)
The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin before 2.4.2, Speed Optimizer WordPress plugin before 7.7.9 are vulnerable to unauthenticated Stored Cross-Site Scripting (XSS) due to a predictable replacement hash ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3220/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-3220 - High (8.8)
The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin before 2.4.2, Speed Optimizer WordPress plugin before 7.7.9 are vulnerable to unauthenticated Stored Cross-Site Scripting (XSS) due to a predictable replacement hash ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-3220/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T17:05:46.240000
2 posts
⚠️ HIGH severity: Reflected XSS in Ajax Load More < 7.8.4 (CVE-2026-6495) lets attackers inject scripts as admin. No patch confirmed — restrict access, monitor for updates, and consider WAF rules. Details: https://radar.offseq.com/threat/cve-2026-6495-cwe-79-cross-site-scripting-xss-in-a-662ee7d0 #OffSeq #WordPress #XSS
##⚠️ HIGH severity: Reflected XSS in Ajax Load More < 7.8.4 (CVE-2026-6495) lets attackers inject scripts as admin. No patch confirmed — restrict access, monitor for updates, and consider WAF rules. Details: https://radar.offseq.com/threat/cve-2026-6495-cwe-79-cross-site-scripting-xss-in-a-662ee7d0 #OffSeq #WordPress #XSS
##updated 2026-05-18T15:31:41
2 posts
🔴 CVE-2026-7304 - Critical (9.8)
SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7304/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-7304 - Critical (9.8)
SGLangs multimodal generation runtime is vulnerable to unauthenticated remote code execution when the --enable-custom-logit-processor option is enabled, as Python objects loaded via dill.loads() will be deserialized without validation.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7304/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T15:30:45
2 posts
🟠 CVE-2026-41948 - High (7.7)
Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41948/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-41948 - High (7.7)
Dify version 1.14.1 and prior contain a path traversal vulnerability that allows authenticated users to manipulate requests forwarded to the Plugin Daemon's internal REST API by exploiting insufficient URL path sanitization. Attackers can traverse...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41948/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T15:30:38
2 posts
🔴 CVE-2026-7302 - Critical (9.1)
SGLangs multimodal generation runtime is vulnerable to an unauthenticated path traversal vulnerability, allowing an attacker to write arbitrary files anywhere the server process has write access, by including ../ sequences in the upload filename w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7302/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-7302 - Critical (9.1)
SGLangs multimodal generation runtime is vulnerable to an unauthenticated path traversal vulnerability, allowing an attacker to write arbitrary files anywhere the server process has write access, by including ../ sequences in the upload filename w...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7302/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T15:30:38
2 posts
🟠 CVE-2026-42009 - High (7.5)
A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly han...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42009 - High (7.5)
A flaw was found in gnutls. A remote attacker could exploit an issue in the Datagram Transport Layer Security (DTLS) packet reordering logic. The comparator function, responsible for ordering DTLS packets by sequence numbers, did not correctly han...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42009/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T15:30:37
15 posts
4 repos
https://github.com/studiogangster/CVE-2026-46333
https://github.com/Aurillium/public-passwd
https://blog.frehi.be/2026/05/18/security-updates-debian-vs-ubuntu-almalinux-vs-rocky-linux/
##CVE-2026-46333 - War wohl 6 jahre lang bekannt ohne das gehandelt wurde - https://www.gotekky.com/guides/security/cve-2026-46333-ssh-keysign-pwn-linux-kernel/
###Ubuntu still doesn't have a patch or even a security notice for #sshkeysignpwn ...
How is this everyone else has been patched for days!
#Debian had a fix Friday morning...#DomumSocial is running on Debian, but in my day job I'm stuck with Ubuntu.
If you're also stuck with Ubuntu there is a mitigation:
`sudo sysctl -w kernel.yama.ptrace_scope=3`
I've tested this against the know exploit code at https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
This will disable the vulnerable ptrace call until the next reboot
Seeking confirmation of my theory I was able to find:
https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/
you can also set "yama.ptrace_scope" to "2" which will only allow root to use ptrace (and will also allow resetting it w/o reboot). The link above has more explanations and directions for setting it persistently across reboot for now.
This will break `strace` and `gdb`!
##🚨 CVE-2026-46333 (ssh-keysign-pwn)
In the Linux kernel, the following vulnerability has been resolved:
ptrace: slightly saner 'get_dumpable()' logic
The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.
And almost all users do in fact use it only for the case where the task
has a mm pointer.
But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).
It's not what this flag was designed for, but it is what it is.
The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.
Make it all make a bit more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-46333
#nttdata #zen #secdb #infosec
#sshkeysignpwn #cve202646333 #linux #kernel
To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
##Linux Kernel Race Condition 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords
A six-year-old Linux kernel race condition (CVE-2026-46333) allows local attackers to steal SSH private keys and password hashes by hijacking file descriptors during process termination. The flaw affects major distributions including Ubuntu and Debian, and a public exploit is available.
**Apply the latest Linux kernel patches ASAP to all affected systems (Ubuntu 22.04/24.04/26.04, Debian 13, Arch, CentOS 9, Raspberry Pi OS, CloudLinux 8/9/10), and rotate all SSH host keys on systems that allowed shell access to untrusted users. Until patched, restrict local shell access to trusted users only and monitor for suspicious use of pidfd_getfd or SUID binaries like ssh-keysign and chage.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/linux-kernel-race-condition-ssh-keysign-pwn-exposes-ssh-keys-and-shadow-passwords-l-d-6-1-e/gD2P6Ple2L
New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)
- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207
These have been backported all the way down to Alpine Linux 3.16.
Edit: These versions fix ssh-keysign-pwn, not Fragnesia
##Kernel-Updates am Morgen vertreiben Kummer und Sorgen. 😇
##CVE-2026-46333 - War wohl 6 jahre lang bekannt ohne das gehandelt wurde - https://www.gotekky.com/guides/security/cve-2026-46333-ssh-keysign-pwn-linux-kernel/
##🚨 CVE-2026-46333 (ssh-keysign-pwn)
In the Linux kernel, the following vulnerability has been resolved:
ptrace: slightly saner 'get_dumpable()' logic
The 'dumpability' of a task is fundamentally about the memory image of
the task - the concept comes from whether it can core dump or not - and
makes no sense when you don't have an associated mm.
And almost all users do in fact use it only for the case where the task
has a mm pointer.
But we have one odd special case: ptrace_may_access() uses 'dumpable' to
check various other things entirely independently of the MM (typically
explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for
threads that no longer have a VM (and maybe never did, like most kernel
threads).
It's not what this flag was designed for, but it is what it is.
The ptrace code does check that the uid/gid matches, so you do have to
be uid-0 to see kernel thread details, but this means that the
traditional "drop capabilities" model doesn't make any difference for
this all.
Make it all make a bit more sense by saying that if you don't have a
MM pointer, we'll use a cached "last dumpability" flag if the thread
ever had a MM (it will be zero for kernel threads since it is never
set), and require a proper CAP_SYS_PTRACE capability to override.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-46333
#nttdata #zen #secdb #infosec
#sshkeysignpwn #cve202646333 #linux #kernel
Linux Kernel Race Condition 'ssh-keysign-pwn' Exposes SSH Keys and Shadow Passwords
A six-year-old Linux kernel race condition (CVE-2026-46333) allows local attackers to steal SSH private keys and password hashes by hijacking file descriptors during process termination. The flaw affects major distributions including Ubuntu and Debian, and a public exploit is available.
**Apply the latest Linux kernel patches ASAP to all affected systems (Ubuntu 22.04/24.04/26.04, Debian 13, Arch, CentOS 9, Raspberry Pi OS, CloudLinux 8/9/10), and rotate all SSH host keys on systems that allowed shell access to untrusted users. Until patched, restrict local shell access to trusted users only and monitor for suspicious use of pidfd_getfd or SUID binaries like ssh-keysign and chage.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/linux-kernel-race-condition-ssh-keysign-pwn-exposes-ssh-keys-and-shadow-passwords-l-d-6-1-e/gD2P6Ple2L
New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)
- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207
These have been backported all the way down to Alpine Linux 3.16.
Edit: These versions fix ssh-keysign-pwn, not Fragnesia
##If you are changing sysctl kernel.yama.ptrace_scope because of the ssh-keygen-pwn exploit https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/ on fedora/rhel, be aware that your sysctl will be competing with /usr/lib/sysctl.d/10-default-yama-scope.conf so better change it in that file.
###Debian has released kernel update that fixes the CVE-2026-46333 (ssh-keysign-pwn) vulnerability.
Debian stable (trixie) kernel update: https://lists.debian.org/debian-security-announce/2026/msg00185.html
Debian oldstable (bookworm) kernel update: https://lists.debian.org/debian-security-announce/2026/msg00186.html
##updated 2026-05-18T15:16:25.370000
2 posts
Fragnesia (CVE-2026-46300) i DirtyDecrypt (CVE-2026-31635) ( https://nfsec.pl/security/6722 ) #linux #kernel #security
##Fragnesia (CVE-2026-46300) i DirtyDecrypt (CVE-2026-31635) ( https://nfsec.pl/security/6722 ) #linux #kernel #security
##updated 2026-05-18T09:31:56
4 posts
🟠 CVE-2026-7498 - High (8.8)
Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Basamak Information Technology Consulting and Organization Trade Ltd. Co. DernekWeb allows Stored XSS.
This issue affects DernekWeb: through 301...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7498/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##HIGH-severity XSS (CVE-2026-7498) in DernekWeb up to v30122025: improper input neutralization allows stored script injection. No patch yet. Use WAF rules & monitor for updates. Details: https://radar.offseq.com/threat/cve-2026-7498-cwe-79-improper-neutralization-of-in-3ca40b7c #OffSeq #XSS #Vuln #InfoSec
##🟠 CVE-2026-7498 - High (8.8)
Improper neutralization of input during web page generation ('cross-site scripting') vulnerability in Basamak Information Technology Consulting and Organization Trade Ltd. Co. DernekWeb allows Stored XSS.
This issue affects DernekWeb: through 301...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-7498/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##HIGH-severity XSS (CVE-2026-7498) in DernekWeb up to v30122025: improper input neutralization allows stored script injection. No patch yet. Use WAF rules & monitor for updates. Details: https://radar.offseq.com/threat/cve-2026-7498-cwe-79-improper-neutralization-of-in-3ca40b7c #OffSeq #XSS #Vuln #InfoSec
##updated 2026-05-18T09:31:56
2 posts
🟠 CVE-2026-6347 - High (7.6)
Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields in the Mattermost Calls plugin which allows an attacker with access to a support packet to obtain TURN server cred...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6347/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-6347 - High (7.6)
Mattermost versions 11.5.x <= 11.5.1, 10.11.x <= 10.11.13, 11.4.x <= 11.4.3 fail to sanitize sensitive configuration fields in the Mattermost Calls plugin which allows an attacker with access to a support packet to obtain TURN server cred...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-6347/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-18T06:31:18
2 posts
🔎 CVE-2026-8786: Tencent WeKnora 0.3.0 – 0.3.6 has a MEDIUM severity auth bypass in the Config API (kbId manipulation). No patch yet — restrict access & monitor updates. https://radar.offseq.com/threat/cve-2026-8786-authorization-bypass-in-tencent-wekn-4ef018b6 #OffSeq #Vulnerability #Tencent #AppSec
##🔎 CVE-2026-8786: Tencent WeKnora 0.3.0 – 0.3.6 has a MEDIUM severity auth bypass in the Config API (kbId manipulation). No patch yet — restrict access & monitor updates. https://radar.offseq.com/threat/cve-2026-8786-authorization-bypass-in-tencent-wekn-4ef018b6 #OffSeq #Vulnerability #Tencent #AppSec
##updated 2026-05-18T03:32:43
4 posts
⚠️ Buffer overflow (HIGH severity, CVE-2026-8775) in Edimax BR-6428NS v1.10 — remote exploit possible via L2TPUserName, no patch, public exploit out. Restrict network access or replace device. https://radar.offseq.com/threat/cve-2026-8775-buffer-overflow-in-edimax-br-6428ns-c737b1ee #OffSeq #Vuln #Infosec #RouterSecurity
##🟠 CVE-2026-8775 - High (8.8)
A flaw has been found in Edimax BR-6428NS 1.10. This affects the function formL2TPSetup of the file /goform/formL2TPSetup of the component POST Request Handler. This manipulation of the argument L2TPUserName causes buffer overflow. It is possible ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8775/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ Buffer overflow (HIGH severity, CVE-2026-8775) in Edimax BR-6428NS v1.10 — remote exploit possible via L2TPUserName, no patch, public exploit out. Restrict network access or replace device. https://radar.offseq.com/threat/cve-2026-8775-buffer-overflow-in-edimax-br-6428ns-c737b1ee #OffSeq #Vuln #Infosec #RouterSecurity
##🟠 CVE-2026-8775 - High (8.8)
A flaw has been found in Edimax BR-6428NS 1.10. This affects the function formL2TPSetup of the file /goform/formL2TPSetup of the component POST Request Handler. This manipulation of the argument L2TPUserName causes buffer overflow. It is possible ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8775/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-17T18:31:33
4 posts
14 repos
https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
https://github.com/0xlane/pagecache-guard
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/haydenjames/dirty-frag-check
https://github.com/First-John/CVE-2026-43500
https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
https://github.com/krisiasty/vcheck
https://github.com/vorkampfer/dirty_frag_mitigation
https://github.com/linnemanlabs/dirtyfrag-arm64
https://github.com/liamromanis101/DirtyFrag-Detector
https://github.com/metalx1993/dirtyfrag-patches
https://github.com/attaattaatta/CVE-2026-43500
https://blog.frehi.be/2026/05/18/security-updates-debian-vs-ubuntu-almalinux-vs-rocky-linux/
###DirtyFrag #vulnerability: Universal Linux LPE
Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.
##To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
##Ist die Aufregung um die neuen Linux-Fehler berechtigt?
Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:
CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").
Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).
Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher
#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen
##updated 2026-05-17T06:30:32
2 posts
MEDIUM severity: CVE-2026-8733 in Investintech SlimPDFReader v2.0.0 – 2.0.13 allows stack-based buffer overflow. Product is discontinued, no patch available. Public exploit code is out, but not actively exploited. Migrate now. https://radar.offseq.com/threat/cve-2026-8733-stack-based-buffer-overflow-in-inves-b008f4aa #OffSeq #Vulnerability #PDF
##MEDIUM severity: CVE-2026-8733 in Investintech SlimPDFReader v2.0.0 – 2.0.13 allows stack-based buffer overflow. Product is discontinued, no patch available. Public exploit code is out, but not actively exploited. Migrate now. https://radar.offseq.com/threat/cve-2026-8733-stack-based-buffer-overflow-in-inves-b008f4aa #OffSeq #Vulnerability #PDF
##updated 2026-05-17T03:30:29
2 posts
🛡️ CVE-2026-8725: SSRF in CoreWorxLab CAAL v1.0 – 1.6.0 (MEDIUM). Remote, unauthenticated attackers can trigger server requests. No patch; restrict outbound traffic & monitor logs. Exploit is public. https://radar.offseq.com/threat/cve-2026-8725-server-side-request-forgery-in-corew-ac445f41 #OffSeq #SSRF #Vuln #BlueTeam
##🛡️ CVE-2026-8725: SSRF in CoreWorxLab CAAL v1.0 – 1.6.0 (MEDIUM). Remote, unauthenticated attackers can trigger server requests. No patch; restrict outbound traffic & monitor logs. Exploit is public. https://radar.offseq.com/threat/cve-2026-8725-server-side-request-forgery-in-corew-ac445f41 #OffSeq #SSRF #Vuln #BlueTeam
##updated 2026-05-17T00:31:39
4 posts
🔒 CVE-2026-46728 (HIGH, CVSS 8.2) in denx U-Boot <2026.04 lets local privileged attackers bypass FIT signature checks due to hashed-nodes omission. Restrict local access & watch for patches. https://radar.offseq.com/threat/cve-2026-46728-cwe-346-origin-validation-error-in--fd4fda20 #OffSeq #Uboot #Infosec #Firmware
##🟠 CVE-2026-46728 - High (8.2)
Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔒 CVE-2026-46728 (HIGH, CVSS 8.2) in denx U-Boot <2026.04 lets local privileged attackers bypass FIT signature checks due to hashed-nodes omission. Restrict local access & watch for patches. https://radar.offseq.com/threat/cve-2026-46728-cwe-346-origin-validation-error-in--fd4fda20 #OffSeq #Uboot #Infosec #Firmware
##🟠 CVE-2026-46728 - High (8.2)
Das U-Boot before 2026.04 allows FIT (Flat Image Tree) signature verification bypass because hashed-nodes is omitted from a hash.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-16T15:31:13
4 posts
3 repos
https://github.com/arch1m3d/MiniPlasma-Detection
Windows Cloud Filter Zero-Day Exploit 'MiniPlasma' Grants SYSTEM Privileges
A zero-day exploit named 'MiniPlasma' allows local privilege escalation to SYSTEM on fully patched Windows systems by abusing a regressed vulnerability in the Cloud Filter driver. The flaw appears to be a re-emergence of CVE-2020-17103.
**Until Microsoft releases a fix, restrict who can log in locally to your Windows machines (especially shared workstations, VDI, and jump servers) and use AppLocker or Windows Defender Application Control to block the public MiniPlasma.exe exploit. On servers that don't need OneDrive/cloud file syncing, disable or remove the Cloud Files filter driver (cldflt.sys) to remove the vulnerable component entirely.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/windows-cloud-filter-zero-day-exploit-miniplasma-grants-system-privileges-z-w-i-w-g/gD2P6Ple2L
Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft
##Windows Cloud Filter Zero-Day Exploit 'MiniPlasma' Grants SYSTEM Privileges
A zero-day exploit named 'MiniPlasma' allows local privilege escalation to SYSTEM on fully patched Windows systems by abusing a regressed vulnerability in the Cloud Filter driver. The flaw appears to be a re-emergence of CVE-2020-17103.
**Until Microsoft releases a fix, restrict who can log in locally to your Windows machines (especially shared workstations, VDI, and jump servers) and use AppLocker or Windows Defender Application Control to block the public MiniPlasma.exe exploit. On servers that don't need OneDrive/cloud file syncing, disable or remove the Cloud Files filter driver (cldflt.sys) to remove the vulnerable component entirely.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/windows-cloud-filter-zero-day-exploit-miniplasma-grants-system-privileges-z-w-i-w-g/gD2P6Ple2L
Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft
##updated 2026-05-16T01:16:17.333000
2 posts
🔴 CVE-2026-45375 - Critical (9)
SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / ic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45375/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-45375 - Critical (9)
SiYuan is an open-source personal knowledge management system. Prior to 3.7.0, SiYuan's Bazaar (community marketplace) renders the name and version fields of a package's plugin.json (and the equivalent theme.json / template.json / widget.json / ic...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45375/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-16T01:16:16.447000
2 posts
🟠 CVE-2026-43904 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43904 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, softimageinput.cpp:469 (mixed RLE) and :345 (pure RLE) do not clamp the run length to...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43904/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-16T00:32:14
2 posts
🟠 CVE-2026-35194 - High (8.1)
Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulner...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35194/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-35194 - High (8.1)
Code injection in SQL code generation in Apache Flink 1.15.0 through 1.20.x and 2.0.0 through 2.x allows authenticated users with query submission privileges to execute arbitrary code on TaskManagers via maliciously crafted SQL queries. The vulner...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-35194/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:55:30
2 posts
🟠 CVE-2026-45400 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45400/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45400 - High (8.5)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.5, a parsing difference between the urlparse and requests libraries led to an SSRF bypass vulnerability. This vulnerability is fixed in...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45400/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:55:05
2 posts
🟠 CVE-2026-45675 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45675/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45675 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, he LDAP and OAuth authentication flows use a TOCTOU (Time-of-Check-Time-of-Use) pattern for first-user admin role assignment. The re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45675/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:52:50
2 posts
🟠 CVE-2026-44554 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44554/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44554 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the POST /api/v1/retrieval/process/web endpoint accepts a user-supplied collection_name and an overwrite query parameter (default: T...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44554/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:52:35
2 posts
🟠 CVE-2026-44555 - High (7.6)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing ba...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44555/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44555 - High (7.6)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, Open WebUI supports model composition via base_model_id: a user-defined model (e.g., "Cheap Assistant") can reference an existing ba...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44555/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:52:30
2 posts
🟠 CVE-2026-44552 - High (8.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis da...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44552 - High (8.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, the tool_servers and terminal_servers keys in utils/tools.py do use a prefix. When two or more Open WebUI instances share a Redis da...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44552/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:49:54
1 posts
🟠 CVE-2026-44714 - High (7.5)
The bitcoinj library is a Java implementation of the Bitcoin protocol. Prior to 0.17.1, ScriptExecution.correctlySpends() contains two fast-path verification bugs for standard P2PKH and native P2WPKH spends in core/src/main/java/org/bitcoinj/scrip...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44714/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:48:44
2 posts
🚨 CRITICAL: CVE-2026-42155 in OpenMage magento-lts (<20.18.0). Insecure, time-based session ID generation enables API session hijacking via brute-force attacks. Upgrade to 20.18.0+ ASAP! https://radar.offseq.com/threat/cve-2026-42155-cwe-330-use-of-insufficiently-rando-1baedc02 #OffSeq #Magento #Vuln #APIsecurity
##🚨 CRITICAL: CVE-2026-42155 in OpenMage magento-lts (<20.18.0). Insecure, time-based session ID generation enables API session hijacking via brute-force attacks. Upgrade to 20.18.0+ ASAP! https://radar.offseq.com/threat/cve-2026-42155-cwe-330-use-of-insufficiently-rando-1baedc02 #OffSeq #Magento #Vuln #APIsecurity
##updated 2026-05-15T23:48:24
2 posts
🟠 CVE-2026-23998 - High (7.5)
Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-23998 - High (7.5)
Fleet is open source device management software. Prior to version 4.81.0, a vulnerability in Fleet’s Windows MDM management endpoint could allow requests to be processed without proper client certificate validation. In certain circumstances, thi...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-23998/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T23:44:52
2 posts
🟠 CVE-2026-27886 - High (7.5)
Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-27886 - High (7.5)
Strapi is an open source headless content management system. Strapi versions starting in 4.0.0 and prior to 5.37.0 did not sufficiently sanitize query parameters when filtering content via relational fields. An unauthenticated attacker could use t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-27886/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:31:45
2 posts
🟠 CVE-2026-46367 - High (7.6)
phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event han...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46367 - High (7.6)
phpMyFAQ before 4.1.2 contains a stored cross-site scripting vulnerability in Utils::parseUrl() that allows authenticated users to inject JavaScript via malformed URLs in comments. Attackers can craft URLs with unescaped quotes to inject event han...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46367/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:31:45
2 posts
🟠 CVE-2026-8696 - High (7.5)
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread informati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8696/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8696 - High (7.5)
radare2 6.1.5 contains a use-after-free vulnerability in the gdbr_pids_list() function within the GDB client core that allows remote attackers to cause a denial of service or potentially execute arbitrary code by sending malformed thread informati...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8696/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:31:42
2 posts
🟠 CVE-2026-46359 - High (7.5)
phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-46359 - High (7.5)
phpMyFAQ before 4.1.2 contains a sql injection vulnerability in CurrentUser::setTokenData that allows authenticated attackers to execute arbitrary SQL by injecting malicious OAuth token claims. Attackers with Azure AD accounts containing SQL metac...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-46359/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T21:16:39.133000
2 posts
🟠 CVE-2026-8558 - High (8.8)
Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8558/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8558 - High (8.8)
Out of bounds write in Fonts in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8558/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T19:43:22.767000
2 posts
🟠 CVE-2026-43907 - High (8.3)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp le...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43907/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43907 - High (8.3)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed integer overflow in QueryRGBBufferSizeInternal() in DPXColorConverter.cpp le...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43907/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T19:35:52.963000
25 posts
1 repos
Microsoft Exchange Zero-Day CVE-2026-42897 Exploited in the Wild While Patch Still Missing + Video
Introduction: A Silent Threat Inside Enterprise Email Systems A newly discovered Microsoft Exchange zero-day vulnerability is currently being actively exploited, leaving organizations exposed while a formal patch remains unavailable. Tracked as CVE-2026-42897, the flaw affects Outlook Web Access (OWA), a widely used web-based email interface in enterprise environments.…
##🔵 THREAT INTELLIGENCE
Weekly Threat Roundup: 2026-05-11 to 2026-05-17
Roundup | CRITICAL
CVEs: CVE-2026-20182, CVE-2026-42897, CVE-2026-42945
Cybersecurity roundup for 2026-05-11 to 2026-05-17. 3 CVE advisories, 3 breach reports, 1 threat news stories.
Full analysis:
https://www.yazoul.net/news/article/2026-w20-weekly-threat-roundup
Microsoft Exchange Servers Targeted in Active Exploitation
Microsoft has sounded the alarm on a critical vulnerability in on-premise Exchange Servers, known as CVE-2026-42897, that's currently being exploited by hackers - and the company is urging affected users to act fast. A temporary fix is in place, with a permanent patch on the way.
#Cve202642897 #MicrosoftExchangeServers #EmergingThreats #SpoofingVulnerability #CrosssiteScripting
##Here's a professional summary of recent developments:
Fast16 malware, predating Stuxnet, is confirmed as a nuclear weapons simulation sabotage tool (May 18). A Microsoft Exchange vulnerability (CVE-2026-42897) is actively exploited. US-Iran tensions heighten after Trump's warnings of military action (May 18). Malta becomes the first country to offer ChatGPT Plus nationwide as a public service (May 17).
##📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
🟠 CVE-2026-42897 - High (8.1)
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.
##**Global Briefing: May 17, 2026**
Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.
Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.
Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.
##Microsoft Exchange Server Spoofing Vulnerability
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
##Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).
##Microsoft has released mitigations for a high-severity Microsoft Exchange Server vulnerability that is being actively exploited in attacks.
The flaw enables threat actors to execute arbitrary code through a cross-site scripting (XSS) attack targeting Outlook on the web users.
Tracked as CVE-2026-42897, the vulnerability affects Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE).
##CVE-2026-42897 exploits improper HTML sanitization in OWA, allowing JavaScript execution within the email rendering context. The script inherits authentication tokens, accesses the full DOM, and can read emails, harvest...
##CVE-2026-42897: CISA warnt vor aktiv ausgenutzter XSS-Lücke in Microsoft Exchange Server
##Here's a professional summary of recent developments:
Fast16 malware, predating Stuxnet, is confirmed as a nuclear weapons simulation sabotage tool (May 18). A Microsoft Exchange vulnerability (CVE-2026-42897) is actively exploited. US-Iran tensions heighten after Trump's warnings of military action (May 18). Malta becomes the first country to offer ChatGPT Plus nationwide as a public service (May 17).
##📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
🟠 CVE-2026-42897 - High (8.1)
Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42897/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.
##**Global Briefing: May 17, 2026**
Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.
Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.
Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.
##Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).
##🚨 [CISA-2026:0515] CISA Adds One Known Exploited Vulnerability to Catalog (https://secdb.nttzen.cloud/security-advisory/detail/CISA-2026:0515)
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack vector for malicious cyber actors and pose significant risk to the federal enterprise.
⚠️ CVE-2026-42897 (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- Name: Microsoft Exchange Server Cross-Site Scripting Vulnerability
- Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Known To Be Used in Ransomware Campaigns? Unknown
- Vendor: Microsoft
- Product: Microsoft
- Notes: https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2026-42897 ; https://learn.microsoft.com/en-us/exchange/plan-and-deploy/post-installation-tasks/security-best-practices/exchange-emergency-mitigation-service ; https://nvd.nist.gov/vuln/detail/CVE-2026-42897
#SecDB #InfoSec #CVE #CISA_KEV #cisa_20260515 #cisa20260515 #cve_2026_42897 #cve202642897
##CVE ID: CVE-2026-42897
Vendor: Microsoft
Product: Microsoft
Date Added: 2026-05-15
CVE URL: https://nvd.nist.gov/vuln/detail/CVE-2026-42897
High critical cross-site scripting (CSS) vuln in Microsoft Exchange Server 2016 being used in the wild
##CISA has updated the KEV catalogue.
- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-42897 #Microsoft #CISA #zeroday #infosec #vulnerability
##Microsoft Warns of Actively Exploited Zero-Day in Exchange Server OWA
Microsoft is warning of an actively exploited spoofing vulnerability (CVE-2026-42897) in on-premises Exchange Server that allows attackers to execute arbitrary JavaScript via Outlook Web Access XSS.
**If you run on-premises Microsoft Exchange Server (2016, 2019, or Subscription Edition), make sure the Exchange Emergency Mitigation Service (EEMS) is enabled so the M2.1.x mitigation for CVE-2026-42897 is active, or run the Exchange on-premises Mitigation Tool manually if your network is air-gapped. Keep the mitigation on even if it breaks OWA Print Calendar or inline images, and check if you can apply the permanent patch once Microsoft releases it.**
#cybersecurity #infosec #attack #activeexploit
https://beyondmachines.net/event_details/microsoft-warns-of-actively-exploited-zero-day-in-exchange-server-owa-5-p-7-i-w/gD2P6Ple2L
updated 2026-05-15T18:31:42
1 posts
🟠 CVE-2026-34253 - High (8.2)
A buffer underflow vulnerability has been identified in the ogg123 utility from the vorbis-tools 1.4.3 package in function remotethread in remote.c. This vulnerability occurs in the remote control functionality when processing malformed input, lea...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-34253/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T18:31:41
2 posts
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
updated 2026-05-15T18:31:38
1 posts
🟠 CVE-2026-38728 - High (7.5)
An issue in Nodemailer smtp_server before v.3.18.3 allows a remote attacker to cause a denial of service via the SMTPStream._write, lib/smtp-stream.js components
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-38728/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T18:25:21.933000
2 posts
🟠 CVE-2026-42334 - High (7.5)
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Prior to 6.13.9, 7.8.9, 8.22.1, and 9.1.6, a vulnerability allows bypassing Mongoose’s sanitizeFilter query sanitization mechanism via the $nor operator....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42334/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-42334 - High (7.5)
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Prior to 6.13.9, 7.8.9, 8.22.1, and 9.1.6, a vulnerability allows bypassing Mongoose’s sanitizeFilter query sanitization mechanism via the $nor operator....
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-42334/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T18:07:55.057000
2 posts
🟠 CVE-2026-43908 - High (8.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside Conv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43908/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43908 - High (8.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the pixel-loop index expression i * 3 inside Conv...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43908/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T15:31:42
2 posts
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
updated 2026-05-15T15:16:52.960000
2 posts
🔴 CVE-2026-44523 - Critical (10)
Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as shor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44523 - Critical (10)
Note Mark is an open-source note-taking application. Prior to 0.19.4, no minimum length or entropy is enforced on the JWT_SECRET configuration value. The application accepts any base64-decodable secret regardless of size, including secrets as shor...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T14:59:11.840000
2 posts
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
updated 2026-05-15T14:44:49.877000
2 posts
🔴 CVE-2026-44592 - Critical (9.4)
Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44592 - Critical (9.4)
Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-re...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44592/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T09:31:42
1 posts
VMware Fusion: Schwachstelle CVE-2026-41702 ermöglicht Root-Eskalation auf macOS
##updated 2026-05-15T01:55:56
2 posts
🟠 CVE-2026-45665 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45665 - High (8.1)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.8.0, a Stored Cross-Site Scripting (XSS) vulnerability exists in the Banner component due to an improper sanitization order (specifically...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45665/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:38
1 posts
🟠 CVE-2026-8574 - High (8.3)
Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8574/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:37
2 posts
🟠 CVE-2026-8520 - High (8.3)
Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8520 - High (8.3)
Race in Payments in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8520/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:37
1 posts
🟠 CVE-2026-8526 - High (8.8)
Out of bounds write in WebRTC in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8526/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8513 - High (8.3)
Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8513 - High (8.3)
Use after free in Input in Google Chrome on Android prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8512 - High (8.3)
Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8512 - High (8.3)
Use after free in FileSystem in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Cr...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8512/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8510 - High (7.5)
Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8510 - High (7.5)
Integer overflow in Skia in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8510/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8514 - High (8.3)
Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8514 - High (8.3)
Use after free in Aura in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8514/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
2 posts
🟠 CVE-2026-8530 - High (8.3)
Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8530 - High (8.3)
Use after free in Network in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8530/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
1 posts
🟠 CVE-2026-8527 - High (8.8)
Insufficient validation of untrusted input in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8527/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
1 posts
🟠 CVE-2026-8525 - High (8.3)
Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8525/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
1 posts
🟠 CVE-2026-8523 - High (8.3)
Use after free in Mojo in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8523/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
1 posts
🟠 CVE-2026-8534 - High (8.3)
Integer overflow in GPU in Google Chrome on Linux and ChromeOS prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity:...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8534/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:31:36
1 posts
🟠 CVE-2026-8548 - High (8.3)
Out of bounds write in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8548/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:30:30
1 posts
🟠 CVE-2026-8542 - High (8.3)
Use after free in Core in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-15T00:30:29
2 posts
🟠 CVE-2026-8515 - High (8.3)
Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8515 - High (8.3)
Use after free in HID in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8515/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:51.050000
1 posts
🟠 CVE-2026-8575 - High (8.3)
Use after free in UI in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8575/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:47.413000
1 posts
🟠 CVE-2026-8533 - High (8.3)
Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8533/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:47.267000
2 posts
🟠 CVE-2026-8531 - High (8.8)
Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8531 - High (8.8)
Heap buffer overflow in WebML in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8531/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T22:16:46.123000
2 posts
🟠 CVE-2026-8519 - High (8.8)
Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8519 - High (8.8)
Integer overflow in ANGLE in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8519/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
2 posts
🟠 CVE-2026-8521 - High (7.5)
Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8521/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8521 - High (7.5)
Use after free in Tab Groups in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via malicious network traffic. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8521/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
1 posts
🟠 CVE-2026-8540 - High (8.8)
Type Confusion in V8 in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8540/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
1 posts
🟠 CVE-2026-8549 - High (8.8)
Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8549/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
1 posts
🟠 CVE-2026-8547 - High (7.5)
Insufficient policy enforcement in Passwords in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severit...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8547/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:54
1 posts
🟠 CVE-2026-8555 - High (8.8)
Use after free in GTK in Google Chrome on Windows prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8555/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:30:53
2 posts
🟠 CVE-2026-8621 - High (8.8)
Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Cra...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8621/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8621 - High (8.8)
Crabbox prior to v0.12.0 contains an authentication bypass vulnerability that allows non-admin shared-token callers to impersonate other owners or organizations by spoofing identity headers. Attackers can inject malicious X-Crabbox-Owner and X-Cra...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8621/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:22:56.313000
2 posts
🟠 CVE-2026-44586 - High (8.3)
SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44586/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44586 - High (8.3)
SiYuan is an open-source personal knowledge management system. From 2.1.12 to before 3.7.0. SiYuan's Bazaar marketplace renders package author metadata from the public bazaar stage feed into HTML without escaping. In the desktop app this becomes s...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44586/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
2 posts
🟠 CVE-2026-8522 - High (8.8)
Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8522/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8522 - High (8.8)
Use after free in Downloads in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: Critical)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8522/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
2 posts
🟠 CVE-2026-8517 - High (8.8)
Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Cri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8517/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-8517 - High (8.8)
Object lifecycle issue in WebShare in Google Chrome on Mac prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Cri...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8517/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
1 posts
🟠 CVE-2026-8532 - High (8.8)
Integer overflow in XML in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8532/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
1 posts
🟠 CVE-2026-8544 - High (8.8)
Use after free in Media in Google Chrome prior to 148.0.7778.168 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8544/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
1 posts
🟠 CVE-2026-8551 - High (8.8)
Use after free in Downloads in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8551/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T21:19:23.923000
1 posts
🟠 CVE-2026-8557 - High (7.5)
Use after free in Accessibility in Google Chrome prior to 148.0.7778.168 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-8557/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T20:54:42
2 posts
🟠 CVE-2026-44516 - High (7.6)
Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44516/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44516 - High (7.6)
Valtimo is an open-source business process automation platform. From 12.4.0 to 12.33.0 and 13.26.0, the LoggingRestClientCustomizer in the web module automatically intercepts all outgoing HTTP calls made via Spring's RestClient and logs the full r...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44516/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T20:54:33
2 posts
🔴 CVE-2026-44542 - Critical (9.1)
FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-44542 - Critical (9.1)
FileBrowser Quantum is a free, self-hosted, web-based file manager. Prior to 1.3.1-stable and 1.3.9-beta, attacker-controlled path input is joined with a trusted base path prior to sanitization, allowing traversal sequences (e.g., ../) to escape t...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44542/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T20:19:57
2 posts
🟠 CVE-2026-45338 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45338/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45338 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.9.0, a Server-Side Request Forgery (SSRF) vulnerability exists in _process_picture_url() in backend/open_webui/utils/oauth.py (line ~1338...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45338/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T20:17:05.413000
27 posts
22 repos
https://github.com/byezero/nginx-cve-2026-42945-check
https://github.com/hnytgl/cve-2026-42945
https://github.com/ChamsBouzaiene/ai-vuln-rediscovery-nginx-cve-2026-42945
https://github.com/rheodev/CVE-2026-42945
https://github.com/DepthFirstDisclosures/Nginx-Rift
https://github.com/0xBlackash/CVE-2026-42945
https://github.com/Renison-Gohel/CVE-2026-42945-NGINX-Rift
https://github.com/tal7aouy/nginx-cve-2026-42945
https://github.com/MateusVerass/nGixshell
https://github.com/nanwinata/nginxrift-CVE-2026-42945
https://github.com/sibersan/web-server-audit_CVE-2026-42945
https://github.com/soksofos/wazuh-nginx-cve-2026-42945-sca-lab
https://github.com/dinosn/cve-2026-42945-nginx32-lab
https://github.com/forxiucn/nginx-cve-2026-42945-poc
https://github.com/friparia/NGINX_RIFT_SCAN_CVE_2026_42945
https://github.com/oseasfr/Scanner_CVE_2026-42945
https://github.com/realityone/cve-2026-42945-scan
https://github.com/iammerrida-source/nginx-rift-detect
https://github.com/jelasin/CVE-2026-42945
https://github.com/chenqin231/CVE-2026-42945
Geopolitical: US-China held cyber discussions, Iran seized a vessel near the Strait of Hormuz, and Ukraine experienced drone attacks on Moscow. Tech: Microsoft Edge enhanced password security; Colorado and Georgia enacted new AI legislation. Cybersecurity: Instructure paid hackers' ransom after a breach, and a critical NGINX vulnerability (CVE-2026-42945) is under active exploitation.
##🔵 THREAT INTELLIGENCE
Weekly Threat Roundup: 2026-05-11 to 2026-05-17
Roundup | CRITICAL
CVEs: CVE-2026-20182, CVE-2026-42897, CVE-2026-42945
Cybersecurity roundup for 2026-05-11 to 2026-05-17. 3 CVE advisories, 3 breach reports, 1 threat news stories.
Full analysis:
https://www.yazoul.net/news/article/2026-w20-weekly-threat-roundup
Scan for possible exposure indicators related to NGINX Rift, CVE-2026-42945, with the SecPoint Penetrator.
This is a serious NGINX rewrite module vulnerability that may lead to worker crashes and, under specific conditions, potential code execution.
Our detection helps organizations identify systems that show remote indicators associated with this vulnerability, enabling faster prioritization and remediation.
#SecPoint #NGINX #CyberSecurity #VulnerabilityScanning #Penetrator
##📰 Critical 18-Year-Old 'NGINX Rift' Vulnerability (CVE-2026-42945) Under Active Attack
🚨 CRITICAL NGINX FLAW! An 18-year-old bug 'NGINX Rift' (CVE-2026-42945) is actively exploited for DoS & RCE. Affects millions of web servers. Patch immediately! #NGINX #CVE #Infosec #PatchNow
🌐 cyber[.]netsecops[.]io
##Experts warn of active exploitation of critical NGINX flaw CVE-2026-42945 https://securityaffairs.com/192289/uncategorized/experts-warn-of-active-exploitation-of-critical-nginx-flaw-cve-2026-42945.html
##NGINX Rift Sparks Urgent Security Concerns as Active Exploitation Begins Days After Disclosure
Introduction to the NGINX Rift Crisis A newly disclosed vulnerability affecting both NGINX Plus and NGINX Open Source has rapidly become one of the most discussed cybersecurity threats of 2026. Tracked as CVE-2026-42945 and nicknamed “NGINX Rift,” the flaw carries a severe CVSS v4 score of 9.2 and is already being actively exploited in the wild just days after public…
##NGINX Rift: Critical F5 NGINX Vulnerability Exploited Within Days as Millions of Servers Face Attack Risk
Introduction A newly disclosed vulnerability affecting F5 NGINX has rapidly escalated into a major cybersecurity emergency. Tracked as CVE-2026-42945 and now widely referred to as “NGINX Rift,” the flaw moved from public disclosure to real-world exploitation in only three days. Security researchers warn that attackers are already scanning and targeting exposed…
##Nginx RIFT (CVE-2026-42945) : comprendre la faille vieille de 18 ans
➡️ https://cryptolab.re/posts/2026/nginx-rift-cve-2026-42945/
🚨 CRITICAL: Active exploitation of NGINX heap buffer overflow (CVE-2026-42945) in ngx_http_rewrite_module. Remote DoS on default, RCE possible if ASLR is off. Patch now! Official fix by F5. https://radar.offseq.com/threat/exploitation-of-critical-nginx-vulnerability-begin-ecd29fd7 #OffSeq #NGINX #Vuln #Patch
##NGINX Rift Sparks Alarm as Hackers Begin Exploiting Critical CVE-2026-42945 Flaw Across Internet Infrastructure
Introduction A newly disclosed security flaw in NGINX has quickly escalated into a major cybersecurity concern after researchers confirmed active exploitation attempts in the wild. The vulnerability, identified as CVE-2026-42945 and nicknamed “NGINX Rift,” affects both NGINX Plus and the open-source edition of NGINX, software that powers a massive portion of…
##Silent Cyber Apocalypse: NGINX Zero-Day CVE-2026-42945 Actively Exploited as Microsoft 365 Accounts Are Hijacked in Multi-Stage Phishing War
Massive Cybersecurity Escalation Across Core Internet Infrastructure A rapidly escalating wave of cyber incidents is shaking core internet infrastructure, with attackers actively exploiting a newly disclosed NGINX vulnerability tracked as CVE-2026-42945. Reports indicate that the flaw is not just theoretical—it is already being…
##📢 NGINX Rift : RCE critique via un heap overflow vieux de 18 ans (CVE-2026-42945)
📝 ## 🔍 Contexte
Publié le 13 mai 2026 par Zhenpeng (Leo) Lin, chercheur chez DepthFirst AI, cet article prése...
📖 cyberveille : https://cyberveille.ch/posts/2026-05-15-nginx-rift-rce-critique-via-un-heap-overflow-vieux-de-18-ans-cve-2026-42945/
🌐 source : https://depthfirst.com/research/nginx-rift-achieving-nginx-rce-via-an-18-year-old-vulnerability
#CVE_2026_40701 #CVE_2026_42934 #Cyberveille
NGINX Flaw CVE-2026-42945 Actively Exploited, Threatens Worker Crashes and RCE
A newly discovered NGINX flaw, CVE-2026-42945, is being actively exploited, posing a significant threat of worker crashes and remote code execution (RCE) through specially crafted HTTP requests. This high-severity vulnerability, with a CVSS score of 9.2, has been lurking in NGINX versions since 2008,…
#Nginx #Cve202642945 #RemoteCodeExecution #HeapBufferOverflow #VulnerabilityExploitation
##🚨 CVE-2026-42945 (NGINX Rift)
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-42945
#nttdata #zen #secdb #infosec
#nginxrift #cve202642945 #nginx
Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.
##🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. https://radar.offseq.com/threat/poc-code-published-for-critical-nginx-vulnerabilit-3d78edaa #OffSeq #NGINX #Vuln #InfoSec
##And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??
https://discourse.ifin.network/t/cve-2026-42945-heap-buffer-overflow-in-nginx/441
##Geopolitical: US-China held cyber discussions, Iran seized a vessel near the Strait of Hormuz, and Ukraine experienced drone attacks on Moscow. Tech: Microsoft Edge enhanced password security; Colorado and Georgia enacted new AI legislation. Cybersecurity: Instructure paid hackers' ransom after a breach, and a critical NGINX vulnerability (CVE-2026-42945) is under active exploitation.
##Experts warn of active exploitation of critical NGINX flaw CVE-2026-42945 https://securityaffairs.com/192289/uncategorized/experts-warn-of-active-exploitation-of-critical-nginx-flaw-cve-2026-42945.html
##🚨 CRITICAL: Active exploitation of NGINX heap buffer overflow (CVE-2026-42945) in ngx_http_rewrite_module. Remote DoS on default, RCE possible if ASLR is off. Patch now! Official fix by F5. https://radar.offseq.com/threat/exploitation-of-critical-nginx-vulnerability-begin-ecd29fd7 #OffSeq #NGINX #Vuln #Patch
##NGINX Flaw CVE-2026-42945 Actively Exploited, Threatens Worker Crashes and RCE
A newly discovered NGINX flaw, CVE-2026-42945, is being actively exploited, posing a significant threat of worker crashes and remote code execution (RCE) through specially crafted HTTP requests. This high-severity vulnerability, with a CVSS score of 9.2, has been lurking in NGINX versions since 2008,…
#Nginx #Cve202642945 #RemoteCodeExecution #HeapBufferOverflow #VulnerabilityExploitation
##🚨 CVE-2026-42945 (NGINX Rift)
NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
ℹ️ Additional info on ZEN SecDB https://secdb.nttzen.cloud/cve/detail/CVE-2026-42945
#nttdata #zen #secdb #infosec
#nginxrift #cve202642945 #nginx
Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.
##🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. https://radar.offseq.com/threat/poc-code-published-for-critical-nginx-vulnerabilit-3d78edaa #OffSeq #NGINX #Vuln #InfoSec
##And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??
https://discourse.ifin.network/t/cve-2026-42945-heap-buffer-overflow-in-nginx/441
##@beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: https://security-tracker.debian.org/tracker/CVE-2026-42945
updated 2026-05-14T20:16:11
2 posts
🟠 CVE-2026-45303 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML conten...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45303/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-45303 - High (7.7)
Open WebUI is a self-hosted artificial intelligence platform designed to operate entirely offline. Prior to 0.6.5, through the HTML rendering view, scripts can be injected and executed. The frontend provides a function to visualize the HTML conten...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-45303/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T18:34:38.530000
2 posts
7 repos
https://github.com/dwisiswant0/next-16.2.4-pocs
https://github.com/ynsmroztas/nextssrf
https://github.com/dinosn/CVE-2026-44578
https://github.com/0xBlackash/CVE-2026-44578
https://github.com/tocong282/CVE-2026-44578-PoC
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
updated 2026-05-14T18:33:53
4 posts
28 repos
https://github.com/mym0us3r/DIRTY-FRAG-Detection-with-Wazuh-4.14.4
https://github.com/Percivalll/Dirty-Frag-Kubernetes-PoC
https://github.com/KaraZajac/DIRTYFAIL
https://github.com/whosfault/CVE-2026-43284
https://github.com/linnemanlabs/dirtyfrag-arm64
https://github.com/6abc/Copy-Fail-CVE-2026-31431-dirty-frag-CVE-2026-43284
https://github.com/grabesec/XCP_ng_CVE-2026-43284_tester
https://github.com/haydenjames/dirty-frag-check
https://github.com/ChernStepanov/DirtyFrag-for-dummies
https://github.com/ryan2929/CVE-2026-43284-
https://github.com/liamromanis101/DirtyFrag-Detector
https://github.com/suominen/CVE-2026-43284
https://github.com/XRSecCD/202605_dirty_frag
https://github.com/0xlane/pagecache-guard
https://github.com/dixyes/dirtypatch
https://github.com/ochebotar/copy-fail-CVE-2026-31431-detection-probe
https://github.com/metalx1993/dirtyfrag-patches
https://github.com/DXC-0/linux-lpe-sigma
https://github.com/krisiasty/vcheck
https://github.com/0xBlackash/CVE-2026-43284
https://github.com/scriptzteam/Paranoid-Dirty-Frag-CVE-2026-43284
https://github.com/attaattaatta/CVE-2026-43500
https://github.com/AK777177/Dirty-Frag-Analysis
https://github.com/xd20111/CVE-2026-43284
https://github.com/First-John/CVE-2026-43500
https://github.com/gagaltotal/CVE-2026-43284-CVE-2026-43500-scan
https://github.com/FrosterDL/CVE-2026-43284
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://blog.frehi.be/2026/05/18/security-updates-debian-vs-ubuntu-almalinux-vs-rocky-linux/
###DirtyFrag #vulnerability: Universal Linux LPE
Obtains root privileges on major Linux distributions by chaining the xfrm-ESP Page-Cache Write (CVE-2026-43284) vulnerability and the RxRPC Page-Cache Write (CVE-2026-43500) vulnerability.
##To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
##Ist die Aufregung um die neuen Linux-Fehler berechtigt?
Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:
CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").
Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).
Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher
#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen
##updated 2026-05-14T18:33:03
13 posts
1 repos
🔵 THREAT INTELLIGENCE
Weekly Threat Roundup: 2026-05-11 to 2026-05-17
Roundup | CRITICAL
CVEs: CVE-2026-20182, CVE-2026-42897, CVE-2026-42945
Cybersecurity roundup for 2026-05-11 to 2026-05-17. 3 CVE advisories, 3 breach reports, 1 threat news stories.
Full analysis:
https://www.yazoul.net/news/article/2026-w20-weekly-threat-roundup
Cisco: Noch ein Zero-Day mit „perfekter 10“
Im Februar wurde eine weltweite Warnung verbreitet, weil Cisco SD-WAN Produkte Sicherheitslücken enthielten, die bereits seit mindestens 2023 für Angriffe ausgenutzt wurden (Zero-Day). Cisco hat Updates veröffentlicht, mit denen diese Sicherheitslücken geschlossen werden sollten. Jetzt kommt der Witz. Forscher des Sicherheitsunternehmens Rapid7 haben die Sicherheitslücke CVE-2026-20127 weiter untersucht und dabei eine weitere Sicherheitslücke gefunden! Sie hat die Nummer CVE-2026-20182 und die Risiko-Einstufung 10 von 10 bekommen. Auch diese Sicherheitslücke wird bereits für Angriffe ausgenutzt
https://www.pc-fluesterer.info/wordpress/2026/05/18/cisco-noch-ein-zero-day-mit-perfekter-10/
#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #hersteller #hintertr #spionage #UnplugTrump #backdoor
##📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.
##Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks
Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-...
🔗️ [Bleepingcomputer] https://link.is.it/iXcd6x
##Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):
Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.
Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.
Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.
##📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
This week’s intelligence brief covers active exploitation of Cisco SD-WAN (CVE-2026-20182), Microsoft Exchange CVE-2026-42897, PAN-OS RCE, AI-driven vulnerability discovery acceleration, SaaS tenant failures, and the emerging risks of autonomous AI agents inside enterprise environments.
##Cisco warns of new critical SD-WAN flaw exploited in zero-day attacks
Cisco is warning that a critical Catalyst SD-WAN Controller authentication bypass flaw, tracked as CVE-2026-20182, was actively exploited in zero-...
🔗️ [Bleepingcomputer] https://link.is.it/iXcd6x
##Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):
Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.
Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.
Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.
##Interesting. This was posted yesterday.
Tenable: Frequently asked questions about the continued exploitation of Cisco Catalyst SD-WAN vulnerabilities (CVE-2026-20182) https://www.tenable.com/blog/faq-about-the-continued-exploitation-of-cisco-catalyst-sd-wan-vulnerabilities-uat-8616 @tenable #infosec #Cisco #vulnerability
##updated 2026-05-14T18:33:03
2 posts
🟠 CVE-2025-15024 - High (8.8)
Improper Control of Generation of Code ('Code Injection') vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Remote Code Inclusion.
This issue affect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15024/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-15024 - High (8.8)
Improper Control of Generation of Code ('Code Injection') vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Remote Code Inclusion.
This issue affect...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15024/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T18:33:03
2 posts
🔴 CVE-2026-41615 - Critical (9.6)
Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🔴 CVE-2026-41615 - Critical (9.6)
Exposure of sensitive information to an unauthorized actor in Microsoft Authenticator allows an unauthorized attacker to disclose information over a network.
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-41615/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T18:30:57.103000
2 posts
🟠 CVE-2026-44513 - High (8.8)
Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, a trust_remote_code bypass in DiffusionPipeline.from_pretrained allows arbitrary remote code execution despite the user passing trust_remote_code=False (or omitting it, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44513 - High (8.8)
Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, a trust_remote_code bypass in DiffusionPipeline.from_pretrained allows arbitrary remote code execution despite the user passing trust_remote_code=False (or omitting it, ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44513/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T18:30:57.103000
2 posts
🟠 CVE-2026-44827 - High (8.8)
Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, diffusers 0.37.0 allows remote code execution without the trust_remote_code=True safeguard when loading pipelines from Hugging Face Hub repositories. The _resolve_custom...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44827/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44827 - High (8.8)
Diffusers is the a library for pretrained diffusion models. Prior to 0.38.0, diffusers 0.37.0 allows remote code execution without the trust_remote_code=True safeguard when loading pipelines from Hugging Face Hub repositories. The _resolve_custom...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44827/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T18:19:37.060000
2 posts
🟠 CVE-2025-15023 - High (8.8)
Incorrect Authorization vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Exploiting Incorrectly Configured Access Control Security Levels.
This iss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15023/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2025-15023 - High (8.8)
Incorrect Authorization vulnerability in Yordam Information Technology Consulting, Training and Electronic Systems Industry and Trade Inc. Library Automation System allows Exploiting Incorrectly Configured Access Control Security Levels.
This iss...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2025-15023/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##updated 2026-05-14T15:32:05
1 posts
CVE-2026-6473.
- **AI in Legal and Ethical Contexts**: Debates on AI-generated content, legal definitions of "data," and AI's impact on professions like journalism and academia.
- **Data Centers and Energy Consumption**: Environmental impact, energy demands, and local resource strain from AI data centers.
- **Cybersecurity Vulnerabilities**: Reports on security issues like Microsoft BitLocker backdoor, Grafana Labs source code theft, and Linux kernel vulnerabilities.
- [2/3]
updated 2026-05-13T21:16:47.520000
1 posts
Apple's May 11th update addressed 84 vulnerabilities spanning iOS, macOS, Safari, tvOS, watchOS, and visionOS. WebKit alone accounts for 13+ CVEs including CVE-2026-28883 and CVE-2026-43660. Kernel-level privilege escalation...
##updated 2026-05-13T21:16:41.903000
1 posts
Apple's May 11th update addressed 84 vulnerabilities spanning iOS, macOS, Safari, tvOS, watchOS, and visionOS. WebKit alone accounts for 13+ CVEs including CVE-2026-28883 and CVE-2026-43660. Kernel-level privilege escalation...
##updated 2026-05-13T20:34:20.310000
1 posts
Major Vendors Patch Critical Flaws Amid Cyber Threat Surge
A critical flaw in Ivanti Xtraction, tracked as CVE-2026-8043, allows remote attackers to read sensitive files and launch client-side attacks - but fortunately, patches are now available to fix this high-risk vulnerability.
#IvantiXtraction #Cve20268043 #SupplyChain #InformationDisclosure #ClientsideAttacks
##updated 2026-05-13T19:38:48.113000
2 posts
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
updated 2026-05-13T18:31:07
1 posts
1 repos
https://github.com/tstephens1080/palo-alto-cve-2026-0265-checker
Authentication Bypass Flaw in Palo Alto Networks PAN-OS Sparks Severity Dispute
Palo Alto Networks disclosed a high-severity authentication bypass vulnerability (CVE-2026-0265) in PAN-OS affecting firewalls and Panorama appliances using Cloud Authentication Service. The flaw allows unauthenticated attackers to bypass security controls on management interfaces and GlobalProtect portals.
**Make sure all PAN-OS firewall and Panorama management interfaces are isolated from the internet and accessible only from trusted internal networks. If you use Cloud Authentication Service (CAS), upgrade PAN-OS to a fixed version ASAP, or as a temporary fix switch the authentication profile to SAML or RADIUS until you can patch.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/authentication-bypass-flaw-in-palo-alto-networks-pan-os-sparks-severity-dispute-j-o-p-a-n/gD2P6Ple2L
updated 2026-05-13T16:27:11.127000
1 posts
updated 2026-05-13T16:24:39
2 posts
1 repos
Critical TOTP Secret Leak Discovered in sealed-env Enterprise Mode
The sealed-env npm package patched a critical vulnerability (CVE-2026-45091) that leaked plaintext TOTP secrets in unseal tokens, allowing attackers to bypass two-factor authentication.
**If you use the sealed-env npm package (versions 0.1.0-alpha.1 through 0.1.0-alpha.3), upgrade ASAP to 0.1.0-alpha.4 or later, as your TOTP secrets may be exposed in token logs, CI/CD build logs, container dumps, or third-party tools like Sentry. After upgrading you must rotate all TOTP secrets, re-seal any environment files protected by the vulnerable versions since the upgrade is a breaking change. Then review historical logs to purge any captured tokens.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-totp-secret-leak-discovered-in-sealed-env-enterprise-mode-g-7-y-w-n/gD2P6Ple2L
Critical TOTP Secret Leak Discovered in sealed-env Enterprise Mode
The sealed-env npm package patched a critical vulnerability (CVE-2026-45091) that leaked plaintext TOTP secrets in unseal tokens, allowing attackers to bypass two-factor authentication.
**If you use the sealed-env npm package (versions 0.1.0-alpha.1 through 0.1.0-alpha.3), upgrade ASAP to 0.1.0-alpha.4 or later, as your TOTP secrets may be exposed in token logs, CI/CD build logs, container dumps, or third-party tools like Sentry. After upgrading you must rotate all TOTP secrets, re-seal any environment files protected by the vulnerable versions since the upgrade is a breaking change. Then review historical logs to purge any captured tokens.**
#cybersecurity #infosec #advisory #vulnerability
https://beyondmachines.net/event_details/critical-totp-secret-leak-discovered-in-sealed-env-enterprise-mode-g-7-y-w-n/gD2P6Ple2L
updated 2026-05-13T15:34:52.573000
2 posts
Outlook – CVE-2026-40361 : cette faille zero-click menace les entreprises, patchez ! https://www.it-connect.fr/outlook-cve-2026-40361-cette-faille-zero-click-menace-les-entreprises-patchez/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Outlook
##Outlook – CVE-2026-40361 : cette faille zero-click menace les entreprises, patchez ! https://www.it-connect.fr/outlook-cve-2026-40361-cette-faille-zero-click-menace-les-entreprises-patchez/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Outlook
##updated 2026-05-12T19:36:42.187000
2 posts
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
updated 2026-05-12T18:30:50
4 posts
1 repos
debates, LLM-generated code in projects, and controversies around AI policies in open-source.
- **Cybersecurity and Vulnerabilities**: Updates on vulnerabilities (e.g., CVE-2026-40369, BitLocker bypass), exploits, and security practices.
- **Linux and Open-Source Software**: Updates on Linux distributions (Debian 13.5, Arch Linux), open-source projects, and discussions about migrating from proprietary systems.
- **Eurovision Song Contest (ESC)**: Live discussions, technical [2/3]
energy consumption, and the strain on local resources.
- **Cybersecurity and Vulnerabilities**: Updates on vulnerabilities (e.g., CVE-2026-40369, BitLocker bypass), exploits, and security practices in open-source projects and enterprise systems.
- **Linux and Open-Source Software**: Updates on Linux distributions (e.g., Debian 13.5, Arch Linux), open-source projects, and discussions about migrating from proprietary systems.
- **Tech Industry Shifts**: Reorganizations at [2/3]
CVE-2026-40369: Arbitrary Kernel Address Increment via NtQuerySystemInformation https://lobste.rs/s/lwtmzl #security #windows
https://github.com/orinimron123/CVE-2026-40369-EXPLOIT
CVE-2026-40369: Arbitrary Kernel Address Increment via NtQuerySystemInformation https://lobste.rs/s/lwtmzl #security #windows
https://github.com/orinimron123/CVE-2026-40369-EXPLOIT
updated 2026-05-12T15:31:49
2 posts
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
updated 2026-05-12T15:31:19
1 posts
8 repos
https://github.com/qassam-315/PAN-OS-User-ID-Buffer-Overflow-PoC
https://github.com/shizuku198411/CVE-2026-0300
https://github.com/TailwindRG/cve-2026-0300-audit
https://github.com/bannned-bit/CVE-2026-0300-PANOS
https://github.com/0xBlackash/CVE-2026-0300
https://github.com/p3Nt3st3r-sTAr/CVE-2026-0300-POC
updated 2026-05-12T06:31:46
2 posts
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
📈 CVE Published in last 7 days (2026-05-11 - 2026-05-18)
See more at https://secdb.nttzen.cloud/dashboard
Total CVEs: 1956
Severity:
- Critical: 161
- High: 795
- Medium: 726
- Low: 133
- None: 141
Status:
- : 106
- Analyzed: 536
- Awaiting Analysis: 355
- Deferred: 501
- Modified: 36
- Received: 220
- Rejected: 8
- Undergoing Analysis: 194
Top CNAs:
- GitHub, Inc.: 509
- Microsoft Corporation: 127
- VulnCheck: 124
- MITRE: 109
- Wordfence: 106
- N/A: 105
- Apple Inc.: 94
- Chrome: 79
- VulDB: 60
- F5 Networks: 51
Top Affected Products:
- UNKNOWN: 1290
- Apple Macos: 84
- Apple Iphone Os: 70
- Apple Ipados: 70
- Microsoft Windows Server 2025: 64
- Microsoft Windows 11 24h2: 59
- Microsoft Windows 11 25h2: 59
- Microsoft Windows 11 26h1: 59
- Microsoft Windows Server 2022 23h2: 57
- Microsoft Windows Server 2022: 57
Top EPSS Score:
- CVE-2026-20182 - 37.95 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-20182)
- CVE-2026-42897 - 12.34 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42897)
- CVE-2026-42031 - 9.11 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-42031)
- CVE-2026-44578 - 4.00 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-44578)
- CVE-2026-36983 - 3.50 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-36983)
- CVE-2026-34659 - 3.47 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-34659)
- CVE-2026-24712 - 2.29 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-24712)
- CVE-2026-39054 - 1.35 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-39054)
- CVE-2026-8051 - 1.04 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-8051)
- CVE-2026-7256 - 0.83 % (https://secdb.nttzen.cloud/cve/detail/CVE-2026-7256)
updated 2026-05-11T16:22:43
1 posts
1 repos
Vulnerability Cve-2026-7411
Eclipse BaSyx Java Server SDK 버전 2.0.0-milestone-10 이전에서 Submodel HTTP API의 부적절한 경로 정규화 취약점(CVE-2026-7411)이 발견되었습니다. 인증되지 않은 원격 공격자가 악의적으로 조작된 fileName 파라미터를 이용해 경로 탐색 공격을 수행, 임의의 파일을 서버 파일 시스템에 쓸 수 있어 원격 코드 실행(RCE) 및 시스템 완전 장악이 가능합니다. 이 취약점은 네트워크 공격 벡터, 낮은 공격 복잡도, 권한 요구 없음으로 CVSS 10점의 치명적 위험도를 가집니다. 해당 SDK를 사용하는 AI 인프라 및 서비스 개발자는 즉시 버전 업데이트 및 보안 패치를 적용해야 합니다.
##updated 2026-05-06T16:16:12.510000
1 posts
Vulnerability Cve-2026-7412
Eclipse BaSyx Java Server SDK 버전 2.0.0-milestone-10 이전에서 Operation Delegation 기능이 위임 요청의 대상 URI를 검증하지 않아 인증되지 않은 원격 공격자가 임의의 내부 또는 외부 대상에 대해 블라인드 HTTP POST 요청을 실행할 수 있는 SSRF 취약점(CVE-2026-7412)이 발견되었습니다. 이 취약점은 네트워크 분할을 우회하고 내부 IT/OT 인프라 또는 클라우드 메타데이터 서비스(IMDS)를 공격하는 데 악용될 수 있습니다. CVSS 점수는 8.6으로 높은 심각도를 가집니다.
##updated 2026-04-27T16:30:09
1 posts
9 repos
https://github.com/fevar54/marimo_CVE-2026-39987_RCE_PoC
https://github.com/h3raklez/CVE-2026-39987
https://github.com/keraattin/CVE-2026-39987
https://github.com/0xdeadroot/CVE-2026-39987-marimo-rce
https://github.com/Nxploited/CVE-2026-39987
https://github.com/Dhiaelhak-Rached/CVE-2026-39987-lab-or-marimo-cve-lab
https://github.com/mki9/CVE-2026-39987_exploit
Critical Pre-Authentication RCE in Marimo Notebook Framework (CVE-2026-39987) Exposes AI and Data Science Systems to Full Compromise
Introduction A newly discovered critical vulnerability in the Marimo Python notebook framework has raised serious concerns across the AI and data science ecosystem. The flaw, identified as CVE-2026-39987, allows unauthenticated remote attackers to execute system-level commands without any credentials. Because Marimo is widely used in…
##updated 2026-04-21T18:00:56.903000
1 posts
17 repos
https://github.com/mbrasile/CVE-2017-9841
https://github.com/K3ysTr0K3R/CVE-2017-9841-EXPLOIT
https://github.com/akr3ch/CVE-2017-9841
https://github.com/p1ckzi/CVE-2017-9841
https://github.com/cyberharsh/Php-unit-CVE-2017-9841
https://github.com/RandomRobbieBF/phpunit-brute
https://github.com/Chocapikk/CVE-2017-9841
https://github.com/MrG3P5/CVE-2017-9841
https://github.com/mileticluka1/eval-stdin
https://github.com/MR-LeonardoGomes/CVE-2017-9841
https://github.com/dream434/CVE-2017-9841
https://github.com/incogbyte/laravel-phpunit-rce-masscaner
https://github.com/ludy-dev/PHPUnit_eval-stdin_RCE
https://github.com/joelindra/CVE-2017-9841
https://github.com/MadExploits/PHPunit-Exploit
New.
VulnCheck: Nine Years and Still Swinging: CVE-2017-9841 Remains One of the Most Actively Targeted Vulnerabilities in Canaries https://www.vulncheck.com/blog/cve-2017-9841 @vulncheck #infosec #vulnerability
##updated 2026-04-16T19:59:38.107000
2 posts
12 repos
https://github.com/hg0434hongzh0/CVE-2026-34197
https://github.com/LAT-06/CVE-2026-34197
https://github.com/hnytgl/cve-2026-34197
https://github.com/Catherines77/ActiveMQ-EXPtools
https://github.com/rootdirective-sec/CVE-2026-34197-Lab
https://github.com/dinosn/CVE-2026-34197
https://github.com/keraattin/CVE-2026-34197
https://github.com/DEVSECURITYSPRO/CVE-2026-34197
https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE
https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
updated 2026-04-15T00:35:42.020000
1 posts
development tools (GitHub, GitLab, Kubernetes, Envoy Gateway).
- **Cybersecurity**: Security advisories (VSV00019, CVE-2026-3172), vulnerabilities in NGINX, SSH, and AI-generated bug reports affecting Linux security mailing lists.
- **Tech Industry and Corporate News**: AI acquisitions (Anthropic acquiring Stainless), legal battles (Elon Musk vs. OpenAI), and corporate shifts (Tesla Solar Roof pivot, Microsoft’s AI integrations).
- **Renewable Energy and Sustainability**: [2/4]
updated 2026-04-14T18:30:55
1 posts
1 repos
Neue Windows Zero-Day Sicherheitslücken
Inzwischen ist der Zoo der neu veröffentlichten Zero-Day Sicherheitslücken in Microsoft (MS) Windows auf 5 Exemplare angewachsen. Ein anonymer Entwickler, der unter den Pseudonymen Nightmare-Eclipse oder Chaotic Eclipse auftritt, hat gerade zwei weitere bis dato unbekannte Sicherheitslücken in Windows publik gemacht. Die nennt er GreenPlasma und YellowKey. Im April hatte er bereits drei andere Lücken veröffentlicht: BlueHammer, RedSun und UnDefend. Von denen hat als einziger BlueHammer eine CVE-Nummer bekommen (CVE-2026-32201) und wurde von MS mit den Updates im April
https://www.pc-fluesterer.info/wordpress/2026/05/16/neue-windows-zero-day-sicherheitsluecken/
#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #Microsoft #sicherheit #unplugMicrosoft #UnplugTrump #windows #wissen
##updated 2026-04-03T19:04:33.083000
2 posts
sigh...
https://github.com/CVEProject/cve-schema/blob/main/schema/CVE_Record_Format.json#L818 - supporting media in CVE descriptions have the optional field base64 which should indicate if the value field is base64 encoded.
Except one CNA (Nvidia) appears to get this consistently wrong...
Example: https://github.com/CVEProject/cvelistV5/blob/main/cves/2026/24xxx/CVE-2026-24154.json#L93
##sigh...
https://github.com/CVEProject/cve-schema/blob/main/schema/CVE_Record_Format.json#L818 - supporting media in CVE descriptions have the optional field base64 which should indicate if the value field is base64 encoded.
Except one CNA (Nvidia) appears to get this consistently wrong...
Example: https://github.com/CVEProject/cvelistV5/blob/main/cves/2026/24xxx/CVE-2026-24154.json#L93
##updated 2026-03-17T00:31:40
1 posts
1 repos
CISA has updated the KEV catalogue.
- CVE-2026-4289: Microsoft Exchange Server Cross-Site Scripting Vulnerability https://www.cve.org/CVERecord?id=CVE-2026-42897 #Microsoft #CISA #zeroday #infosec #vulnerability
##updated 2026-02-25T18:31:45
1 posts
7 repos
https://github.com/BugFor-Pings/CVE-2026-20127_EXP
https://github.com/randeepajayasekara/CVE-2026-20127
https://github.com/yonathanpy/CVE-2026-20127-Cisco-SD-WAN-Preauth-RCE
https://github.com/abrahamsurf/sdwan-scanner-CVE-2026-20127
https://github.com/gigachadusers/cve-2026-20127
https://github.com/sfewer-r7/CVE-2026-20127
https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE
Cisco: Noch ein Zero-Day mit „perfekter 10“
Im Februar wurde eine weltweite Warnung verbreitet, weil Cisco SD-WAN Produkte Sicherheitslücken enthielten, die bereits seit mindestens 2023 für Angriffe ausgenutzt wurden (Zero-Day). Cisco hat Updates veröffentlicht, mit denen diese Sicherheitslücken geschlossen werden sollten. Jetzt kommt der Witz. Forscher des Sicherheitsunternehmens Rapid7 haben die Sicherheitslücke CVE-2026-20127 weiter untersucht und dabei eine weitere Sicherheitslücke gefunden! Sie hat die Nummer CVE-2026-20182 und die Risiko-Einstufung 10 von 10 bekommen. Auch diese Sicherheitslücke wird bereits für Angriffe ausgenutzt
https://www.pc-fluesterer.info/wordpress/2026/05/18/cisco-noch-ein-zero-day-mit-perfekter-10/
#Allgemein #Empfehlung #Hintergrund #Warnung #0day #cybercrime #exploits #hersteller #hintertr #spionage #UnplugTrump #backdoor
##updated 2025-12-15T15:18:49.987000
2 posts
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
updated 2025-10-24T13:38:59.063000
2 posts
9 repos
https://github.com/bibo318/CVE-2023-22518
https://github.com/C1ph3rX13/CVE-2023-22518
https://github.com/ForceFledgling/CVE-2023-22518
https://github.com/Lilly-dox/Exploit-CVE-2023-22518
https://github.com/davidfortytwo/CVE-2023-22518
https://github.com/RevoltSecurities/CVE-2023-22518
https://github.com/0x0d3ad/CVE-2023-22518
https://github.com/ductink98lhp/analyze-Exploit-CVE-2023-22518-Confluence
CVE‑2023‑22518 is a critical broken authentication flaw in Atlassian Confluence that allows unauthenticated attackers to reset the instance and create a new admin account. Active exploitation confirms the urgency for immediate patching and external access restriction.
##CVE‑2023‑22518 is a critical broken authentication flaw in Atlassian Confluence that allows unauthenticated attackers to reset the instance and create a new admin account. Active exploitation confirms the urgency for immediate patching and external access restriction.
##updated 2025-10-22T00:32:49
2 posts
61 repos
https://github.com/Malwareman007/CVE-2023-38831
https://github.com/ignis-sec/CVE-2023-38831-RaRCE
https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial
https://github.com/anelya0333/Exploiting-CVE-2023-38831
https://github.com/Garck3h/cve-2023-38831
https://github.com/yangdayyy/cve-2023-38831
https://github.com/UnHackerEnCapital/PDFernetRemotelo
https://github.com/GOTonyGO/CVE-2023-38831-winrar
https://github.com/khanhtranngoccva/cve-2023-38831-poc
https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC
https://github.com/VictoriousKnight/CVE-2023-38831_Exploit
https://github.com/lightningspeed221/Winrar-Exploit-CVE-2023-38831
https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc
https://github.com/r1yaz/winDED
https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831
https://github.com/SugiB3o/Keylog_CVE2023-38831
https://github.com/s4m98/winrar-cve-2023-38831-poc-gen
https://github.com/Hirusha-N/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784
https://github.com/ImagineNotChetng/WinRAR-Exploit-Builder
https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831
https://github.com/kuyrathdaro/cve-2023-38831
https://github.com/ruycr4ft/CVE-2023-38831
https://github.com/RomainBayle08/CVE-2023-38831
https://github.com/b1tg/CVE-2023-38831-winrar-exploit
https://github.com/malvika-thakur/CVE-2023-38831
https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit
https://github.com/sh770/CVE-2023-38831
https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE
https://github.com/FirFirdaus/CVE-2023-38831
https://github.com/PascalAsch/CVE-2023-38831-KQL
https://github.com/ngothienan/CVE-2023-38831
https://github.com/Ben1B3astt/CVE-2023-38831_ReverseShell_Winrar
https://github.com/technicalcorp0/CVE-2023-38831-Exploit
https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT
https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc
https://github.com/z3r0sw0rd/CVE-2023-38831-PoC
https://github.com/yezzfusl/cve_2023_38831_scanner
https://github.com/MyStuffYT/CVE-2023-38831-POC
https://github.com/HDCE-inc/CVE-2023-38831
https://github.com/sudo-py-dev/CVE-2023-38831
https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831
https://github.com/SpamixOfficial/CVE-2023-38831
https://github.com/TranKuBao/winrar_CVE2023-38831
https://github.com/Mich-ele/CVE-2023-38831-winrar
https://github.com/kehrijksen/CVE-2023-38831
https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831
https://github.com/RonF98/CVE-2023-38831-POC
https://github.com/mishra0230/CVE-2023-38831
https://github.com/ML-K-eng/CVE-2023-38831-Exploit-and-Detection
https://github.com/akhomlyuk/cve-2023-38831
https://github.com/youmulijiang/evil-winrar
https://github.com/Nielk74/CVE-2023-38831
https://github.com/xaitax/WinRAR-CVE-2023-38831
https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution
https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC
https://github.com/olowostandard1/CVE-2023-38831-WinRAR-Vulnerability-Analysis
https://github.com/idkwastaken/CVE-2023-38831
https://github.com/MaorBuskila/Windows-X64-RAT
https://github.com/asepsaepdin/CVE-2023-38831
https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit
Threat Brief: WinRAR Arbitrary Code Execution – CVE‑2023‑38831
CVE‑2023‑38831 is a critical WinRAR directory traversal vulnerability enabling arbitrary code execution through specially crafted archive files. Actively exploited in the wild, the flaw allows attackers to execute malicious payloads when users attempt to open benign-looking files, creating a high-risk client-side execution surface across enterprise environments.
##Threat Brief: WinRAR Arbitrary Code Execution – CVE‑2023‑38831
CVE‑2023‑38831 is a critical WinRAR directory traversal vulnerability enabling arbitrary code execution through specially crafted archive files. Actively exploited in the wild, the flaw allows attackers to execute malicious payloads when users attempt to open benign-looking files, creating a high-risk client-side execution surface across enterprise environments.
##updated 2025-07-14T17:16:32.440000
1 posts
The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##updated 2025-01-23T18:32:22
1 posts
The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##updated 2025-01-14T17:15:11.487000
1 posts
8 repos
https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253
https://github.com/g4nkd/CVE-2023-30253-PoC
https://github.com/bluetoothStrawberry/CVE-2023-30253
https://github.com/andria-dev/DolibabyPhp
https://github.com/Rubikcuv5/cve-2023-30253
https://github.com/04Shivam/CVE-2023-30253-Exploit
https://github.com/1lkla/POC-exploit-for-Dolibarr
https://github.com/dollarboysushil/Dolibarr-17.0.0-Exploit-CVE-2023-30253
The ultimate persistence mechanism is here: Vim plugin persistence! Seriously, who can close Vim anyway?
Catch up on the latest Metasploit Wrap-up, also featuring Unauthenticated Marvell QConvergeConsole Path Traversal (CVE-2025-6793), Authenticated RCE in GestioIP 3.5.7 (CVE-2024-48760), and a classic PHP filter bypass in Dolibarr ERP/CRM (CVE-2023-30253).
As always, check it out the blog: https://www.rapid7.com/blog/post/pt-metasploit-wrap-up-05-15-2026/
##updated 2025-01-03T12:15:26.257000
2 posts
How not to handle reported security issues: https://defnull.de/2024/CVE-2024-49767_flask/#timeline
##How not to handle reported security issues: https://defnull.de/2024/CVE-2024-49767_flask/#timeline
##updated 2024-11-21T06:45:39.280000
2 posts
6 repos
https://github.com/Wack0/batondrop_armv7
https://github.com/qjawls2003/BlackLotus-Detection
https://github.com/bakedmuffinman/BlackLotusDetection
https://github.com/ASkyeye/CVE-2022-21894-Payload
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
updated 2024-08-01T15:32:23
2 posts
4 repos
https://github.com/Wack0/CVE-2022-21894
https://github.com/ajf8729/BlackLotus
https://github.com/v1ckxy/Orchestrated-Powershell-for-CVE-2023-24932-en
https://github.com/helleflo1312/Orchestrated-Powershell-for-CVE-2023-24932
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
Congratulations to CVE-2018-4063, CVE-2022-21894, CVE-2023-24932, CVE-2026-34197 for being the only 4 CVEs with a CISA ADP Exploitation Status of active but not on the KEV list :blobsalute:
updated 2023-02-02T05:05:16
1 posts
1 repos
anyone knows how to exploit CVE-2012-1182 in samba? I wanna execute shell commands as root on an old router, so that I can get ssh/telnet access
##8 posts
5 repos
https://github.com/HORKimhab/CVE-2026-46300
https://github.com/0xBlackash/CVE-2026-46300
https://github.com/ExploitEoom/CVE-2026-46300
https://github.com/infiniroot/ansible-mitigate-copyfail-dirtyfrag
https://blog.frehi.be/2026/05/18/security-updates-debian-vs-ubuntu-almalinux-vs-rocky-linux/
##Fragnesia (CVE-2026-46300) i DirtyDecrypt (CVE-2026-31635) ( https://nfsec.pl/security/6722 ) #linux #kernel #security
##Hm #Debian hat immer noch keinen #fragnesia fix.
https://security-tracker.debian.org/tracker/CVE-2026-46300
To make sure the latest linux kernel security issues (CVE-2026-43284, CVE-2026-43500, CVE-2026-46300, CVE-2026-46333) are properly patched we have rebooted various systems (again).
Specifically you might have seen interruptions for starfive-{1-4}, debian-i386, debian-i386-2, debian-armhf, snapshots, osuosl-arm64, osuosl-arm64-2, sw3bb1, sw3bb2, sw3runner1, sw3runner2, sourceware-builder3, rh-ospo-sourceware01, forge and forge-stage.
##Ist die Aufregung um die neuen Linux-Fehler berechtigt?
Radio Eriwan antwortet: Das kommt darauf an. Nämlich darauf, ob wir von einem Arbeitsplatz-Rechner reden oder von einem Server. Arbeitsplatz-Rechner sind nicht betroffen. - Die Rede ist von drei neu entdeckten Sicherheitslücken im Linux-Kernel:
CVE-2026-43284 ("Dirty Frag")*,
CVE-2026-43500 ("Copy Fail 2") und
CVE-2026-46300 ("Fragnesia").
Die stecken in Server-Funktionen für VPN-Zugriff über IPSec und für das verteilte Dateisystem AFS. Sie ermöglichen eine lokale Privilegien-Eskalation (LPE).
Um eine LPE Sicherheitslücke auszunutzen, muss ein/e Benutzer/in angemeldet sein, also entweder am Terminal vorm Rechner sitzen, oder eher
#Allgemein #Hintergrund #cybercrime #exploits #linux #sicherheit #wissen
##Fragnesia (CVE-2026-46300) i DirtyDecrypt (CVE-2026-31635) ( https://nfsec.pl/security/6722 ) #linux #kernel #security
##Hm #Debian hat immer noch keinen #fragnesia fix.
https://security-tracker.debian.org/tracker/CVE-2026-46300
Fragnesia: una nuova vulnerabilità di escalation dei privilegi nel kernel Linux
Scoperta una nuova falla di sicurezza nel kernel Linux, chiamata Fragnesia (CVE-2026-46300), che consente a un utente locale non privilegiato di ottenere i privilegi di amministratore (root) su una distribuzione GNU/Linux.
@linux #UnoLinux #gnulinux #linux
##🟠 CVE-2026-44633 - High (8.1)
Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-44633 - High (8.1)
Live Helper Chat is an open-source application that enables live support websites. In 4.84v, the Live Helper Chat REST API chat update endpoint allows a REST user with lhchat/use to update a chat in a department they cannot read. The endpoint acce...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-44633/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43906 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a heap-based buffer overflow in the HEIF decoder of OpenImageIO allows out-of-bounds ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43906 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a heap-based buffer overflow in the HEIF decoder of OpenImageIO allows out-of-bounds ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43906/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43905 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43905 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, jpeg2000input.cpp:395 computes buffer size as const int bufsize = w * h * ch * buffer...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43905/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43903 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, sgiinput.cpp:265,274 use OIIO_DASSERT for bounds checking in the RLE decode loop. In ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43903 - High (7.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, sgiinput.cpp:265,274 use OIIO_DASSERT for bounds checking in the RLE decode loop. In ...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43903/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43909 - High (8.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABy...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43909/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##🟠 CVE-2026-43909 - High (8.8)
OpenImageIO is a toolset for reading, writing, and manipulating image files of any image file format relevant to VFX / animation. Prior to 3.0.18.0 and 3.1.13.0, a signed 32-bit integer overflow in the loop index expression i * 4 inside SwapRGBABy...
🔗 https://www.thehackerwire.com/vulnerability/CVE-2026-43909/
#CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
##⚠️ CRITICAL: CVE-2026-44699 in libjwt (3.0.0 – 3.3.2) lets attackers forge JWTs by exploiting HMAC verification with a zero-length key if RSA JWKs lack the alg parameter. Patch to 3.3.3 or confirm vendor remediation! https://radar.offseq.com/threat/cve-2026-44699-cwe-327-use-of-a-broken-or-risky-cr-78313648 #OffSeq #JWT #Infosec
##⚠️ CRITICAL: CVE-2026-44699 in libjwt (3.0.0 – 3.3.2) lets attackers forge JWTs by exploiting HMAC verification with a zero-length key if RSA JWKs lack the alg parameter. Patch to 3.3.3 or confirm vendor remediation! https://radar.offseq.com/threat/cve-2026-44699-cwe-327-use-of-a-broken-or-risky-cr-78313648 #OffSeq #JWT #Infosec
##