24h | 7d | 30d

Overview

  • F5
  • NGINX Plus

13 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.20%

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 7 Posts
  • 18 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

Ah! The nginx updates fixing CVE-2026-42945 have arrived for my RHEL (Red Hat Enterprise Linux) machines. So. `dnf update` and `reboot` to get them installed. Safe again, for the moment :)

#SelfHost #SysAdminLife @homelab

  • 3
  • 12
  • 0
  • 19h ago
Profile picture fallback

[Related]
L'exploitation sur internet de CVE-2026-42945 aka NGINX RIFT depthfirst.com/nginx-rift aurait commencé selon VulnCheck
⬇️
"Exploitation of Critical NGINX Vulnerability Begins"
"The flaw leads to denial-of-service on default configurations and to remote code execution if ASLR is disabled.
"
"Shortly after F5 released patches for the bug, Depthfirst published technical details and proof-of-concept (PoC) code targeting it. Now, VulnCheck says threat actors are already exploiting the issue in attacks.

“We’re seeing active exploitation of CVE-2026-42945 in F5 NGINX, a heap buffer overflow affecting both NGINX Plus and NGINX Open Source on VulnCheck Canaries just days after the CVE was published,” VulnCheck researcher Patrick Garrity warned. ( linkedin.com/posts/patrickmgar ) "
👇
securityweek.com/exploitation-

  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback

Malcolm v26.05.1 is out?!? What, already? Déjà vu? We bumped up to the timetable on this release as a critical vulnerability found in NGINX made it expedient for us to do so.

Malcolm v26.05.1 focuses heavily on security updates, most notably upgrading OpenResty to address a critical NGINX remote code execution heap buffer overflow vulnerability. It also adds new Suricata OT detections for D-Link HNAP abuse, improves alerting webhook support, introduces the File Tree dashboard, and includes Suricata parsing/mapping fixes and documentation updates. Several other components received version bumps as well.

If you are upgrading from an existing Malcolm installation, run ./scripts/status for Malcolm to migrate some settings prior to running ./scripts/configure, ./scripts/start, or other Malcolm control scripts.

github.com/idaholab/Malcolm/co

  • ✨ Features and enhancements
  • ✅ Component version updates
  • 🐛 Bug fixes
    • Reference Counting (Use-After-Free) Bug for PyList_SetItem in filescan's python-statfs (#960 #962)
    • Added a few missing Suricata fields (suricata.tc_progress, suricata.ts_progress, suricata.tunnel.pcap_cnt, suricata.tunnel.pkt_src) to the index mapping template
    • When suricata.app_proto_ts and/or suricata.app_proto_tc reported that protocol parsing had failed (due to malformed input data), invalid data could be stored in HTTP, DNS, and/or TLS fields. This is now detected and those invalid values are dropped, and some combination of proto_parse_failed, client_stream_failed, or server_stream_failed are added to tags.
    • Suricata's HTTP version was not being normalized to network.protocol_version.
  • 🧹 Code and project maintenance

Malcolm is a powerful, easily deployable network 🖧 traffic analysis tool suite for network security monitoring 🕵🏻‍♀️.

Malcolm operates as a cluster of containers 📦, isolated sandboxes which each serve a dedicated function of the system. This makes Malcolm deployable with frameworks like Docker 🐋, Podman 🦭, and Kubernetes ⎈. Check out the Quick Start guide for examples on how to get up and running.

Alternatively, dedicated official ISO installer images 💿 for Malcolm and Hedgehog Linux 🦔 can be downloaded from Malcolm's releases page on GitHub. Due to limits on individual files in GitHub releases, these ISO files have been split 🪓 into 2GB chunks and can be reassembled with scripts provided for both Bash 🐧 (release_cleaver.sh) and PowerShell 🪟 (release_cleaver.ps1). See Downloading Malcolm - Installer ISOs for instructions.

As always, join us on the Malcolm discussions board 💬 to engage with the community, or pop some corn 🍿 and watch a video 📼.

  • 2
  • 1
  • 0
  • 11h ago

Bluesky

Profile picture fallback
~Akamai~ Unauthenticated heap buffer overflow in NGINX rewrite module allows DoS or RCE. - IOCs: CVE-2026-42945 - #CVE202642945 #NGINX #ThreatIntel
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
CVE-2026-42945 looks nasty: https://github.com/DepthFirstDisclosures/Nginx-Rift #threatintel, #nginx
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
⚠️ CVE-2026-42945 (CVSS 9.2): NGINX heap overflow in ngx_http_rewrite_module (≤1.30.0) is actively being exploited in the wild. Crafted HTTP requests via rewrite/if/set PCRE “?” can crash workers and may lead to RCE (ASLR off). Patch now to Nginx 1.31.0 or 1.30.1. Query: technology="Nginx"
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
CVE-2026-42945 (CVSS 92): The 18-Year-Old NGINX Rift Heap Overflow – Full RCE PoC & Mitigation Guide + Video Introduction: A heap buffer overflow vulnerability codenamed "NGINX Rift" (CVE-2026-42945) has been discovered in the widely used `ngx_http_rewrite_module` of NGINX, affecting all versions…
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • kovidgoyal
  • kitty

19 May 2026
Published
19 May 2026
Updated

CVSS v3.1
CRITICAL (9.9)
EPSS
Pending

KEV

Description

Kitty is a cross-platform GPU based terminal. In versions 0.46.2 and below, the handle_compose_command() function in kitty/graphics.c performs bounds validation on composition offsets using unsigned 32-bit arithmetic that is subject to integer wrapping, potentially leading to Heap Buffer Over-Read/Write. An attacker who can write escape sequences to a kitty terminal (e.g., via a malicious file, SSH login banner, or piped content) can supply crafted x_offset/y_offset values that pass the bounds check after wrapping but cause massive out-of-bounds heap memory access in compose_rectangles(). No user interaction is required. No non-default configuration is required. The attacker only needs the ability to produce output in a kitty terminal window. This issue has been fixed in version 0.47.0.

Statistics

  • 2 Posts
  • 12 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

@cR0w @catsalad shitpost replacement service!

Just a 9.9 but nevertheless:

db.gcve.eu/vuln/cve-2026-33642

Kitty has a Heap Buffer Over-Read/Write via Integer Overflow in compose_rectangles Bounds Check

:ablobcatbongo:

  • 5
  • 7
  • 0
  • 6h ago
Profile picture fallback

⚠️ CRITICAL: kitty terminal <0.47.0 vulnerable to integer overflow (CVE-2026-33642). Malicious escape sequences can cause heap memory corruption — no user action needed. Upgrade to 0.47.0+ now! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Linux
  • Linux

24 Apr 2026
Published
19 May 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.06%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: rxrpc: fix oversized RESPONSE authenticator length check rxgk_verify_response() decodes auth_len from the packet and is supposed to verify that it fits in the remaining bytes. The existing check is inverted, so oversized RESPONSE authenticators are accepted and passed to rxgk_decrypt_skb(), which can later reach skb_to_sgvec() with an impossible length and hit BUG_ON(len). Decoded from the original latest-net reproduction logs with scripts/decode_stacktrace.sh: RIP: __skb_to_sgvec() [net/core/skbuff.c:5285 (discriminator 1)] Call Trace: skb_to_sgvec() [net/core/skbuff.c:5305] rxgk_decrypt_skb() [net/rxrpc/rxgk_common.h:81] rxgk_verify_response() [net/rxrpc/rxgk.c:1268] rxrpc_process_connection() [net/rxrpc/conn_event.c:266 net/rxrpc/conn_event.c:364 net/rxrpc/conn_event.c:386] process_one_work() [kernel/workqueue.c:3281] worker_thread() [kernel/workqueue.c:3353 kernel/workqueue.c:3440] kthread() [kernel/kthread.c:436] ret_from_fork() [arch/x86/kernel/process.c:164] Reject authenticator lengths that exceed the remaining packet payload.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 11 hours ago

Fediverse

Profile picture fallback

Publicado el PoC de DirtyDecrypt para la vulnerabilidad de LPE CVE-2026-31635 en el kernel de Linux

blog.elhacker.net/2026/05/publ

  • 0
  • 2
  • 0
  • 11h ago

Bluesky

Profile picture fallback
DirtyDecrypt PoC Released for Linux Kernel CVE-2026-31635 LPE Vulnerability thehackernews.com/2026/05/dirt...
  • 0
  • 0
  • 0
  • 12h ago

Overview

  • Universal Robots
  • PolyScope 5

08 May 2026
Published
11 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
1.53%

KEV

Description

OS command injection in Dashboard Server interface in Universal Robots PolyScope versions prior to 5.25.1 allows unauthenticated attacker to craft commands that will execute code on the robot's OS.

Statistics

  • 2 Posts

Last activity: 16 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL: CVE-2026-8153 affects Universal Robots PolyScope 5 — OS command injection via Dashboard Server lets unauthenticated attackers control cobots on internal networks. Patch to v5.25.1 now! radar.offseq.com/threat/critic

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Universal Robots patched CVE-2026-8153, a 9.8 command injection flaw in PolyScope 5 Dashboard Server that could let attackers run commands on cobot controllers and spread across poorly segmented OT fleets. #UniversalRobots #PolyScope5 #CVE20268153
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Apple
  • macOS

11 May 2026
Published
12 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

This issue was addressed with improved permissions checking. This issue is fixed in macOS Tahoe 26.4. A malicious app may be able to access arbitrary files.

Statistics

  • 5 Posts
  • 30 Interactions

Last activity: 12 hours ago

Fediverse

Profile picture fallback

📝🚨 New blog post: How a bug in Archive Utility allowed access to protected app data (including iMessage and WhatsApp chats, and Safari cookies) without any permissions.

The bug could also be exploited to hijack installed apps such as Signal and 1Password to perform phishing attacks.

Apple fixed the issue in macOS 26.4 as CVE-2026-28910, five months after we reported it

#Apple #macOS #privacy #security #cybersecurity #infosec

mysk.blog/2026/05/19/cve-2026-

  • 7
  • 11
  • 0
  • 12h ago
Profile picture fallback

macOS Bug Lets Attackers Hijack Background Apps to Spy on Clipboard — Fixed in 26.4 (CVE-2026-28910)

m.youtube.com/watch?v=NUm5068G

  • 2
  • 1
  • 0
  • 12h ago
Profile picture fallback

macOS Archive Utility Bug Could Let Attackers Hijack Signal Sessions—Fixed in 26.4 (CVE-2026-28910)

m.youtube.com/watch?v=WuH0pIE7

  • 1
  • 2
  • 0
  • 12h ago
Profile picture fallback

macOS Security: Archive Utility Bug Could Expose 1Password Secrets — Fixed in 26.4 (CVE-2026-28910)

m.youtube.com/watch?v=Hp5NLDtx

  • 1
  • 2
  • 0
  • 12h ago
Profile picture fallback

macOS Security: Archive Utility bug can expose Safari, Messages, and WhatsApp data - CVE-2026-28910

m.youtube.com/watch?v=Naq5IojV

  • 1
  • 2
  • 0
  • 12h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 12 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

We released Ruby 4.0.5 and published security advisory for CVE-2026-46727.

If you use Ruby 4.0.0~4.0.4, we recommend updating your Ruby version to 4.0.5.

ruby-lang.org/en/news/2026/05/

  • 6
  • 6
  • 0
  • 2h ago

Overview

  • Linux
  • Linux

22 Apr 2026
Published
18 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
2.57%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 2 Posts

Last activity: 7 hours ago

Fediverse

Profile picture fallback

A Linuxnak sok előnye van, de vannak néha hátrányai is.

A most előjött CVE-2026-31431-nek hála... nagyon sok rendszert kell frissítenem... -.-'

Azt hiszem, erre is kellene egy automatizáló rendszert beállítanom, mint a Wordpresshez létező #InfiniteWP.

#Linux #CVE #magyar #hungarian #geek #geeklife #Wordpress

  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback

Please read this important update from :

Check Point Response to CVE-2026-31431 (Copy Fail), CVE-2026-43284, CVE-2026-43500 (Dirty Frag) and CVE-2026-46300 (Fragnesia)

support.checkpoint.com/results

  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Chroma
  • ChromaDB
  • chromadb

18 May 2026
Published
19 May 2026
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.14%

KEV

Description

A pre-authentication, code injection vulnerability in version 1.0.0 or later of the ChromaDB Python project allows an unauthenticated attacker to run arbitrary code on the server by sending a malicious model repository and trust_remote_code set to true in the /api/v2/tenants/{tenant}/databases/{db}/collections endpoint.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Unpatched ChromaDB flaw CVE-2026-45829, dubbed ChromaToast, enables pre-auth RCE via malicious HuggingFace models, risking server takeover and exposure of API keys, env vars, and secrets. #ChromaDB #CVE202645829 #ChromaToast
  • 1
  • 0
  • 0
  • 12h ago
Profile picture fallback
Max-severity CVE-2026-45829 in ChromaDB Python FastAPI server can allow unauthenticated code execution and server hijacking on exposed systems. Versions 1.0.0 to 1.5.8 are affected. #ChromaDB #CVE202645829 #HiddenLayer
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Red Hat
  • Red Hat Hardened Images
  • libxml2-main

23 Apr 2026
Published
30 Apr 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

A flaw was found in libxml2. This vulnerability occurs when the library processes a specially crafted XML Schema Definition (XSD) validated document that includes an internal entity reference. An attacker could exploit this by providing a malicious document, leading to a type confusion error that causes the application to crash. This results in a denial of service (DoS), making the affected system or application unavailable.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 5 hours ago

Bluesky

Profile picture fallback
Y'all, AI models seem to be *really good* at triaging vulnerabilities that are discovered with AI tooling! Try this prompt: > read gitlab.gnome.org/GNOME/libxml... and tell me if CVE-2026-6732 applies to github.com/libarchive/l... [...] Conclusion Not affected.
  • 0
  • 1
  • 0
  • 5h ago

Overview

  • Pending

06 May 2026
Published
06 May 2026
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

Unauthenticated DoS in ZTE H8102E, H168N, H167A, H199A, H288A, H198A, H267A, H267N, H268A, H388X, H196A, H369A, H268N, H208N, H367N, H181A, and H196Q. A denial-of-service condition can be triggered against the router's web interface by sending an oversized application/x-www-form-urlencoded POST body. After triggering, the management interface may become unresponsive until the device is rebooted. This may affect any firmware version prior to 2022 (reporter observation). The supplier stated that devices are not vulnerable since 2021-03-23; operator firmware may vary.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 14 hours ago

Bluesky

Profile picture fallback
CVE-2026-34473: Pre-auth ZTE H-series router DoS via CGILua request-body parsing
  • 0
  • 1
  • 0
  • 14h ago
Showing 1 to 10 of 70 CVEs