Overview
Description
Statistics
- 6 Posts
- 10 Interactions
Fediverse
XBOW's AI found an unauth RCE in Exim, bug is being called Dead.Letter
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Patches are out: https://www.exim.org/static/doc/security/EXIM-Security-2026-05-01.1/EXIM-Security-2026-05-01.1.txt
I didn't think I would ever use this sentence, but "thank fuck I use openssl"…
Then again it'll be the other way around some future time. Near future probably, considering how things are going.
(My primary server is still running Gentoo, so, exim is indeed built against openssl. Unlike all my Debian boxes…)
https://xbow.com/blog/dead-letter-cve-2026-45185-xbow-found-rce-exim
Bluesky
Overview
Description
Statistics
- 5 Posts
- 5 Interactions
Fediverse
As I was saying, we're not done with page cache LPEs.
Looks like a third variant just dropped (CVE-2026-46300):
https://github.com/v12-security/pocs/tree/main/fragnesia
https://github.com/v12-security/pocs/blob/d4043edc2acbd75d093e3f5795751b678c66b259/fragnesia/fragnesia.c
https://www.openwall.com/lists/oss-security/2026/05/13/3
Initial reading is defense against #DirtyFrag mitigates this, too, so perhaps not a full round of updates needed here.
https://github.com/v12-security/pocs/tree/main/fragnesia
This is CVE-2026-46300
Apparently yet another one of those #DirtyFrag-like vulnerabilities in #Linux, this one called #Fragnesia
CVE-2026-46300
Overview
- Microsoft
- Windows 11 version 22H3
Description
Statistics
- 6 Posts
- 13 Interactions
Fediverse
Microsoft Patch Tuesday 05/2026:
- opravy 120 zranitelností ve Windows, Officech, ale také třeba Malování(!)
- 17 kritických (z toho 14x RCE)
- krom toho mnoho (130+) oprav Edge nebo Teamsů
Velmi zajímavě vypadá zranitelnost CVE-2026-41096 ve Windows DNS klientovi(!), která umožňuje vzdálené spuštění kódu podstrčením připravených DNS odpovědí. S tím bych se vyloženě bál připojit se k sítím s cizím DNS.
Hunting CVE-2026-41096 (Windows DNS Client RCE, CVSS 9.8) in Advanced Hunting?
DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName =~ "svchost.exe"
| where InitiatingProcessCommandLine has_any ("dnscache", "NetworkService")
| where FileName !in~ ("conhost.exe", "WerFault.exe", "wermgr.exe")
| project Timestamp, DeviceName, FileName, ProcessCommandLine
| order by Timestamp desc
checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...
📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE
Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday
Overview
Description
Statistics
- 4 Posts
Fediverse
Bluesky
Overview
- Microsoft
- Microsoft 365 Apps for Enterprise
Description
Statistics
- 3 Posts
- 4 Interactions
Fediverse
CVE-2026-40361 - Microsoft Word Remote Code Execution Vulnerability:
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-40361
What's next - and RCE in Notepad?
Bluesky
Overview
- Microsoft
- Windows Server 2012
Description
Statistics
- 5 Posts
- 6 Interactions
Fediverse
checks notes ...
Windows Netlogon Remote Code Execution
Windows DNS Client Remote Code Execution
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41089
May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...
📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE
Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday
Bluesky
Overview
Description
Statistics
- 2 Posts
- 17 Interactions
Fediverse
Linux 7.0.6 and 6.18.29 LTS patch the Dirty Frag local privilege flaw, fixing unsafe rxrpc decryption paths tied to CVE-2026-43500.
Fedora and Pop!_OS shipped fixes before release, reflecting rapid open-source patching and the need for timely user-controlled updates. 🔧
🔗 https://itsfoss.com/news/linux-fully-patches-dirty-frag-exploit/
#TechNews #Linux #DirtyFrag #Kernel #Fedora #PopOS #OpenSource #Cybersecurity #Privacy #Security #FOSS #SysAdmin #LTS #LinuxKernel #DirtyFrag #CopyFail #CVE #Fedora #PopOS #Ubuntu #Tech
Overview
- ollama
- ollama
- ollama/ollama
Description
Statistics
- 2 Posts
- 8 Interactions
Fediverse
Ollama fixed CVE-2026-7482 in v0.17.1, a critical out-of-bounds read flaw that could leak API keys, prompts, and chat data from exposed servers via crafted GGUF files. 🔓
Researchers also disclosed unpatched Windows update flaws enabling persistent code execution through unsigned updates and path traversal in Ollama 0.12.10–0.17.5. ⚠️
🔗 https://thehackernews.com/2026/05/ollama-out-of-bounds-read-vulnerability.html
#TechNews #Ollama #LLM #AI #Cybersecurity #OpenSource #FOSS #Privacy #Infosec #Windows #Linux #Security #Servers #DataBreach #Technology
Overview
Description
Statistics
- 2 Posts
- 4 Interactions
Fediverse
PoC Exploit Released for Android Zero-Click CVE-2026-0073 — Silent ADB Shell Access on Android 14–16
#CyberSecurity
https://securebulletin.com/poc-exploit-released-for-android-zero-click-cve-2026-0073-silent-adb-shell-access-on-android-14-16/
Bluesky
Overview
Description
Statistics
- 2 Posts
- 4 Interactions
Fediverse
Critical Palo Alto PAN-OS Vulnerability CVE-2026-0300 Actively Exploited — Unauthenticated Root RCE on Firewalls
#CyberSecurity
https://securebulletin.com/critical-palo-alto-pan-os-vulnerability-cve-2026-0300-actively-exploited-unauthenticated-root-rce-on-firewalls/