24h | 7d | 30d

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 17 Posts
  • 39 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

As I was saying, we're not done with page cache LPEs.

Looks like a third variant just dropped (CVE-2026-46300):
github.com/v12-security/pocs/t
github.com/v12-security/pocs/b

openwall.com/lists/oss-securit

Initial reading is defense against #DirtyFrag mitigates this, too, so perhaps not a full round of updates needed here.

  • 6
  • 3
  • 0
  • 18h ago
Profile picture fallback
Officially lost track of Linux page cache LPE's - see also: "cache invalidation and naming things":

https://github.com/v12-security/pocs/tree/main/fragnesia

This is CVE-2026-46300
  • 2
  • 0
  • 0
  • 17h ago
Profile picture fallback
  • 1
  • 1
  • 1
  • 3h ago
Profile picture fallback

Ich möchte anmerken: Es ist noch nicht Freitag! #Fragnesia

security-tracker.debian.org/tr

  • 1
  • 1
  • 0
  • 2h ago
Profile picture fallback

⚠️ New Linux kernel vulnerability Fragnasia (CVE-2026-46300) allows local attackers to escalate privileges to root via a logic bug in the XFRM ESP-in-TCP subsystem.

All kernels before May 13, 2026 are affected.

Open-source security relies on community vigilance. Stay safe, patch early, and share this widely.

🌐 further info: bleepingcomputer.com/news/secu

#linux #security #exploit

  • 1
  • 1
  • 0
  • 2h ago
Profile picture fallback

Apparently yet another one of those #DirtyFrag-like vulnerabilities in #Linux, this one called #Fragnesia

CVE-2026-46300

openwall.com/lists/oss-securit

#CopyFail

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

et voilà il a reçu son nom de code CVE-2026-46300

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

"New Fragnesia Linux flaw lets attackers gain root privileges"

"[...] Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and tracked as CVE-2026-46300) that allows attackers to run malicious code as root."

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture fallback
Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and tracked as CVE-2026-46300) that allows attackers to run malicious code as root.
  • 5
  • 4
  • 0
  • 2h ago
Profile picture fallback
A new variant of the recent Dirty Frag vulnerability, named Fragnesia (CVE-2026-46300), has been discovered in the Linux XFRM ESP-in-TCP subsystem. Similar to Dirty Frag, Fragnesia exploits a vulnerability in the XFRM ESP-in-TCP subsystem to achieve a memory write primitive in the kernel.
  • 4
  • 7
  • 0
  • 11h ago
Profile picture fallback
Officially lost track of Linux page cache LPE's: github.com -> This is CVE-2026-46300 Original->
  • 0
  • 1
  • 0
  • 17h ago
Profile picture fallback
真っ赤やね https://security-tracker.debian.org/tracker/CVE-2026-46300
  • 0
  • 1
  • 0
  • 11h ago
Profile picture fallback
Linux KernelのLPE(ローカル権限昇格)の脆弱性(Fragnesia(CopyFail3): CVE-2026-46300) #security #vulnerability #セキュリティ #脆弱性 #linux #kernel #dirtyflag #lpe #fragnesia #copyfail security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Fragnesia (CVE-2026-46300): 无竞争条件的内存任意写入 root 提权漏洞分析 引言 Fragnesia(编号 CVE-2026-46300),亦称 Copy Fail 3.0,是 Linux 内核 XFRM ESP-in-TCP 子系统中新发现的一个本地提权漏洞。与 Dirty Pipe 等传统漏洞不同,Fragnesia 不依赖任何竞争条件,能够实现确定性、高成功率的攻击,任何未经授权的本地用户均可借此稳定获取 root 最高权限。 学习目标 理解 Fragnesia 漏洞的技术原理及其与 Dirty Frag / Copy Fail 漏洞家族的关系…
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Fragnesia (CVE-2026-46300) enables unprivileged local attackers to corrupt kernel page cache and gain root via the XFRM ESP-in-TCP subsystem.
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
A new Linux kernel vulnerability dubbed “Fragnesia” (CVE-2026-46300) allows unprivileged local attackers to gain root access. The bug is in […]
  • 0
  • 0
  • 0
  • Last hour

Overview

  • F5
  • NGINX Plus

13 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
Pending

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 8 Posts
  • 38 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

CVE-2026-42945 Heap-based Buffer Overflow in combined with the linux kernel LPEs is "not great" as we say in the industry.

depthfirst.com/nginx-rift

  • 9
  • 7
  • 0
  • 12h ago
Profile picture fallback

CVE-2026-42945: Possible RCE in NGINX:

depthfirst.com/nginx-rift

Requires a specific regex based rewrite directive like

rewrite ^/users/([0-9]+)/profile/(.*)$ /profile.php?id=$1&tab=$2 last;

my.f5.com/manage/s/article/K00

(Of course also found & published by some AI platform. At least they told F5 first.)

And there's a bunch of other vulns in nginx that just dropped, but good luck keeping track if the list of security advisories contains no dates:

nginx.org/en/security_advisori

  • 7
  • 7
  • 0
  • 6h ago
Profile picture fallback

RE: infosec.exchange/@cR0w/1165688

Plenty of prerequisites but worth looking into.

my.f5.com/manage/s/article/K00

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. (CVE-2026-42945)

  • 2
  • 2
  • 0
  • 14h ago
Profile picture fallback

#Nginx CVE-2026-42945

A bug in the ngx_http_rewrite_module lets a remote, unauthenticated attacker corrupt the heap of an NGINX worker process by sending crafted URI. The trigger is a common configuration pattern: a rewrite directive with an unnamed regex capture ($1, $2) and a replacement string that contains a question mark, followed by another rewrite, if, or set directive.

https://depthfirst.com/nginx-rift

  • 2
  • 1
  • 0
  • 11h ago

Bluesky

Profile picture fallback
NGINX Rift: An 18-Year-Old Bug Lets Hackers Hijack One-Third of the Internet's Web Servers Critical NGINX heap overflow (CVE-2026-42945, CVSS 9.2) allows unauthenticated RCE via crafted HTTP requests. Read Details- www.cyberkendra.com/2026/05/ngin... #infosec #security #internet #nginx
  • 1
  • 0
  • 0
  • 15h ago
Profile picture fallback
NGINXのrewrite脆弱性 CVE-2026-42945 「NGINX Rift」は何を確認すべきか | ワルブリックス株式会社 https://www.walbrix.co.jp/article/cve-2026-42945-nginx-rewrite.html
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
Et merde… Nginx, RCE sur le traitement des URI, CVE-2026-42945 Et du nginx on en trouve partout, dont sur vos F5 BigIP 😓 Heureusement le PoC actuel nécessite un contournement d’ASLR ou qu’il soit désactivé mais un poc complet ne saurait tarder. PoC github.com/depthfirstdi... Bonne journée fériée 😭
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

06 May 2026
Published
12 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
14.43%

Description

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

Statistics

  • 3 Posts
  • 7 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Critical Palo Alto PAN-OS Vulnerability CVE-2026-0300 Actively Exploited — Unauthenticated Root RCE on Firewalls
#CyberSecurity
securebulletin.com/critical-pa

  • 4
  • 0
  • 0
  • 22h ago
Profile picture fallback

Wieder Zero-Day Angriffe gegen Palo Alto Firewall

Und täglich grüßt das Murmeltier. Wieder ein amerikanischer Hersteller von proprietärer Netzwerktechnik, dessen Zero-Day "Sicherheitslücke" (Hintertür) von wahrscheinlich staatlich unterstützten Hackern angegriffen wird. Der Netzwerk-Ausrüster Palo Alto ist und ja schon öfter begegnet. Die CISA hat die Lücke CVE-2026-0300 bereits in den KEV Katalog aufgenommen. Normalerweise bedeutet das eine Anweisung an die Behörden, Updates gegen die betreffende Lücke innerhalb kürzester Frist einzuspielen. Nur dass im vorliegenden

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #exploits #firewall #foss #hersteller #hintertr #opensource #router #sicherheit #spionage #UnplugTrump #usa #vorbeugen

  • 1
  • 2
  • 0
  • 3h ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal (Severity: CRITICAL)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0300
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Microsoft
  • Windows 11 version 22H3

12 May 2026
Published
13 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.

Statistics

  • 4 Posts
  • 2 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Hunting CVE-2026-41096 (Windows DNS Client RCE, CVSS 9.8) in Advanced Hunting?

DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName =~ "svchost.exe"
| where InitiatingProcessCommandLine has_any ("dnscache", "NetworkService")
| where FileName !in~ ("conhost.exe", "WerFault.exe", "wermgr.exe")
| project Timestamp, DeviceName, FileName, ProcessCommandLine
| order by Timestamp desc

  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback

May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...

captechgroup.com/about-us/thre

  • 1
  • 0
  • 0
  • 21h ago
Profile picture fallback

📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE

Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday

🔗 cyber.netsecops.io

  • 1
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture fallback
CVE-2026-41096: Critical Windows DNS Client Heap Overflow – Remote Code Execution via Rogue DNS Responses + Video Introduction The Windows DNS Client service (dnscache) quietly handles every domain name resolution on a Windows machine, from browser lookups to background update checks. A newly…
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Linux
  • Linux

22 Apr 2026
Published
12 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
2.57%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 3 Posts

Last activity: Last hour

Fediverse

Profile picture fallback

Two recent #Linux kernel vulnerabilities have been disclosed:
➡️ Copy Fail (CVE-2026-31431)
➡️ Dirty Frag (CVE-2026-43284 & CVE-2026-43500)

Both vulnerabilities exploit flaws in the page cache via different subsystems, necessitating immediate patching by affected organizations.

More details on #InfoQ ➡️ bit.ly/4dHOx47

#DevOps #SecurityVulnerabilities

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture fallback
New ICSAP Analysis Report: Copy Fail (CVE-2026-31431) and Linux exposure across ICS products. Of 3,800 CISA ICS advisories, only 0.8% name Linux. Asset owners can't assess exposure from advisory text alone. drive.google.com/file/d/1CDvy... #OTSecurity #ICSSecurity #CopyFail #ICSAP
  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback
从4月30日至今,Linux 已经连爆三起提权漏洞,只需要一行代码,立即获得系统 root 权限。 2026年4月30日:Copy Fail:2017年至今的漏洞,一个脚本获得 Linux root 管理员权限|CVE-2026-31431 2026年5月8日:Linux 又爆 Dirty Frag
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Microsoft
  • Microsoft 365 Apps for Enterprise

12 May 2026
Published
13 May 2026
Updated

CVSS v3.1
HIGH (8.4)
EPSS
0.06%

KEV

Description

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 21 hours ago

Bluesky

Profile picture fallback
CVE-2026-40361 is a zero-click Outlook remote code execution flaw requiring patching to protect enterprise inboxes.
  • 1
  • 0
  • 0
  • 23h ago
Profile picture fallback
Microsoft patched CVE-2026-40361, a critical zero-click Outlook bug that can trigger code execution from just reading or previewing an email. The flaw raises serious risks for enterprise inboxes. #Outlook #ExchangeServer #BadWinmail
  • 1
  • 0
  • 0
  • 21h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

13 May 2026
Published
14 May 2026
Updated

CVSS v4.0
HIGH (7.2)
EPSS
Pending

KEV

Description

A buffer overflow vulnerability in the IKEv2 processing of Palo Alto Networks PAN-OS® software allows an unauthenticated network-based attacker to execute arbitrary code with elevated privileges on the firewall, or cause a denial of service (DoS) condition. Panorama, Cloud NGFW, and Prisma® Access are not impacted by these vulnerabilities.

Statistics

  • 2 Posts
  • 7 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

RE: infosec.exchange/@cR0w/1165619

security.paloaltonetworks.com/

This issue requires IKEv2 VPN tunnels that is configured with Post Quantum Cryptography (PQC).

  • 1
  • 6
  • 0
  • 16h ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing (Severity: HIGH)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0263
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Microsoft
  • Windows Server 2012

12 May 2026
Published
13 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.09%

KEV

Description

Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture fallback

May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...

captechgroup.com/about-us/thre

  • 1
  • 0
  • 0
  • 21h ago
Profile picture fallback

📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE

Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday

🔗 cyber.netsecops.io

  • 1
  • 0
  • 0
  • 20h ago

Bluesky

Profile picture fallback
📢 Patch Tuesday mai 2026 : 118 CVE Microsoft dont 3 critiques, volumes records chez Apple, Google, Mozilla et Oracle 📝 … https://cyberveille.ch/posts/2026-05-13-patch-tuesday-mai-2026-118-cve-microsoft-dont-3-critiques-volumes-records-chez-apple-google-mozilla-et-oracle/ #CVE_2026_41089 #Cyberveille
  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

13 May 2026
Published
14 May 2026
Updated

CVSS v4.0
HIGH (7.2)
EPSS
Pending

KEV

Description

An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access® are not impacted by this vulnerability.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 15 hours ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled (Severity: HIGH)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0265
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • wazuh
  • wazuh

29 Apr 2026
Published
29 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.0)
EPSS
0.08%

KEV

Description

Wazuh is a free and open source platform used for threat prevention, detection, and response. From version 4.4.0 to before version 4.14.4, a path traversal vulnerability in Wazuh's cluster synchronization extraction routine allows an authenticated cluster peer to write arbitrary files outside the intended extraction directory on other cluster nodes. This can be escalated to code execution in the Wazuh service context by overwriting Python modules loaded by Wazuh components (proof of concept available as separate attachment). In deployments where the cluster daemon runs with elevated privileges, system-level compromise is possible. This issue has been patched in version 4.14.4.

Statistics

  • 2 Posts

Last activity: 18 hours ago

Bluesky

Profile picture fallback
➡️ Wazuh - Un patch est disponible Une faille de sécurité critique, associée à la référence CVE-2026-30893 et affichant un score CVSS de 9.9, a été révélée récemment au sein de Wazuh. 🛡️ Quels sont les risques ? Comment se protéger ? www.it-connect.fr/wazuh-cve-20... #CVE #Wazuh
  • 0
  • 0
  • 0
  • 19h ago
Showing 1 to 10 of 82 CVEs