24h | 7d | 30d

Overview

  • Google
  • Chrome

12 Mar 2026
Published
14 Mar 2026
Updated

CVSS
Pending
EPSS
27.12%

Description

Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 2 Posts
  • 7 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

CISA still lists CVE-2026-3909 as a zero-day, even if Google removed it from its Chrome patch notes

So I presume it's still a zero-day, but patches are coming next week... instead of not being a zero-day in the first place

cisa.gov/news-events/alerts/20

chromereleases.googleblog.com/

  • 4
  • 3
  • 1
  • 2h ago

Overview

  • kernel

25 Mar 2022
Published
02 Aug 2024
Updated

CVSS
Pending
EPSS
20.50%

KEV

Description

An out-of-bounds (OOB) memory write flaw was found in the Linux kernel’s watch_queue event notification subsystem. This flaw can overwrite parts of the kernel state, potentially allowing a local user to gain privileged access or cause a denial of service on the system.

Statistics

  • 1 Post
  • 6 Interactions

Last activity: 4 hours ago

Bluesky

Profile picture fallback
Exploiting CVE-2022-0995 (Linux kernel OOB write in watch_queue) using the PageJack technique to create a page level UAF and overwrite struct file to gain LPE. blog.quarkslab.com/pagejack-in-... Credits Jean Vincent #infosec
  • 2
  • 4
  • 0
  • 4h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture fallback

Your package manager's D-Bus interface is root-privileged, always-on, and crashes instantly if you whisper the wrong locale at it.

CVE-2026-3836.
CVSS 7.5.
No auth required.

The tool patching your system was the hole. Upgrade dnf5 now.
portallinuxferramentas.blogspo

  • 2
  • 2
  • 1
  • 20h ago

Overview

  • Foswiki

21 Feb 2026
Published
15 Mar 2026
Updated

CVSS v4.0
MEDIUM (6.9)
EPSS
0.06%

KEV

Description

A vulnerability was detected in Foswiki up to 2.1.10. The affected element is an unknown function of the component Changes/Viewfile/Oops. The manipulation results in information disclosure. It is possible to launch the attack remotely. The exploit is now public and may be used. Upgrading to version 2.1.11 is sufficient to fix this issue. The patch is identified as 31aeecb58b64/d8ed86b10e46. Upgrading the affected component is recommended.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Foswi­ki 2.1.11 is now avail­able to be down­loaded. This re­lease came ear­li­er than ex­pect­ed due to the se­vere se­cu­ri­ty is­sues found in pre­vi­ous ver­sions, as de­tailed in CVE-2026-2861.

#foswiki #wiki #perl #opensource #release #cve #security

foswiki.org/Blog/Foswiki2111Is

  • 0
  • 2
  • 0
  • 4h ago

Overview

  • Apache Software Foundation
  • Apache Log4j2

10 Dec 2021
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
94.36%

Description

Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12.3, and 2.3.1) JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. From version 2.16.0 (along with 2.12.2, 2.12.3, and 2.3.1), this functionality has been completely removed. Note that this vulnerability is specific to log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 9 hours ago

Bluesky

Profile picture fallback
Critical RCE Vulnerability in Apache Log4j2 (Log4Shell) – Exploitation and Mitigation + Video Introduction: In December 2021, the cybersecurity community was rocked by the disclosure of CVE-2021-44228, a remote code execution (RCE) vulnerability in Apache Log4j2, a ubiquitous Java logging library.…
  • 0
  • 1
  • 0
  • 9h ago

Overview

  • NaturalIntelligence
  • fast-xml-parser

26 Feb 2026
Published
26 Feb 2026
Updated

CVSS v4.0
LOW (2.7)
EPSS
0.05%

KEV

Description

fast-xml-parser allows users to validate XML, parse XML to JS object, or build XML from JS object without C/C++ based libraries and no callback. Prior to version 5.3.8, the application crashes with stack overflow when user use XML builder with `preserveOrder:true`. Version 5.3.8 fixes the issue. As a workaround, use XML builder with `preserveOrder:false` or check the input data before passing to builder.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 6 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-27942 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/430 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 1
  • 0
  • 6h ago

Overview

  • Wavlink
  • WL-WN578W2

15 Mar 2026
Published
15 Mar 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.17%

KEV

Description

A flaw has been found in Wavlink WL-WN578W2 221110. Impacted is the function Delete_Mac_list/SetName/GuestWifi of the file /cgi-bin/wireless.cgi of the component POST Request Handler. Executing a manipulation can lead to command injection. It is possible to launch the attack remotely. The exploit has been published and may be used. It is recommended to upgrade the affected component.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 13 hours ago

Fediverse

Profile picture fallback

🚨 CVE-2026-4164 (CRITICAL, CVSS 9.3) in Wavlink WL-WN578W2 (v221110): Unauth'd command injection via /cgi-bin/wireless.cgi. Public exploit released. Patch ASAP or restrict access! radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 1
  • 13h ago

Overview

  • Microsoft
  • Windows 10 Version 1607

10 Feb 2026
Published
13 Mar 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.14%

Description

Improper privilege management in Windows Remote Desktop allows an authorized attacker to elevate privileges locally.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 14 hours ago

Bluesky

Profile picture fallback
CVE-2026-21533: The 20,000 RDP Zero-Day That Turns Every Session Host Into a Domain Admin’s Worst Nightmare + Video Introduction: In a stark reminder that legacy protocols remain the Achilles' heel of enterprise security, a threat actor is reportedly selling a zero-day exploit for a Windows Remote…
  • 0
  • 1
  • 0
  • 14h ago

Overview

  • TRENDnet
  • TEW-632BRP

15 Mar 2026
Published
15 Mar 2026
Updated

CVSS v4.0
HIGH (8.6)
EPSS
0.04%

KEV

Description

A vulnerability was detected in TRENDnet TEW-632BRP 1.010B32. This affects an unknown part of the file /ping_response.cgi of the component HTTP POST Request Handler. The manipulation of the argument ping_ipaddr results in stack-based buffer overflow. The attack may be performed from remote. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 4 hours ago

Fediverse

Profile picture fallback

🚩 HIGH severity: CVE-2026-4172 in TRENDnet TEW-632BRP (v1.010B32) — stack-based buffer overflow in /ping_response.cgi (ping_ipaddr). Public exploit, no patch. Isolate, restrict access, and monitor now! radar.offseq.com/threat/cve-20

  • 0
  • 1
  • 0
  • 4h ago

Overview

  • OpenSSL
  • OpenSSL

27 Jan 2026
Published
27 Jan 2026
Updated

CVSS
Pending
EPSS
0.08%

KEV

Description

Issue summary: A type confusion vulnerability exists in the signature verification of signed PKCS#7 data where an ASN1_TYPE union member is accessed without first validating the type, causing an invalid or NULL pointer dereference when processing malformed PKCS#7 data. Impact summary: An application performing signature verification of PKCS#7 data or calling directly the PKCS7_digest_from_attributes() function can be caused to dereference an invalid or NULL pointer when reading, resulting in a Denial of Service. The function PKCS7_digest_from_attributes() accesses the message digest attribute value without validating its type. When the type is not V_ASN1_OCTET_STRING, this results in accessing invalid memory through the ASN1_TYPE union, causing a crash. Exploiting this vulnerability requires an attacker to provide a malformed signed PKCS#7 to an application that verifies it. The impact of the exploit is just a Denial of Service, the PKCS7 API is legacy and applications should be using the CMS API instead. For these reasons the issue was assessed as Low severity. The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue, as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module boundary. OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 6 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-22796 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/423 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 1
  • 0
  • 6h ago
Showing 1 to 10 of 47 CVEs