24h | 7d | 30d

Overview

  • Ivanti
  • Endpoint Manager Mobile

07 May 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.2)
EPSS
Pending

Description

An Improper Input Validation in Ivanti EPMM before versions 12.6.1.1, 12.7.0.1, and 12.8.0.1 allows a remotely authenticated user with administrative access to achieve remote code execution.

Statistics

  • 17 Posts
  • 6 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

New Ivanti EPMM Zero-Day CVE-2026-6973 Actively Exploited — Patch Immediately
#CyberSecurity
securebulletin.com/new-ivanti-

  • 4
  • 0
  • 0
  • Last hour
Profile picture fallback

🚨 Ivanti Endpoint Manager Mobile flaw (CVE-2026-6973) is being exploited in limited attacks, enabling remote code execution with admin access.

CISA has added it to its KEV catalog, with federal agencies ordered to patch by May 10, 2026.

Read: thehackernews.com/2026/05/ivan

  • 0
  • 1
  • 0
  • 2h ago
Profile picture fallback

The U.S. CISA has added a zero-day vulnerability (CVE-2026-6973) in Ivanti Endpoint Manager Mobile (EPMM) to its Known Exploited Vulnerabilities catalog, urging federal agencies to patch by May 10, 2026. This flaw, requiring admin privileges, allows for arbitrary code execution and is already being exploited.
securityaffairs.com/191822/sec

  • 0
  • 0
  • 0
  • 14h ago

Bluesky

Profile picture fallback
Ivanti EPMM Under Fire: CVE-2026-6973 Admin‑Auth 0‑Day Already Weaponized – Patch Now! + Video Introduction: Ivanti’s Endpoint Manager Mobile (EPMM) on‑premises product is currently under active attack due to a newly disclosed zero‑day vulnerability, tracked as CVE‑2026‑6973. Although exploitation…
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access https://thehackernews.com/2026/05/ivanti-epmm-cve-2026-6973-rce-under.html
  • 0
  • 0
  • 1
  • 15h ago
Profile picture fallback
~Cisa~ CISA added CVE-2026-6973, an actively exploited Ivanti EPMM vulnerability, to its KEV catalog. - IOCs: CVE-2026-6973 - #CVE2026_6973 #Ivanti #ThreatIntel
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
A new, actively exploited flaw (CVE-2026-6973) in Ivanti Endpoint Manager Mobile allows authenticated admins remote code execution. The U.S. Cybersecurity […]
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Ivanti EPMMのCVE-2026-6973 RCE脆弱性が実際に悪用され、管理者レベルのアクセス権が付与される Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access #HackerNews (May 7) thehackernews.com/2026/05/ivan...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (May 7) CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) の不適切な入力検証の脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
CVE-2026-6973 Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
Ivanti reveals CVE-2026-6973, a critical remote code execution flaw in Endpoint Manager Mobile 12.8.0.0 and earlier, exploited in limited zero-day attacks. Additional patches released, admins urged to review credentials. #Ivanti #ZeroDay #USA
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Ivanti EPMM CVE-2026-6973 RCE Under Active Exploitation Grants Admin-Level Access reconbee.com/ivanti-epmm-... #Ivanti #EPMM #adminlevelaccess #cybersecurity #cyberattack
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Ivanti released patches for five vulnerabilities in Endpoint Manager Mobile, including CVE-2026-6973, a zero-day exploited in targeted attacks allowing remote code execution by authenticated admins. #IvantiPatch #ZeroDay #USA
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
~Cybergcca~ CCCS issued 5 advisories, highlighting critical updates for Spring, VM2, VMware, and an actively exploited Ivanti EPMM flaw. - IOCs: CVE-2026-6973, CVE-2026-40981 - #Ivanti #ThreatIntel #Vulnerability
  • 1
  • 0
  • 0
  • 17h ago
Profile picture fallback
Ivanti、ゼロデイに悪用可能な欠陥含むEPMMの脆弱性を複数修正(CVE-2026-6973、CVE-2026-7821他) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45488/
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

06 May 2026
Published
07 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
14.90%

Description

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

Statistics

  • 12 Posts
  • 5 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Critical Palo Alto PAN-OS Zero-Day CVE-2026-0300 Actively Exploited — Root Access Granted on 5,800+ Exposed Firewalls
#CyberSecurity
securebulletin.com/critical-pa

  • 5
  • 0
  • 0
  • 15h ago
Profile picture fallback

📰 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE

🚨 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal URL: security.paloaltonetworks.com/CVE-2026-0300 Classification: Critical, Solution: Workaround, Exploit Maturity: Functional, CVSSv3.1: 9.3
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Palo Alto Networks disclosed CVE-2026-0300, a zero-day vulnerability in PA and VM series firewalls allowing unauthenticated remote code execution, exploited by a likely state-sponsored threat group with evidence pointing to China.
  • 0
  • 0
  • 0
  • 16h ago
Profile picture fallback
Palo Alto warns of actively exploited PAN-OS firewall flaw Palo Alto Networks has disclosed a critical vulnerability in multiple PAN-OS versions, tracked as CVE-2026-0300 (CVSS 9.3), that allows unauthenticated remote attackers to execute arbitrary code with root privileges on affected firewalls.…
  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback
Palo Alto Networks disclosed CVE-2026-0300, a critical buffer overflow vulnerability in PAN-OS User-ID Authentication Portal allowing unauthenticated remote code execution, with exploitation attempts detected since April 9, 2026.
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
CVE-2026-0300: UNPATCHED PAN-OS ZERO-DAY UNDER ACTIVE EXPLOITATION—SECURE YOUR FIREWALLS NOW Introduction: A critical, unpatched buffer overflow vulnerability (CVE-2026-0300, CVSS 9.3) is being actively exploited in the wild against Palo Alto Networks PA-Series and VM-Series firewalls when the…
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
The latest update for #ArcticWolf includes "CVE-2026-0300 — Critical Buffer Overflow in PAN-OS User-ID Authentication Portal" and "Should Your Organization Rely on #XDR For #Cybersecurity?". #infosec #networks https://opsmtrs.com/2ZFbaTl
  • 0
  • 0
  • 0
  • 6h ago
Profile picture fallback
The latest update for #Foresiet includes "CVE-2026-0300: Unauthenticated Root RCE via Buffer Overflow in Palo Alto PAN-OS User-ID Authentication Portal" and "The April 2026 #AI Security Report: 6 Incidents and Detailed Attack Paths". #cybersecurity #infosec https://opsmtrs.com/3J3CMGz
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
⚠️ Une faille critique dans #PaloAlto PAN-OS (CVE-2026-0300) permet une exécution de code à distance sans authentification. Exploitation active détectée sur le terrain. Score CVSS : 9.3. #CyberSecurity #Automatisation
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Palo Alto Networks reveals active exploitation of zero-day CVE-2026-0300 in PA and VM firewalls, enabling unauthenticated root access. Attack linked to Chinese state group CL-STA-1132 using Earthworm and ReverseSocks5. #China #PaloAlto #ZeroDay
  • 0
  • 0
  • 0
  • 2h ago
Profile picture fallback
【脆弱性】CVE-2026-0300とは?Palo Alto Networks製PAN-OSの重大脆弱性と企業が取るべき対策を解説 2026年5月、Palo Alto NetworksのファイアウォールOS「PAN-OS」に関する重大な脆弱性「CVE-2026-0300」が公表されました。この脆弱性は、条件を満たす機器に対して外部から攻撃されるおそれがあり、すでに実際の悪用も確認されています。
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Linux
  • Linux

22 Apr 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.91%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 7 Posts
  • 36 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

CopyFail (CVE-2026-31431) is a high-severity Linux kernel vulnerability -- patches are out now for Rocky Linux 8.10, 9.8, and 10.1.

Any unprivileged local user can escalate to root in seconds. Multi-tenant hosts, containers, and CI runners should prioritize this one.

Fix it with:
sudo dnf --refresh update 'kernel*'

Full write-up on the blog:
forums.rockylinux.org/t/copyfa
#RockyLinux #Linux #OpenSource #LinuxSecurity #CopyFail

  • 6
  • 11
  • 0
  • 16h ago
Profile picture fallback

Ok Ive been working through the mitigations for the string of kernel vulnerabilities. I think this is all of them. I had Claude spit out a summary.

Hope this helps others.

Linux Kernel LPE Roundup — May 7, 2026
Four local privilege escalation vulnerabilities in the same bug class (page-cache writes) are actively circulating. Here’s what you need to know:
1. Copy Fail (CVE-2026-31431)
Original page-cache write via algif_aead in the crypto subsystem. Patched upstream, distro patches available.
Mitigation: Blacklist algif_aead module, or apply your distro’s kernel update.
copy.fail/
2. Dirty Frag (no CVE yet)
Chains xfrm-ESP + RxRPC page-cache writes for a universal unprivileged LPE across all major distros. Published after a third party broke the embargo — no patches exist yet.
Mitigation: Blacklist esp4, esp6, and rxrpc modules.
github.com/V4bel/dirtyfrag/
3. Copy Fail 2: Electric Boogaloo (no CVE yet)
xfrm ESP-in-UDP variant using MSG_SPLICE_PAGES. Same class as Copy Fail, different subsystem. Autoloads esp4/xfrm modules via userns netlink. Upstream fix committed but not yet in stable branches.
Mitigation: Blacklist esp4 (same as Dirty Frag).
github.com/0xdeadbeefnetwork/C
4. io_uring ZCRX Freelist LPE (no CVE yet)
Out-of-bounds write in io_uring’s zero-copy receive freelist. Narrower scope — requires kernel 6.15+, CONFIG_IO_URING_ZCRX=y, a supported NIC (mlx5/ice/nfp), and CAP_NET_ADMIN. Fix committed but not in stable yet.
Mitigation: Check grep CONFIG_IO_URING_ZCRX /lib/modules/$(uname -r)/config — if not set, you’re not affected.
ze3tar.github.io/post-zcrx.html

#linux #kernel #cve #vulnerability #copyfail #copyfail2 #dirtyfrag #security #infosec #sysadmin

  • 5
  • 1
  • 0
  • 8h ago
Profile picture fallback

Copy-Fail? More like Copy-Fixed. 🛑

At @DE-CIX, our customers depend on our availability and integrity. So when the Linux "Copy-Fail" vulnerability popped up, we took it super seriously and patched things up immediately.

During the mitigation process, one of our system engineers identified a completely alternative way to block the vulnerability using ftrace. Because it’s been supported in the kernel since 2013, it’s an incredibly accessible solution.

👉 github.com/philfry/cve-2026-31

  • 1
  • 1
  • 0
  • 18h ago
Profile picture fallback

A nine-year Linux kernel bug is being actively exploited right now. CVE-2026-31431 (Copy Fail) gives any unprivileged local user a root shell. Works every time. Leaves no trace on disk. Patch status + fixes for Proxmox, Debian, and more in the video.

➡️➡️ Watch Here: youtu.be/LwqEUiuXmbg

  • 0
  • 1
  • 0
  • 21h ago
Profile picture fallback

ICYMI: CVE-2026-31431 (Copy Fail) gives any unprivileged local user a ROOT SHELL. Works every time. Leaves no trace on disk. Patch status + fixes for Proxmox, Debian, and more.

➡️➡️ Watch Here: youtu.be/LwqEUiuXmbg

  • 0
  • 1
  • 0
  • 15h ago
Profile picture fallback

variante peu sympa 👀
"Unprivileged Linux LPE via xfrm ESP-in-UDP MSG_SPLICE_PAGES no-COW fast path. Page-cache write into any readable file. Overwrites a nologin line in /etc/passwd with sick::0:0:...:/:/bin/bash and sus into it. Same class as Copy Fail (CVE-2026-31431), different subsystem."
⬇️
github.com/0xdeadbeefnetwork/C

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture fallback
CopyFail (CVE-2026-31431) is serious. Patches are out now for Rocky Linux 8.10, 9.8, and 10.1. One command and a reboot gets you covered. Full details in the blog. Stay patched. 🐧 sudo dnf --refresh update 'kernel*' #RockyLinux #Linux #LinuxSecurity
  • 2
  • 7
  • 0
  • 16h ago

Overview

  • Linux
  • Linux

08 May 2026
Published
08 May 2026
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Statistics

  • 4 Posts
  • 21 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

L'ensemble de notre parc infogéré est immunisé contre la faille Dirty Frag (CVE-2026-43284) depuis ce matin 08h59.

En gros, c'est l'enfant maudit de Dirty Pipe et Copy Fail qui permet une élévation locale de privilèges qui fonctionne très bien.

En savoir plus sur la faille-> github.com/V4bel/dirtyfrag#dir

  • 3
  • 2
  • 0
  • 1h ago
Profile picture fallback
Happy Frid^WCVE-2026-43284

#Linux #DirtyFrag #CopyFail
  • 1
  • 0
  • 0
  • 1h ago
Profile picture fallback

Apparently there's yet another Local Privilege Escalation . There's a mitigation that disables esp4, esp6 and rxrpc modules.

openwall.com/lists/oss-securit

github.com/V4bel/dirtyfrag

EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. nvd.nist.gov/vuln/detail/CVE-2 nvd.nist.gov/vuln/detail/CVE-2

  • 8
  • 7
  • 0
  • 13h ago

Bluesky

Profile picture fallback
CVE-2026-43284がアサインされた模様です。 www.cve.org/CVERecord?id...
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

The BOOTP file field is written to the lease file without escaping embedded double-quotes, allowing injection of arbitrary dhclient.conf directives. When the lease file is subsequently re-parsed by dhclient, e.g., after a system restart, an attacker-controlled field from the lease is passed to dhclient-script(8), which evaluates it. A rogue DHCP server may be able to execute arbirary code as root on a system running dhclient.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 3 hours ago

Bluesky

Profile picture fallback
[RSS] CVE-2026-42511 Breakdown: RCE in FreeBSD aisle.com -> Original->
  • 0
  • 1
  • 0
  • 3h ago
Profile picture fallback
CVE-2026-42511 Breakdown: RCE in FreeBSD
  • 0
  • 0
  • 1
  • 17h ago

Overview

  • xz
  • xz

29 Mar 2024
Published
20 Nov 2025
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
85.06%

KEV

Description

Malicious code was discovered in the upstream tarballs of xz, starting with version 5.6.0. Through a series of complex obfuscations, the liblzma build process extracts a prebuilt object file from a disguised test file existing in the source code, which is then used to modify specific functions in the liblzma code. This results in a modified liblzma library that can be used by any software linked against this library, intercepting and modifying the data interaction with this library.

Statistics

  • 2 Posts
  • 2 Interactions

Last activity: 7 hours ago

Bluesky

Profile picture fallback
GNU IFUNC is the real culprit behind CVE-2024-3094 | Discussion
  • 1
  • 1
  • 0
  • 7h ago
Profile picture fallback
GNU IFUNC is the real culprit behind CVE-2024-3094 github.com/robertdfrenc... (news.ycombinator.com/item?id=4805...)
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • FreeBSD
  • FreeBSD

30 Apr 2026
Published
01 May 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privileges.

Statistics

  • 1 Post
  • 18 Interactions

Last activity: 4 hours ago

Bluesky

Profile picture fallback
CVE-2026-7270: root on FreeBSD with a shell script :( blog.calif.io/p/cve-2026-7...
  • 10
  • 8
  • 0
  • 4h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
06 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
64.28%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 2 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

CVE-2026-41940 was exploited for 64 days before a patch existed. First attack: Feb 23. Advisory: Apr 28.

After disclosure, 15,448 cPanel hosts in malicious activity on May 1 alone. Ransomware and a Mirai botnet running in parallel. CVSS 9.8. CISA KEV.

We built a free scanner. No account needed.

pentest-tools.com/network-vuln

  • 0
  • 0
  • 0
  • 3h ago

Bluesky

Profile picture fallback
🟢 Cómo solucionar la #vulnerabilidad CVE-2026-41940 en cPanel/WHM: Parche de seguridad urgente para acceso root www.newstecnicas.com/2026/05/solu...
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts
  • 15 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Apparently there's yet another Local Privilege Escalation . There's a mitigation that disables esp4, esp6 and rxrpc modules.

openwall.com/lists/oss-securit

github.com/V4bel/dirtyfrag

EDIT: The related vulnerabilities are now tracked as CVE-2026-43284 and CVE-2026-43500. nvd.nist.gov/vuln/detail/CVE-2 nvd.nist.gov/vuln/detail/CVE-2

  • 8
  • 7
  • 0
  • 13h ago

Bluesky

Profile picture fallback
CVE-2026-43500も追加でアサインされるそうです(まだCVE自体は公開されていません)
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Google
  • Android

04 May 2026
Published
05 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

In adbd_tls_verify_cert of auth.cpp, there is a possible bypass of wireless ADB mutual authentication due to a logic error in the code. This could lead to remote (proximal/adjacent) code execution as the shell user with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 2 Posts
  • 21 Interactions

Last activity: 9 hours ago

Fediverse

Profile picture fallback

CVE-2026-0073 is a Critical severity Remote Code Execution (RCE) vulnerability included as the only vulnerability fixed in the May 2026 Android Security Bulletin. GrapheneOS first shipped the patch in our 2026030501 security preview release on March 5th. It also isn't nearly as severe as it sounds.

  • 4
  • 17
  • 1
  • 9h ago
Showing 1 to 10 of 130 CVEs