Overview
Description
Statistics
- 27 Posts
- 10 Interactions
Fediverse
⚠️Alerte CERT-FR⚠️
La vulnérabilité CVE-2026-42897 affecte Microsoft Exchange et permet une injection de code indirecte à distance (XSS) ainsi qu'un contournement de la politique de sécurité.
Elle est activement exploitée.
Microsoft describes this security flaw (CVE-2026-42897) as a spoofing vulnerability affecting up-to-date Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE) software. https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-exchange-zero-day-flaw-exploited-in-attacks/
Kritische Sicherheitslücke CVE-2026-42897 bedroht Microsoft Exchange Server 2016, 2019 und Subscription Edition. Angreifer können über OWA JavaScript-Code ausführen. #Microsoft #ITSec https://winfuture.de/news,158719.html?utm_source=Mastodon&utm_medium=ManualStatus&utm_campaign=SocialMedia
Exchange Server – CVE-2026-42897 : cette faille zero-day est déjà exploitée ! https://www.it-connect.fr/exchange-server-cve-2026-42897-cette-faille-zero-day-est-deja-exploitee/ #ActuCybersécurité #Cybersécurité #Vulnérabilité #Microsoft #Exchange
High critical cross-site scripting (CSS) vuln in Microsoft Exchange Server 2016 being used in the wild
📰 Microsoft Exchange Zero-Day Under Active Attack, Mitigations Deployed Automatically
📢 Microsoft confirms a new Exchange Server zero-day (CVE-2026-42897) is actively exploited! The XSS flaw in OWA affects on-prem servers. Mitigations are being deployed automatically via the EM service. Check your systems! 🛡️ #Exchange #Zeroday
🌐 cyber[.]netsecops[.]io
Hups, a new exchange Zero Day just dropped.
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-42897
Mitigation available. No Patch.
Bluesky
Overview
Description
Statistics
- 11 Posts
- 133 Interactions
Fediverse
Regarding CVE-2026-42945 in nginx - no modern (or even old) Linux distribution runs nginx without ASLR.
The way the PoC exploit works is they spawn nginx like this:
> exec setarch x86_64 -R /nginx-src/build/nginx -p /app -c /app/nginx.conf
Setarch -R disables ASLR. I've had a look through Github and I can't find any other software which actually does this for nginx either.
So, cool, sweet technical vuln - it's valid - but the RCE apocalypse ain't coming.
Une faille vieille de 18 ans dans Nginx, un PoC public, beaucoup de bruit… mais qui est vraiment concerné ?
⚠️ NGINX `rewrite` vulnerability
Using unnamed regex captures (`$1`, `$2`) with `?` in replacement strings plus `rewrite`/`if`/`set` can be triggered **without auth**.
Systems with ASLR disabled are at risk of remote code execution. Patch immediately!
https://my.f5.com/manage/s/article/K000161019
🚨 Nouvelle faille critique sur NGINX : CVE-2026-42945 (Z)
Une vulnérabilité dans ngx_http_rewrite_module peut provoquer un crash des workers NGINX, voire une exécution de code si l’ASLR est désactivé.
👉 https://security-tracker.debian.org/tracker/CVE-2026-42945
I don't wanna ruin your Friday, but nginx has a serious CVE with a rating of 9.2, and you should patch or mitigate it asap.
The CVE is an unauthenticated http request that can lead to a deterministic buffer overflow and remote code execution.
@beyondmachines1
Meanwhile, not completely off the hook people, you can check the vul updates via: https://security-tracker.debian.org/tracker/CVE-2026-42945
Bluesky
Overview
Description
Statistics
- 24 Posts
- 12 Interactions
Fediverse
Why are we even bothering, again, if the "giants" of cyber aren't bothering? https://www.rapid7.com/blog/post/ve-cve-2026-20182-critical-authentication-bypass-cisco-catalyst-sd-wan-controller-fixed/
CISA said all federal agencies have until Sunday to patch CVE-2026-20182, the latest Cisco SD-WAN bug exploited by nation-state actors.
It was discovered by Rapid7, which said it "behaves like a master key."
https://therecord.media/cisa-orders-all-federal-agencies-to-patch-cisco-sd-wan-bug
📰 Cisco Scrambles to Patch Critical 10.0 CVSS Zero-Day in SD-WAN Under Active Attack
🚨 CRITICAL ZERO-DAY: Cisco warns of active exploitation of a 10.0 CVSS auth bypass flaw (CVE-2026-20182) in Catalyst SD-WAN. Attackers can gain full admin access. CISA has issued a directive to patch immediately! ⚠️ #CyberSecurity #ZeroDay #Cisco
🌐 cyber[.]netsecops[.]io
Bluesky
Overview
Description
Statistics
- 4 Posts
- 81 Interactions
Fediverse
ssh-keysign-pwn is the fourth local-root Linux kernel disclosure in roughly two weeks. (But who's counting?)
AlmaLinux 9 and 10 are both vulnerable. AlmaLinux 8 is not exploitable with the current public PoCs, but is getting the patch as well.
Patched kernel versions are available for testing now: https://almalinux.org/blog/2026-05-15-ssh-keysign-pwn-cve-2026-46333/
Local file exposure #vulnerability in linux kernels (CVE-2026-46333):
https://github.com/0xdeadbeefnetwork/ssh-keysign-pwn
Apparently this issue was already identified in 2020 but wasn't fixed back then.
Mitigation:
- runtime:
sudo sysctl -w kernel.yama.ptrace_scope=2
- To make the mitigation persistent:
echo "kernel.yama.ptrace_scope=2" | sudo tee /etc/sysctl.d/01-harden-ptrace.conf
WARNING: This mitigation may break existing functionality. Test before deploying.
WARNING 2: While this mitigation does block the currently existing PoC, it may not prevent other attack vectors exploiting this vulnerability.
What a week… #Linux ssh-keysign-pwn (CVE-2026-46333):
Mitigation (breaks strace, gdb etc)
$ sudo sysctl -w kernel.yama.ptrace_scope=3
$ echo 'kernel.yama.ptrace_scope = 3' | sudo tee /etc/sysctl.d/99-ssh-keysign-pwn.conf
Overview
Description
Statistics
- 8 Posts
- 3 Interactions
Fediverse
Fragnesia: una nuova vulnerabilità di escalation dei privilegi nel kernel Linux
Scoperta una nuova falla di sicurezza nel kernel Linux, chiamata Fragnesia (CVE-2026-46300), che consente a un utente locale non privilegiato di ottenere i privilegi di amministratore (root) su una distribuzione GNU/Linux.
@linux #UnoLinux #gnulinux #linux
Una nuova falla di Fragnesia su Linux consente agli attaccanti di ottenere privilegi di root
Le distribuzioni Linux stanno rilasciando patch per una nuova vulnerabilità di escalation dei privilegi del kernel di alta gravità (nota come Fragnesia e tracciata come CVE-2026-46300) che permette agli attaccanti di eseguire codice dannoso come root
Beep!
sudo sh -c "printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/fragnesia.conf; rmmod esp4 esp6 rxrpc 2>/dev/null; true"
https://tuxcare.com/blog/fragnesia-cve-2026-46300-is-a-new-linux-kernel-lpe/
Oh and while we are here, Linux fans, please tell me you have updated your machine for "Fragnesia (CVE-2026-46300)", right… right!?
Linux distributions are alerting users to a newly disclosed kernel vulnerability that could allow local attackers to escalate privileges to root.
The flaw, dubbed Fragnesia and tracked as CVE-2026-46300, enables unprivileged users to obtain root access by overwriting critical system files.
Most Linux distributions are impacted, and vendors have begun rolling out security patches.
Bluesky
Overview
- Fortinet
- FortiSandbox Cloud
Description
Statistics
- 2 Posts
- 5 Interactions
Fediverse
CVE-2026-26083: Critical Fortinet FortiSandbox Flaw Allows Unauthenticated Remote Code Execution — Patch Now
#CyberSecurity
https://securebulletin.com/cve-2026-26083-critical-fortinet-fortisandbox-flaw-allows-unauthenticated-remote-code-execution-patch-now/
Overview
- Microsoft
- Microsoft 365 Apps for Enterprise
Description
Statistics
- 2 Posts
Bluesky
Overview
Description
Statistics
- 2 Posts
Overview
- Microsoft
- Windows 11 version 22H3
Description
Statistics
- 2 Posts
Fediverse
CVE-2026-41096 普通に刺さりそうで怖いな
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-41096
Bluesky
Overview
Description
Statistics
- 1 Post
- 21 Interactions
Fediverse
NOTICE: Shortcuts broke its x-callback-url implementation.
Seems to be part of the security fix for CVE-2026-28993 included in iOS 26.5/18.7.9, macOS 26.5/15.7.7/14.8.7. On these OSes, it’s no longer possible to get a result from a Shortcut call via `x-success` callback, you will *always* get an x-error.
In theory, per the CVE, Shortcuts should offer a permissions prompt, not just fail.
Apple Folks: FB22785648