24h | 7d | 30d

Overview

  • Linux
  • Linux

15 May 2026
Published
23 May 2026
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.

Statistics

  • 3 Posts
  • 14 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture fallback

Researchers disclosed CVE-2026-46333, a Linux kernel flaw present since 2016 that enables local users to access sensitive files and execute commands as root. 🐧
Qualys said Debian, Fedora and Ubuntu default installs are affected, while admins are urged to patch kernels and rotate exposed SSH keys. 🔑

🔗 thehackernews.com/2026/05/9-ye

#TechNews #Linux #Kernel #CVE202646333 #CVE #Cybersecurity #Qualys #Ubuntu #Debian #Fedora #OpenSource #FOSS #Security #Exploit #Infosec #SysAdmin #Privacy #SSH #Admin

  • 9
  • 5
  • 0
  • 10h ago

Bluesky

Profile picture fallback
CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path | Qualys blog.qualys.com/vulnerabilit...
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • LiteSpeed Technologies
  • cPanel Plugin
  • WHM Plugin/cPanel Plugin

21 May 2026
Published
22 May 2026
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.02%

KEV

Description

LiteSpeed User-End cPanel Plugin before 2.4.5 allows privilege escalation (possibly to root), as exploited in the wild in May 2026. Detection is best done via a command line of grep -rE "cpanel_jsonapi_func=redisAble" /var/cpanel/logs /usr/local/cpanel/logs/ 2>/dev/null in Bash. If you get no output, you have not been hit with exploitation of the vulnerability. If there is output, we recommend you examine the IP addresses in the list, determine if they are valid IP addresses, and if not, block them. To determine damage done, examine the system logs for use by the detected IP addresses. The issue is related to mishandling of Redis enable/disable features. The recommended minimum version is 2.4.7.

Statistics

  • 3 Posts
  • 3 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture fallback

Explotan vulnerabilidad CVE-2026-48172 en plugin de LiteSpeed para cPanel para ejecutar scripts como root

blog.elhacker.net/2026/05/expl

  • 1
  • 2
  • 0
  • 23h ago

Bluesky

Profile picture fallback
LiteSpeed cPanel Plugin CVE-2026-48172 Exploited to Run Scripts as Root #cybersecurity #hacking #news #infosec #security #technology #privacy thehackernews.com/20...
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Active exploits dominated the daily recap: LiteSpeed cPanel CVE-2026-48172 enabled root access, Drupal SQL injections hit CISA KEV, and an Apex One zero-day was seen in the wild. #CVE202648172 #Drupal #Ukraine
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 11 hours ago

Fediverse

Profile picture fallback

CVE-2026-47237: Sicherheitslücke in Kubeflow ermöglicht Token-Diebstahl über Istio

Eine neu veröffentlichte Schwachstelle in der ML-Plattform Kubeflow erlaubt es authentifizierten Angreifern, Autorisierungs-Tokens anderer Nutzer abzugreifen und damit vollständige Kontrolle über deren Konten und Daten zu erlangen

all-about-security.de/cve-2026

#cybersecurity #itsicherheit #itsecurity #cve

  • 0
  • 0
  • 0
  • 11h ago

Bluesky

Profile picture fallback
CVE-2026-47237: Sicherheitslücke in Kubeflow ermöglicht Token-Diebstahl über Istio - Eine neu veröffentlichte Schwachstelle in der ML-Plattform Kubeflow erlaubt es authentifizierten Angreifern, Autorisierungs-Tokens anderer Nutzer abzugreifen und.. www.all-about-security.de/cve-2026-472... #cve
  • 0
  • 1
  • 0
  • 11h ago

Overview

  • F5
  • NGINX Plus

22 May 2026
Published
23 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.15%

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when a rewrite directive uses a regex pattern with distinct, overlapping Perl-Compatible Regular Expression (PCRE) captures (for example, ^/((.*))$) and a replacement string that references multiple such captures (for example, $1$2) in a redirect or arguments context. An unauthenticated attacker along with conditions beyond their control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, attackers can execute code on systems with Address Space Layout Randomization (ASLR) disabled or when the attacker can bypass ASLR. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 2 Posts

Last activity: 9 hours ago

Bluesky

Profile picture fallback
nginx{Stable,Mainline}: add patch for CVE-2026-9256 https://github.com/NixOS/nixpkgs/pull/523267 #security
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Buffer overflow in the NGINX ngx_http_rewrite_module vulnerability CVE-2026-9256 my.f5.com/manage/s/art...
  • 0
  • 0
  • 0
  • 9h ago

Overview

  • charmbracelet
  • soft-serve

03 Sep 2025
Published
04 Sep 2025
Updated

CVSS v3.1
HIGH (7.7)
EPSS
0.10%

KEV

Description

Soft Serve is a self-hostable Git server for the command line. In versions 0.9.1 and below, attackers can create or override arbitrary files with uncontrolled data through its SSH API. This issue is fixed in version 0.10.0.

Statistics

  • 1 Post
  • 2 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture fallback

CVE-2025-58355 - Critical RCE in Soft Serve. SSH API allows arbitrary file write. CVSS 7.7. Fixed in v0.10.0. Update immediately. #CVE #infosec #Git

valtersit.com/cve/CVE-2025-583

  • 1
  • 1
  • 0
  • 19h ago

Overview

  • jellyfin
  • jellyfin

24 Apr 2023
Published
12 Feb 2025
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.76%

KEV

Description

Jellyfin is a free-software media system. Versions starting with 10.8.0 and prior to 10.8.10 and prior have a directory traversal vulnerability inside the `ClientLogController`, specifically `/ClientLog/Document`. When combined with a cross-site scripting vulnerability (CVE-2023-30627), this can result in file write and arbitrary code execution. Version 10.8.10 has a patch for this issue. There are no known workarounds.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 19 hours ago

Fediverse

Profile picture fallback

Sure… If someone managed to stream some of my media… They probably earned it… But then they exploit a vulnerability to perform arbitrary code execution, and leverage that to hack everything else on my network…

https://app.opencve.io/cve/CVE-2023-30626

  • 1
  • 0
  • 0
  • 19h ago

Overview

  • Edimax
  • EW-7438RPn

24 May 2026
Published
24 May 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A flaw has been found in Edimax EW-7438RPn up to 1.31. This impacts the function formWirelessTbl of the file /goform/formWirelessTbl of the component webs. Executing a manipulation of the argument submit-url can lead to buffer overflow. The attack may be performed from remote. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 15 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH-severity buffer overflow (CVE-2026-9346) in Edimax EW-7438RPn (v1.0 – 1.31). Remote exploit possible via /goform/formWirelessTbl. Exploit published; no patch from vendor. Limit device exposure & monitor for updates. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 15h ago

Overview

  • Edimax
  • EW-7438RPn

24 May 2026
Published
24 May 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A vulnerability was detected in Edimax EW-7438RPn up to 1.31. This affects the function formWizSurvey of the file /goform/formWizSurvey of the component webs. Performing a manipulation of the argument ssid/manualssid/ip/mask/gateway results in buffer overflow. The attack is possible to be carried out remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 8 hours ago

Fediverse

Profile picture fallback

🚨 HIGH severity: Buffer overflow in Edimax EW-7438RPn (≤1.31) via /goform/formWizSurvey. Public exploit, no vendor fix yet. Restrict remote access & monitor for updates. CVE-2026-9345. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 8h ago

Overview

  • Drupal
  • Drupal core

20 May 2026
Published
23 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
12.57%

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Drupal Drupal core allows SQL Injection. This issue affects Drupal core: from 8.9.0 before 10.4.10, from 10.5.0 before 10.5.10, from 10.6.0 before 10.6.9, from 11.0.0 before 11.1.10, from 11.2.0 before 11.2.12, from 11.3.0 before 11.3.10.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 22 hours ago

Fediverse

Profile picture fallback
  • 0
  • 1
  • 0
  • 22h ago

Overview

  • Google Cloud
  • Internal Integration Platform APIs

15 May 2026
Published
15 May 2026
Updated

CVSS v4.0
CRITICAL (10.0)
EPSS
0.42%

KEV

Description

An Improper Access Control vulnerability in several internal API endpoints for Google Cloud Application Integration prior to 2026-01-23 allows a remote, unauthenticated attacker to disclose sensitive internal information and execute arbitrary code using specially crafted HTTP requests to inadvertently exposed internal API endpoints.

Statistics

  • 2 Posts

Last activity: 7 hours ago

Fediverse

Profile picture fallback

$148,337 paid by Google to a researcher (@brutecat) who found debug endpoints on Google Cloud allowing to configure privileged workflows leading to full in Google Cloud production (CVE-2026-2031)

👇
brutecat.com/articles/google-c

  • 0
  • 0
  • 1
  • 7h ago
Showing 1 to 10 of 22 CVEs