24h | 7d | 30d

Overview

  • Microsoft
  • Microsoft Malware Protection Engine

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.04%

KEV

Description

Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.

Statistics

  • 4 Posts
  • 251 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

msrc.microsoft.com/update-guid

One job. You had one job.

Heap-based buffer overflow in Microsoft Defender allows an unauthorized attacker to execute code over a network.

  • 81
  • 133
  • 0
  • 18h ago
Profile picture fallback
  • 13
  • 24
  • 1
  • 16h ago

Bluesky

Profile picture fallback
[some-subscribed-rss] New Post: "No way to prevent this" say users of only language where this regularly happens, by https://xeiaso.net/shitposts/no-way-to-prevent-this/CVE-2026-45584/
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Drupal
  • Drupal core

20 May 2026
Published
21 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Drupal Drupal core allows SQL Injection. This issue affects Drupal core: from 8.9.0 before 10.4.10, from 10.5.0 before 10.5.10, from 10.6.0 before 10.6.9, from 11.0.0 before 11.1.10, from 11.2.0 before 11.2.12, from 11.3.0 before 11.3.10.

Statistics

  • 6 Posts
  • 1 Interaction

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Si votre CMS est un , ou si vous connaissez quelqu’un qui administre un site Drupal : c’est le moment de vérifier la version.

La faille CVE-2026-9082 touche Drupal Core avec base PostgreSQL : injection SQL critique, exploitable sans compte, pouvant mener à fuite de données, élévation de privilèges voire RCE selon le contexte.

À corriger en priorité :
Drupal 10.5 → 10.5.10
Drupal 10.6 → 10.6.9
Drupal 11.2 → 11.2.12
Drupal 11.3 → 11.3.10

MySQL/MariaDB ne semblent pas concernés par cette SQLi, mais les mises à jour incluent aussi Symfony/Twig : patch recommandé pour tout le monde.
👇
drupal.org/sa-core-2026-004

"Drupal – CVE-2026-9082 : cette faille critique de type injection SQL menace les sites Web"
👇
it-connect.fr/drupal-cve-2026-

🔍 (à noter la diff entre estimation LLM VLAI et attribution CVSS officielle en Medium)
👇
vulnerability.circl.lu/vuln/CV

💬
⬇️
infosec.pub/

  • 1
  • 0
  • 0
  • 8h ago
Profile picture fallback

🚨 Drupal sites using PostgreSQL face a highly critical SQL injection vuln (CVE-2026-9082), risking RCE & data exposure. Patch versions 11.3, 11.2, 10.6, 10.5.x ASAP. Update Symfony & Twig too. No active exploitation yet. radar.offseq.com/threat/drupal

  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback

Patch immediately before public exploits emerge.

drupal.org/sa-core-2026-004

Affected:

- 8.9.0 , < 10.4.10
- 10.5.0 , < 10.5.10
- 10.6.0 , < 10.6.9
- 11.0.0 , < 11.1.10
- 11.2.0 , < 11.2.12
- 11.3.0 , < 11.3.10

CVE-2026-9082 - Highly critical - SQL Injection
CVE-2026-8495 - Missing Authorization
CVE-2026-8493 - XSS
CVE-2026-8492
CVE-2026-8491

#Drupal #PHP #CyberSecurity #Infosec #CVE #WebSecurity #PostgreSQL #SqlInjection #PrivilegeEscalation #XSS

  • 0
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture fallback
Drupal Core patched CVE-2026-9082, a critical PostgreSQL-only flaw that could enable SQL injection, privilege escalation, info disclosure, and even remote code execution on affected sites. #Drupal #PostgreSQL #CVE20269082
  • 0
  • 0
  • 0
  • 7h ago
Profile picture fallback
CVE-2026-9082 enables unauthenticated arbitrary SQL injection on Drupal sites using PostgreSQL, potentially leading to privilege escalation and remote code execution.
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Linux
  • Linux

15 May 2026
Published
21 May 2026
Updated

CVSS v3.1
HIGH (7.1)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.

Statistics

  • 4 Posts
  • 16 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Qualys has published their full write-up of CVE-2026-46333: openwall.com/lists/oss-securit

This includes a PoC to full root via `accounts-daemon` demonstrated in Debian 13, Fedora Workstation 43/44, so goes well beyond the initial "you need a program that opens a given file and you get to read it" assumption.

  • 8
  • 8
  • 0
  • 20h ago

Bluesky

Profile picture fallback
🔴 CVE-2026-46333 — Linux Kernel ptrace Flaw, Full Advisory Released Qualys today published the complete advisory for a nine-year-old Linux kernel flaw that lets any local unprivileged user. Read Detail- www.cyberkendra.com/2026/05/nine... #linux #security #vulnerability #infosec
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
CVE-2026-46333: Local Root Privilege Escalation and Credential Disclosure in the Linux Kernel ptrace Path
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
这是今天(2026年5月21日)早上: 这是今天晚上: 也不知道说什么了,直接看吧。 Linux 第4漏洞:CVE-2026-46333(7.1分) 这是继 Copy Fail(4 月 29 日)、Dirty Frag(5 月 7 日)和 Fragnesia(5 月 13
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 3 Posts
  • 32 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Fedify security updates: 1.9.11, 1.10.10, 2.0.18, 2.1.14, and 2.2.3

If you use Fedify, update to a patched release now. CVE-2026-42462 affects Fedify's Linked Data Signature handling. An attacker could use JSON-LD graph-restructuring features to change how a signed activity is interpreted without invalidating its Linked Data Signature.

Fedify verifies incoming ActivityPub activities with several mechanisms, including HTTP Signatures, Object Integrity Proofs, and Linked Data Signatures. The vulnerable path is Linked Data Signatures: the signature is checked over the canonical RDF graph, but JSON-LD can represent the same graph in more than one JSON shape. In affected versions, that gap could let a signed activity be reshaped so that Fedify reads a different ActivityPub object shape than intended.

The fix makes Fedify normalize Linked Data Signature-verified activities against Fedify's local JSON-LD context before interpreting them, and rejects JSON-LD constructs that can preserve the signed RDF graph while changing the ActivityPub object shape consumed by Fedify.

Patched releases are 1.9.11, 1.10.10, 2.0.18, 2.1.14, and 2.2.3. The GitHub Security Advisory is GHSA-9rfg-v8g9-9367, and the CVE ID is CVE-2026-42462.

Update @fedify/fedify:

npm  update  @fedify/fedify
yarn upgrade @fedify/fedify
pnpm update  @fedify/fedify
bun  update  @fedify/fedify
deno update  @fedify/fedify

After updating, redeploy. If you run other Fedify-based servers, update those too.

Thanks to @Claire for the report and responsible disclosure.

If anything is unclear, ask below.

  • 23
  • 5
  • 1
  • 21h ago
Profile picture fallback

BotKit security updates: 0.3.3 and 0.4.2

If you use BotKit, update to a patched release now. CVE-2026-42462 affects Fedify's Linked Data Signature handling, and BotKit inherits the exposure through its dependency on Fedify.

The vulnerability allows an attacker to use JSON-LD graph-restructuring features—specifically @graph, @included, and @reverse—to reshape a signed ActivityPub activity without invalidating its Linked Data Signature. This can cause BotKit (via Fedify) to interpret a different ActivityPub object shape than was originally signed. The fix normalizes Linked Data Signature-verified activities against Fedify's local JSON-LD context before interpreting them, and rejects the JSON-LD constructs that enable the attack.

All versions of BotKit up to 0.3.2 (in the 0.3.x branch) and 0.4.1 (in the 0.4.x branch) are affected. Patched releases are 0.3.3 and 0.4.2.

For BotKit 0.4.x, update @fedify/botkit:

npm  update  @fedify/botkit
yarn upgrade @fedify/botkit
pnpm update  @fedify/botkit
bun  update  @fedify/botkit
deno update  @fedify/botkit

For BotKit 0.3.x, update @fedify/botkit:

npm  update  @fedify/botkit@0.3.3
yarn upgrade @fedify/botkit@0.3.3
pnpm update  @fedify/botkit@0.3.3
bun  update  @fedify/botkit@0.3.3
deno update  @fedify/botkit@0.3.3

If you use other BotKit-related packages (e.g., @fedify/botkit-postgres), update them as well. After updating, redeploy.

The CVE ID is CVE-2026-42462. See also fedify-dev/fedify#773 for Fedify's own announcement.

Thanks to @Claire for the report and responsible disclosure.

If anything is unclear, feel free to ask on GitHub Discussions or Matrix.

  • 3
  • 1
  • 0
  • 1h ago

Overview

  • Microsoft
  • Windows 11 Version 24H2

19 May 2026
Published
21 May 2026
Updated

CVSS v3.1
MEDIUM (6.8)
EPSS
0.09%

KEV

Description

Microsoft is aware of a security feature bypass vulnerability in Windows publicly referred to as &quot;YellowKey&quot;. The proof of concept for this vulnerability has been made public violating coordinated vulnerability best practices. We are issuing this CVE to provide mitigation guidance that can be implemented to protect against this vulnerability until the security update is made available.

Statistics

  • 5 Posts
  • 2 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Neue BitLocker-Lücke "YellowKey": Microsoft bestätigt Zero-Day-Schwachstelle CVE-2026-45585. Angreifer mit physischem Zugriff können verschlüsselte Laufwerke entschlüsseln. #Microsoft #Windows winfuture.de/news,158827.html?

  • 1
  • 1
  • 1
  • 21h ago

Bluesky

Profile picture fallback
Microsoft released mitigations for YellowKey, a zero-day flaw tracked as CVE-2026-45585 that can bypass BitLocker on Windows systems with physical access via USB and WinRE shell access. #YellowKey #BitLocker #WinRE
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
マイクロソフトは、BitLockerのバイパス脆弱性「YellowKey」(CVE-2026-45585)に対する対策を提供しています Microsoft provides mitigation for “YellowKey” BitLocker bypass flaw (CVE-2026-45585) #HelpNetSecurity (May 20) www.helpnetsecurity.com/2026/05/20/y...
  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback
Microsoft has issued a mitigation for the YellowKey BitLocker bypass exploit, identified as CVE-2026-45585.
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • Microsoft
  • Microsoft Defender Antimalware Platform

20 May 2026
Published
21 May 2026
Updated

CVSS v3.1
MEDIUM (4.0)
EPSS
2.27%

Description

Microsoft Defender Denial of Service Vulnerability

Statistics

  • 5 Posts
  • 2 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

I thought there was a bug in EPSS since I couldn't see the score for CVE-2026-45498, but... it's just too new. Released today. Rare not-Patch-Tuesday CVE release for Microsoft. Wonder what's up.

(It's a Microsoft Defender DoS, which, sure, seems bad for an A/V thing, but... it's just DoS according to the CVE and KB.)

(Also the KB says there's no exploitation, but CISA KEV says otherwise... curiouser and curiouser.)

  • 1
  • 1
  • 0
  • 19h ago

Bluesky

Profile picture fallback
~Cisa~ CISA added seven actively exploited vulnerabilities to the KEV catalog, urging immediate remediation. - IOCs: CVE-2026-41091, CVE-2026-45498 - #CISA #KEV #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Microsoft Defender vulnerabilities exploited in the wild (CVE-2026-41091, CVE-2026-45498) 📖 Read more: www.helpnetsecurity.com/2026/05/21/m... #cybersecurity #cybersecuritynews #vulnerability #vulnerabilitydisclosure #Windows @microsoft.com
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Microsoft patched two exploited zero-days in Defender: CVE-2026-41091, a local privilege escalation to SYSTEM, and CVE-2026-45498, a denial-of-service flaw. CISA added both to KEV. #MicrosoftDefender #CVE202641091 #CVE202645498
  • 0
  • 0
  • 0
  • 3h ago
Profile picture fallback
Microsoft patched two actively exploited Defender zero-days, CVE-2026-41091 and CVE-2026-45498. One can grant SYSTEM privileges, while the other can trigger DoS on unpatched Windows devices. #MicrosoftDefender #CISA #Windows الأمنية
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • F5
  • NGINX JavaScript

19 May 2026
Published
20 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.18%

KEV

Description

NGINX JavaScript has a vulnerability when the js_fetch_proxy directive is configured with at least one client-controlled NGINX variable (for example, $http_*, $arg_*, $cookie_*) and a location invoking the ngx.fetch() operation from NGINX JavaScript. An unauthenticated attacker can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR) disabled, code execution is possible. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 3 Posts
  • 1 Interaction

Last activity: 3 hours ago

Bluesky

Profile picture fallback
NGINX CVE-2026-8711: Unauthenticated Attackers Can Hijack Your Web Server via Malicious JavaScript Fetch Requests Introduction: A newly discovered critical vulnerability in the NGINX JavaScript (njs) module, tracked as CVE-2026-8711 with a CVSS v4.0 score of 9.2, allows unauthenticated remote…
  • 0
  • 1
  • 0
  • 3h ago
Profile picture fallback
Scoperta nuova grave falla in NGINX: basta una richiesta HTTP per bloccare il server La vulnerabilità CVE-2026-8711 in NGINX JavaScript njs porta a un errore di heap overflow che ha com... https://www.ilsoftware.it/falla-nginx-javascript-crash-server/
  • 0
  • 0
  • 0
  • 4h ago
Profile picture fallback
~Cybergcca~ CCCS issued 5 advisories, including a critical F5 NGINX flaw and updates for Chrome, HPE, FreePBX, and cPanel. - IOCs: CVE-2026-8711, CVE-2026-31431 - #Patch #ThreatIntel #Vulnerability
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • themefusion
  • Avada (Fusion) Builder

21 May 2026
Published
21 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.10%

KEV

Description

The Avada Builder (fusion-builder) plugin for WordPress is vulnerable to Unauthenticated Remote Code Execution via PHP Function Injection in versions up to and including 3.15.2. This is due to the `wp_conditional_tags` case in `Fusion_Builder_Conditional_Render_Helper::get_value()` passing attacker-controlled values from a base64-decoded JSON blob directly to `call_user_func()` without any allowlist validation. This is exploitable by unauthenticated attackers through the `fusion_get_widget_markup` AJAX endpoint, which is registered for non-privileged (unauthenticated) users via `wp_ajax_nopriv_fusion_get_widget_markup`. The endpoint is protected only by a nonce (`fusion_load_nonce`), but this nonce is generated for user ID 0 and is deterministically exposed in the JavaScript output of any public-facing page containing a Post Cards (`[fusion_post_cards]`) or Table of Contents (`[fusion_table_of_contents]`) element. This makes it possible for unauthenticated attackers to execute arbitrary code on affected sites.

Statistics

  • 2 Posts

Last activity: 3 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: Avada (Fusion) Builder ≤3.15.2 has unauth RCE bug (CVE-2026-6279). Attackers can run PHP via exposed AJAX endpoint. Disable plugin or restrict access ASAP. Patch status: unconfirmed. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture fallback
🚨 Critical WordPress flaw: CVE-2026-6279 impacts Avada Builder with unauthenticated remote code execution (CVSS 9.8). Attackers can abuse exposed AJAX functionality and unsafe PHP calls to fully compromise affected sites. 🔗 basefortify.eu/cve_reports/... #WordPress #CVE #CyberSecurity
  • 0
  • 0
  • 0
  • 3h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

13 May 2026
Published
14 May 2026
Updated

CVSS v4.0
HIGH (7.2)
EPSS
0.06%

KEV

Description

An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access® are not impacted by this vulnerability.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled (Severity: HIGH)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0265
  • 0
  • 0
  • 0
  • 11h ago
Profile picture fallback
Palo Alto PAN-OS CAS Authentication Bypass: The 92 JWT Vulnerability That Can Hand Attackers Your GlobalProtect VPN + Video Introduction: A critical authentication bypass vulnerability, tracked as CVE-2026-0265, has been discovered in Palo Alto Networks’ PAN-OS operating system, which powers its…
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • F5
  • NGINX Plus

13 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.27%

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 2 Posts
  • 3 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

@gzobra @adulau @firstdotorg

Thank you for these kind words!

If you are interested we started to deploy in production the algorithms presented during FIRST CTI in Munich. An example here:

vulnerability.circl.lu/vuln/cv

Click on the "Forecast" tab.

Have a nice day!

  • 2
  • 1
  • 0
  • 1h ago

Bluesky

Profile picture fallback
The latest update for #CyCognito includes "Emerging Threat: (CVE-2026-42945) NGINX Rift Heap Overflow in Rewrite Module" and "Emerging Threat: (CVE-2026-20182) Cisco Catalyst SD-WAN Authentication Bypass". #cybersecurity #AttackSurfaceManagement #EASM https://opsmtrs.com/44Srq0X
  • 0
  • 0
  • 0
  • 9h ago
Showing 1 to 10 of 60 CVEs