24h | 7d | 30d

Overview

  • Linux
  • Linux

15 May 2026
Published
16 May 2026
Updated

CVSS
Pending
EPSS
0.02%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: ptrace: slightly saner 'get_dumpable()' logic The 'dumpability' of a task is fundamentally about the memory image of the task - the concept comes from whether it can core dump or not - and makes no sense when you don't have an associated mm. And almost all users do in fact use it only for the case where the task has a mm pointer. But we have one odd special case: ptrace_may_access() uses 'dumpable' to check various other things entirely independently of the MM (typically explicitly using flags like PTRACE_MODE_READ_FSCREDS). Including for threads that no longer have a VM (and maybe never did, like most kernel threads). It's not what this flag was designed for, but it is what it is. The ptrace code does check that the uid/gid matches, so you do have to be uid-0 to see kernel thread details, but this means that the traditional "drop capabilities" model doesn't make any difference for this all. Make it all make a *bit* more sense by saying that if you don't have a MM pointer, we'll use a cached "last dumpability" flag if the thread ever had a MM (it will be zero for kernel threads since it is never set), and require a proper CAP_SYS_PTRACE capability to override.

Statistics

  • 5 Posts
  • 139 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

New stable kernels landed today in Alpine Linux. They address ssh-keysign-pwn (CVE-2026-46333)

- 6.18.31
- 6.12.89
- 6.6.139
- 6.1.173
- 5.15.207

These have been backported all the way down to Alpine Linux 3.16.

Edit: These versions fix ssh-keysign-pwn, not Fragnesia

  • 63
  • 67
  • 0
  • 15h ago
Profile picture fallback

Looks like a new kernel, patched for CVE-2026-46333, has arrived for #Debian #Linux
lists.debian.org/debian-securi

  • 3
  • 5
  • 0
  • 21h ago
Profile picture fallback

Kernel-Updates am Morgen vertreiben Kummer und Sorgen. 😇

security-tracker.debian.org/tr

  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Microsoft
  • Microsoft Exchange Server 2016 Cumulative Update 23

14 May 2026
Published
16 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
12.34%

Description

Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.

Statistics

  • 13 Posts
  • 3 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

Explotan vulnerabilidad CVE-2026-42897 en Microsoft Exchange Server local mediante correos manipulados

blog.elhacker.net/2026/05/expl

  • 0
  • 1
  • 0
  • 9h ago
Profile picture fallback

Microsoft Exchange Server Spoofing Vulnerability

msrc.microsoft.com/update-guid

  • 0
  • 1
  • 0
  • 6h ago
Profile picture fallback

CVE-2026-42897 exploits improper HTML sanitization in OWA, allowing JavaScript execution within the email rendering context. The script inherits authentication tokens, accesses the full DOM, and can read emails, harvest...

captechgroup.com/about-us/thre

  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback

Microsoft has released mitigations for a high-severity Microsoft Exchange Server vulnerability that is being actively exploited in attacks.

The flaw enables threat actors to execute arbitrary code through a cross-site scripting (XSS) attack targeting Outlook on the web users.

Tracked as CVE-2026-42897, the vulnerability affects Exchange Server 2016, Exchange Server 2019, and Exchange Server Subscription Edition (SE).

  • 0
  • 0
  • 0
  • 13h ago
Profile picture fallback

Recent reports (May 15-16, 2026): Foxconn's N. American operations were hit by Nitrogen ransomware, exfiltrating client infrastructure maps. OpenAI confirmed a supply chain attack on employee devices. Microsoft warned of an actively exploited Exchange Server zero-day (CVE-2026-42897).

#Cybersecurity #AnonNews_irc #News

  • 0
  • 0
  • 0
  • 8h ago
Profile picture fallback

**Global Briefing: May 17, 2026**

Geopolitical: The US extended the Israel-Lebanon ceasefire by 45 days. Russia and Ukraine completed a 205-for-205 prisoner exchange.

Technology: Tech stocks experienced a downturn as April's CPI exceeded expectations. xAI has officially launched Grok Build, its first AI coding agent.

Cybersecurity: A critical Microsoft Exchange zero-day vulnerability (CVE-2026-42897) is under active exploitation, targeting Outlook Web Access. Canada's Bill C-22, related to lawful access, faces strong opposition from tech giants over encryption concerns.

#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture fallback
CVE-2026-42897 is exploited in on-prem Exchange; crafted emails enable spoofing, forcing urgent mitigation.
  • 0
  • 1
  • 0
  • 19h ago
Profile picture fallback
CVE-2026-42897: CISA warnt vor aktiv ausgenutzter XSS-Lücke in Microsoft Exchange Server www.all-about-security.de/cve-2026-428... #cve #itsecurity #microsoft
  • 0
  • 0
  • 0
  • 18h ago
Profile picture fallback
Zero-Day Alert: CVE-2026-42897 Turns Exchange Servers Into Silent Cyber Weapons—No Patch in Sight + Video Introduction: A zero-day vulnerability in Microsoft Exchange Server, tracked as CVE-2026-42897 with a CVSS score of 8.1, is being actively exploited in the wild. The flaw resides in improper…
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • F5
  • NGINX Plus

13 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.17%

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 6 Posts
  • 5 Interactions

Last activity: 8 hours ago

Fediverse

Profile picture fallback

And of course we're covering it at IFIN and I knew that because I read it all the time. Right? RIGHT??

discourse.ifin.network/t/cve-2

  • 0
  • 2
  • 0
  • 23h ago
Profile picture fallback

🚨 PoC code for CRITICAL NGINX vuln (CVE-2026-42945) now public! Heap buffer overflow in ngx_http_rewrite_module — can cause DoS or RCE if ASLR is disabled. Patch NGINX Plus/open source ASAP. radar.offseq.com/threat/poc-co

  • 0
  • 2
  • 0
  • 16h ago
Profile picture fallback

Recent News: Nitrogen ransomware breached Foxconn's North American operations, exfiltrating 8TB of data, including Apple and Nvidia network maps (May 15). A critical NGINX vulnerability (CVE-2026-42945) with public PoC exploit code was patched on May 16. Geopolitically, the US-China summit addressed trade, Taiwan, and Nvidia AI chips. Concurrently, Trump's diplomatic efforts with Iran remain at a stalemate.

#Cybersecurity #Geopolitics #TechNews

  • 0
  • 0
  • 0
  • 8h ago

Bluesky

Profile picture fallback
PoC code is now public for CVE-2026-42945, a critical NGINX heap buffer overflow in ngx_http_rewrite_module that can cause DoS and, with ASLR off, possible RCE. #NGINX #F5 #CVE202642945
  • 1
  • 0
  • 0
  • 14h ago
Profile picture fallback
CVE-2026-42945 enables heap buffer overflow in NGINX rewrite module, causing DoS and potential RCE when ASLR is disabled.
  • 0
  • 0
  • 0
  • 16h ago

Overview

  • Cisco
  • Cisco Catalyst SD-WAN Manager

14 May 2026
Published
15 May 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
37.95%

Description

May 2026: This security advisory provides the details and fix information for a vulnerability that was discovered and fixed after the was disclosed in February 2026. This new advisory is for a new vulnerability in the control connection handshaking. The section of this advisory includes Show Control Connections guidance to help with system checks.  A vulnerability in the peering authentication in Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to the affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric.

Statistics

  • 4 Posts
  • 1 Interaction

Last activity: 11 hours ago

Fediverse

Profile picture fallback

CISA incluye la vulnerabilidad CVE-2026-20182 de Cisco SD-WAN en su catálogo de vulnerabilidades explotadas tras ataques al acceso de administrador

blog.elhacker.net/2026/05/cisa

  • 0
  • 1
  • 0
  • 11h ago
Profile picture fallback

Latest Geopolitical, Technology, and Cybersecurity News (May 15-16, 2026):

Geopolitical: Trump-Xi talks ended without major breakthroughs. The US canceled troop deployment to Poland amid a rift with Germany over Iran war fatigue. Taiwan plans HIMARS deployment.

Technology: Quantum computing advancements raise dual-use security challenges; AI military systems are under global debate. OpenAI debuted personal finance tools for ChatGPT Pro.

Cybersecurity: NIST is advancing post-quantum cryptography standards. Cisco patched its sixth SD-WAN zero-day of 2026 (CVE-2026-20182). The Turla group deployed its Kazuar P2P botnet.

#AnonNews_irc #Cybersecurity #News

  • 0
  • 0
  • 0
  • 19h ago

Bluesky

Profile picture fallback
Rapid7 researchers Stephen Fewer and Jonah Burgess disclosed CVE-2026-20182, a maximum severity (CVSS 10.0) vulnerability in the Cisco Catalyst SD-WAN Controller. #cisco #catalyst #vulnerability www.rapid7.com/blog/post/tr...
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
CVE-2026-20182: Critical authentication bypass in Cisco Catalyst SD-WAN Controller (FIXED)
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Microsoft
  • Microsoft 365 Apps for Enterprise

12 May 2026
Published
15 May 2026
Updated

CVSS v3.1
HIGH (8.4)
EPSS
0.06%

KEV

Description

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 17 hours ago

Bluesky

Profile picture fallback
💥 Outlook - Faille zéro clic Le Patch Tuesday de mai 2026 publié par Microsoft corrige une faille de type zero-click affectant Outlook (et Word) : CVE-2026-40361. Voici comment se protéger. - www.it-connect.fr/outlook-cve-... #outlook #infosec #microsoft
  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Microsoft
  • Windows 10 Version 20H2

09 Dec 2020
Published
16 May 2026
Updated

CVSS v3.1
HIGH (7.0)
EPSS
0.52%

KEV

Description

Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability

Statistics

  • 2 Posts
  • 8 Interactions

Last activity: 3 hours ago

Fediverse

Profile picture fallback

Looks like CVE-2020-17103 wasn't patched correctly, or the patched was accidentally rolled back by someone at Microsoft

github.com/Nightmare-Eclipse/M

  • 5
  • 3
  • 1
  • 3h ago

Overview

  • MervinPraison
  • PraisonAI

08 May 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (7.3)
EPSS
0.07%

KEV

Description

PraisonAI is a multi-agent teams system. From version 2.5.6 to before version 4.6.34, PraisonAI ships a legacy Flask API server with authentication disabled by default. When that server is used, any caller that can reach it can access /agents and trigger the configured agents.yaml workflow through /chat without providing a token. This issue has been patched in version 4.6.34.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

CVE-2026-44338: PraisonAI Framework Actively Exploited Within Hours of Disclosure — No Auth Required
#CyberSecurity
securebulletin.com/cve-2026-44

  • 5
  • 0
  • 0
  • 15h ago

Overview

  • Amazon
  • Amazon Redshift JDBC Driver

08 May 2026
Published
08 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.09%

KEV

Description

An issue exists in Amazon Redshift JDBC Driver versions prior to 2.2.2. Under certain conditions, the driver could load and execute arbitrary classes when processing JDBC connection URL parameters. An actor who can influence the connection URL could potentially execute code in the application context, provided a suitable class is available on the application's classpath. To mitigate this issue, users should upgrade to version 2.2.2 or later.

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 15 hours ago

Fediverse

Profile picture fallback

CVE-2026-8178: Critical Amazon Redshift JDBC Driver Flaw Enables RCE via Malicious Connection URLs — Patch Now
#CyberSecurity
securebulletin.com/cve-2026-81

  • 5
  • 0
  • 0
  • 15h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 12 Interactions

Last activity: 17 hours ago

Fediverse

Profile picture fallback

🚀 FrankenPHP 1.12.3 is out with a nice performance boost!

A refreshed PGO profile delivers a 7–8% throughput bump for baseline HTTP requests right out of the box.

This release also patches a critical security flaw (CVE-2026-45062, CVSS 8.1) via unsafe Unicode handling in CGI path splitting. Upgrading from v1.11.2–v1.12.2 is highly recommended.

Ships with:
• Per-thread max_requests
• Stuck thread force-kill primitive
• SLSA build attestations

Release notes: github.com/php/frankenphp/rele

#PHP

  • 4
  • 8
  • 0
  • 17h ago

Overview

  • Linux
  • Linux

08 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Statistics

  • 1 Post
  • 8 Interactions

Last activity: 6 hours ago

Fediverse

Profile picture fallback

Why you should always prefer Debian over Ubuntu:

Ubuntu: ubuntu.com/security/CVE-2026-4: Needs evaluation

Debian: security-tracker.debian.org/tr: fixed

#debian #ubuntu #security

  • 4
  • 4
  • 0
  • 6h ago
Showing 1 to 10 of 34 CVEs