24h | 7d | 30d

Overview

  • Palo Alto Networks
  • Cloud NGFW

06 May 2026
Published
07 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
14.90%

Description

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

Statistics

  • 20 Posts
  • 2 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

So this PAN-OS bug, CVE-2026-0300.

Is there a good reason to expose this User-ID Authentication Portal to the internet in the first place? Yes yes, defend against insider threats and all that, but the opportunistic, across-the-ocean attack seems like it relies more on misconfiguration than anything.

It doesn't seem to be very useful to associate a user identity to an internet-based IP address in the first place, so don't do that? Or am I wildly misunderstanding the utility here? (At first I thought it was like a capture portal like you find on hotel WiFi, but it's more specialized than that I think.)

Regardless, @runZeroInc has a Rapid Response out for it now. No Palo Alto patches available yet.

runzero.com/blog/palo-alto-net

  • 1
  • 1
  • 0
  • 23h ago
Profile picture fallback

CVE Record: CVE-2026-0300 - Title: PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal

cve.org/CVERecord?id=CVE-2026-

  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback

🚨 CVE-2026-0300: CRITICAL PAN-OS vuln in PA-Series & VM-Series. Buffer overflow in User-ID Auth Portal enables unauth RCE as root. Restrict portal access ASAP. Prisma Access & Cloud NGFW not impacted. Details: radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 14h ago
Profile picture fallback

CVE-2026-0300: Zero-Day in PAN-OS erlaubt unauthentifizierten Root-Zugriff auf Palo Alto Firewalls

Eine aktiv ausgenutzte Schwachstelle im User-ID-Authentifizierungsportal von PAN-OS erlaubt Angreifern ohne Zugangsdaten die vollständige Übernahme betroffener Firewalls – Patches stehen noch nicht flächendeckend bereit.

all-about-security.de/cve-2026

#patch #cve #PANOS #rootzugriff #firewall #PaloAlto #zeroday

  • 0
  • 0
  • 1
  • 10h ago
Profile picture fallback

"Limited exploitation has been observed targeting Palo Alto Networks User-ID™ Authentication Portals" - Remember kids, "limited exploitation" means at least one customer hasn't been exploited at the time of publication!

Also, Palo Alto, who recently told* us "AI changes everything, assume all OSS is compromised" have a buffer overflow based unauthenticated root RCE in their captive portal

security.paloaltonetworks.com/

* mastodon.social/@reedmideke/11

  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback

📰 Critical Palo Alto Networks Zero-Day (CVE-2026-0300) Actively Exploited for RCE

🚨 CRITICAL ZERO-DAY: Palo Alto Networks warns of an unpatched, actively exploited RCE vulnerability (CVE-2026-0300) in PAN-OS firewalls. The flaw allows root access via the User-ID portal. Mitigate immediately! #CyberSecurity #ZeroDay #PANOS

🔗 cyber.netsecops.io

  • 0
  • 0
  • 0
  • 2h ago

Bluesky

Profile picture fallback
📢 Zero-day critique CVE-2026-0300 dans PAN-OS exploité contre des firewalls Palo Alto 📝 ## 🗓️ Contexte Publié le 6 mai 2026 par Eduard Kovacs sur … https://cyberveille.ch/posts/2026-05-06-zero-day-critique-cve-2026-0300-dans-pan-os-exploite-contre-des-firewalls-palo-alto/ #CVE_2026_0300 #Cyberveille
  • 0
  • 0
  • 1
  • 23h ago
Profile picture fallback
~Cisa~ CISA added actively exploited CVE-2026-0300 (PAN-OS out-of-bounds write) to the KEV catalog. - IOCs: CVE-2026-0300 - #CVE2026_0300 #PaloAlto #ThreatIntel
  • 0
  • 0
  • 0
  • 20h ago
Profile picture fallback
Palo Alto warns of critical software bug used in firewall attacks A patch for the bug, tracked as CVE-2026-0300, has not been published yet and Palo Alto Networks said it will be included in releases over the next two weeks.
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (May 6) CVE-2026-0300 Palo Alto Networks PAN-OS 境界外書き込みの脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
Palo Altoファイアウォールにおけるルートレベルのリモートコード実行(RCE)脆弱性が悪用される(CVE-2026-0300) Root-level RCE vulnerability in Palo Alto firewalls exploited (CVE-2026-0300) #HelpNetSecurity (May 6) www.helpnetsecurity.com/2026/05/06/p...
  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback
🔥 Palo Alto Networks - Zero-Day Palo Alto Networks alerte sur une nouvelle zero-day déjà exploitée (CVE-2026-0300) Ma publication à ce sujet 👇 - www.it-connect.fr/palo-alto-ne... #paloalto #zeroday #firewall #infosec
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
CVE-2026-0300 Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability
  • 0
  • 0
  • 0
  • 10h ago
Profile picture fallback
PAN-OS : Vulnérabilité critique (CVE-2026-0300) = risque ROOT. 💥 Ne laissez pas une faille compromettre votre infra ! Découvrez les mesures urgentes à prendre. 🛡️ [Lien vers l'article] [lire]
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
PAN-OSのRCEゼロデイが攻撃に悪用される:パロアルトが警告(CVE-2026-0300) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45477/
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
PAN-OS en danger ! 💥 CVE-2026-0300 ouvre la porte au contrôle root. Ne tardez pas : découvrez les actions défensives *immédiates* pour protéger votre réseau. 🛡️ [Lien vers l'article] [lire]
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal URL: security.paloaltonetworks.com/CVE-2026-0300 Classification: Critical, Solution: Workaround, Exploit Maturity: Functional, CVSSv3.1: 9.3
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Linux
  • Linux

22 Apr 2026
Published
07 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
3.91%

Description

In the Linux kernel, the following vulnerability has been resolved: crypto: algif_aead - Revert to operating out-of-place This mostly reverts commit 72548b093ee3 except for the copying of the associated data. There is no benefit in operating in-place in algif_aead since the source and destination come from different mappings. Get rid of all the complexity added for in-place operation and just copy the AD directly.

Statistics

  • 9 Posts
  • 27 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Cómo comprobar y mitigar la vulnerabilidad Copy Fail (CVE-2026-31431) en GNU/Linux
voidnull.es/como-comprobar-y-m

  • 1
  • 3
  • 0
  • 15h ago
Profile picture fallback

Copy-Fail? More like Copy-Fixed. 🛑

At @DE-CIX, our customers depend on our availability and integrity. So when the Linux "Copy-Fail" vulnerability popped up, we took it super seriously and patched things up immediately.

During the mitigation process, one of our system engineers identified a completely alternative way to block the vulnerability using ftrace. Because it’s been supported in the kernel since 2013, it’s an incredibly accessible solution.

👉 github.com/philfry/cve-2026-31

  • 1
  • 1
  • 0
  • 1h ago
Profile picture fallback

A nine-year Linux kernel bug is being actively exploited right now. CVE-2026-31431 (Copy Fail) gives any unprivileged local user a root shell. Works every time. Leaves no trace on disk. Patch status + fixes for Proxmox, Debian, and more in the video.

➡️➡️ Watch Here: youtu.be/LwqEUiuXmbg

  • 0
  • 1
  • 0
  • 4h ago
Profile picture fallback

CISA warns: CopyFail Linux vuln exploited.
• Privilege escalation → root
• Impacts major distros
• Patch deadline May 15

technadu.com/cisa-warns-of-sev

Are you patched?

  • 0
  • 0
  • 0
  • 23h ago

Bluesky

Profile picture fallback
CVE-2026-31431: Copy Fail vs. rootless containers https://www.dragonsreach.it/2026/05/04/cve-2026-31431-copy-fail-rootless-containers/ (http://news.ycombinator.com/item?id=48017813)
  • 0
  • 0
  • 0
  • 21h ago
Profile picture fallback
#CopyFail has been added to the CISA KEV; and it's an AppSec consideration that too many practitioners are ignoring. The Linux vulnerability (CVE-2026-31431) can allow for privesc from unprivileged to root, and is seeing active exploitation.
  • 0
  • 0
  • 0
  • 19h ago
Profile picture fallback
Linuxの脆弱性対策について(CVE-2026-31431、Copy Fail) #IPA (May 1) www.ipa.go.jp/security/sec...
  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (May 1) CVE-2026-31431 Linuxカーネルにおけるスフィア間の不適切なリソース転送の脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Apache Software Foundation
  • Apache HTTP Server

04 May 2026
Published
05 May 2026
Updated

CVSS
Pending
EPSS
0.06%

KEV

Description

Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

Statistics

  • 5 Posts
  • 7 Interactions

Last activity: 4 hours ago

Fediverse

Profile picture fallback

Mocne odkrycie - RCE bez uwierzytelnienia w serwerze Apache znalezione przez Bartłomieja Dmitruka ze striga.ai (detektor błędów oparty na AI) oraz Stanisława Strzałkowskiego z ISEC.pl. Na serwerze musi być włączone mod_http2 - ale na wielu jest.

cve.org/CVERecord?id=CVE-2026-
httpd.apache.org/security/vuln

  • 3
  • 3
  • 0
  • 21h ago

Bluesky

Profile picture fallback
Apache HTTP/2の重大な脆弱性(CVE-2026-23918)により、DoS攻撃およびリモートコード実行の可能性が生じる Apache HTTP/2の重大な脆弱性(CVE-2026-23918)により、DoS攻撃およびリモートコード実行の可能性が生じる #HackerNews (May 5) thehackernews.com/2026/05/crit...
  • 0
  • 1
  • 0
  • 15h ago
Profile picture fallback
Vulnerabilidad crítica en Apache expone a millones de servidores a ataques RCE. Se ha parchado una vulnerabilidad grave (CVE-2026-23918) que permite la Ejecución Remota de Código (RCE) aprovechando un fallo en HTTP/2. #ciberseguridad #cybersecurity www.linkedin.com/pulse/vulner...
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
Critical Apache HTTP/2 Flaw (CVE-2026-23918) Enables DoS and Potential RCE https://thehackernews.com/2026/05/critical-apache-http2-flaw-cve-2026.html
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Apache fixes critical HTTP/2 double-free flaw CVE-2026-23918 enabling RCE
  • 0
  • 0
  • 0
  • 4h ago

Overview

  • GitHub
  • Enterprise Server

10 Mar 2026
Published
29 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.30%

KEV

Description

An improper neutralization of special elements vulnerability was identified in GitHub Enterprise Server that allowed an attacker with push access to a repository to achieve remote code execution on the instance. During a git push operation, user-supplied push option values were not properly sanitized before being included in internal service headers. Because the internal header format used a delimiter character that could also appear in user input, an attacker could inject additional metadata fields through crafted push option values. This vulnerability was reported via the GitHub Bug Bounty program and has been fixed in GitHub Enterprise Server versions 3.14.25, 3.15.20, 3.16.16, 3.17.13, 3.18.7 and 3.19.4.

Statistics

  • 3 Posts
  • 14 Interactions

Last activity: 2 hours ago

Fediverse

Profile picture fallback

So, #GitHub is having a rough go of it lately. With significant instability and frequent outages in the last month and platform uptime dropping below 85%.

But the most fun trick? Any authenticated user could execute arbitrary commands on GitHub's backend servers with a single git push command - using nothing but a standard git client. (Because their architecture didn’t sterilize semicolons, thus prompt injection.)

On GitHub Enterprise Server, the vulnerability grants full server compromise, including access to all hosted repositories and internal secrets.

GitHub Enterprise Server customers should upgrade ASAP. Wiz dot io data indicates that 88% of instances were still vulnerable.

wiz.io/blog/github-rce-vulnera

#infosec #live #githubEnterprise #rce

  • 9
  • 5
  • 0
  • 22h ago
Profile picture fallback

GitHub Enterprise Server: Immediate action required!

Upgrade to #GHES version 3.19.3 or later - this release patches #CVE-2026-3854

wiz.io/blog/github-rce-vulnera

  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback

@DrHyde To put a fine point on it: GitHub's status page showed nothing alarming on April 23—no major outage, no partial outage—because its calculus excludes "Degraded Performance" from downtime numbers. The platform never went down; it was just silently producing wrong merge results, corrupting repository history across 230 organizations and about 3,000 pull requests. That's not a blip. That's a data integrity failure.

Here's GitHub's own heavily-spun blog post on the matter (which also covers another incident on April 27).

Bonus: Five days after the merge queue incident, GitHub disclosed CVE-2026-3854, a critical remote code execution vulnerability where a crafted git push could execute code on GitHub's servers. Patched on github.com in 75 minutes, but 88% of GitHub Enterprise Server instances were still exposed when the disclosure went public.

One bad week doesn't explain a year of red squares, but it does crystallize the pattern.

/cc @choroba

  • 0
  • 0
  • 0
  • 2h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 2 Posts

Last activity: 18 hours ago

Bluesky

Profile picture fallback
Bishop Fox researchers reproduced CVE-2026-42208, a critical pre-authentication SQL injection in LiteLLM’s proxy. Exploitation was observed in the wild roughly 36 hours after disclosure. If you’re running LiteLLM, upgrade to 1.83.7+.
  • 0
  • 0
  • 0
  • 22h ago
Profile picture fallback
📢 CVE-2026-42208 : Injection SQL pré-authentification critique dans LiteLLM Proxy 📝 ## 🔍 Contexte Bishop Fox a publié le 6 mai 2026 une analyse techni… https://cyberveille.ch/posts/2026-05-06-cve-2026-42208-injection-sql-pre-authentification-critique-dans-litellm-proxy/ #CVE_2026_42208 #Cyberveille
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Revolution Slider
  • Slider Revolution

07 May 2026
Published
07 May 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.10%

KEV

Description

The Slider Revolution plugin for WordPress is vulnerable to Arbitrary File Upload in versions 7.0.0 to 7.0.10 via the '_get_media_url' and '_check_file_path' function. This is due to insufficient file type validation. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload files that may be executable, which makes remote code execution possible. The vulnerability was partially patched in version 7.0.10 and fully patched in version 7.0.11.

Statistics

  • 2 Posts

Last activity: 5 hours ago

Bluesky

Profile picture fallback
⚠️ WordPress : le plugin Slider Revolution doit être mis à jour (CVE-2026-6692) Plus d'infos par ici : - www.it-connect.fr/wordpress-le... #wordpress #infosec #web
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • D-Link
  • DNS-320L

04 Apr 2024
Published
21 Oct 2025
Updated

CVSS v3.1
HIGH (7.3)
EPSS
94.42%

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, was found in D-Link DNS-320L, DNS-325, DNS-327L and DNS-340L up to 20240403. Affected is an unknown function of the file /cgi-bin/nas_sharing.cgi of the component HTTP GET Request Handler. The manipulation of the argument system leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-259284. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

Statistics

  • 1 Post
  • 8 Interactions

Last activity: 20 hours ago

Fediverse

Profile picture fallback

pyghidra-mcp v0.2.0 is out with new --gui mode. 👀

Your local LLM drives a real Ghidra CodeBrowser, not a plugin.

New blog post shows firmware RE of the CVE-2024-3273 RCE chain with Gemma4.

clearbluejar.github.io/posts/p

  • 5
  • 3
  • 0
  • 20h ago

Overview

  • ollama
  • ollama
  • ollama/ollama

04 May 2026
Published
04 May 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.09%

KEV

Description

Ollama before 0.17.1 contains a heap out-of-bounds read vulnerability in the GGUF model loader. The /api/create endpoint accepts an attacker-supplied GGUF file in which the declared tensor offset and size exceed the file's actual length; during quantization in fs/ggml/gguf.go and server/quantization.go (WriteTo()), the server reads past the allocated heap buffer. The leaked memory contents may include environment variables, API keys, system prompts, and concurrent users' conversation data, and can be exfiltrated by uploading the resulting model artifact through the /api/push endpoint to an attacker-controlled registry. The /api/create and /api/push endpoints have no authentication in the upstream distribution. Default deployments bind to 127.0.0.1, but the documented OLLAMA_HOST=0.0.0.0 configuration is widely used in practice (large public-internet exposure observed).

Statistics

  • 1 Post
  • 5 Interactions

Last activity: 7 hours ago

Bluesky

Profile picture fallback
Una vulnerabilitat al GGUF, el format obert que empaqueta models d'IA en un sol fitxer i que Ollama utilitza, exposa prompts, missatges i variables d'entorn d'unes 300.000 instàncies exposades a internet. Puntuació 9.3/10 (CVE-2026-7482). www.securityweek.com/critical-bug...
  • 3
  • 2
  • 0
  • 7h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Krytyczna podatność bezpieczeństwa CVE-2026-5757 w Ollamie pozwala na wykradanie danych z serwerów za pomocą specjalnie spreparowanych plików GGUF. Luka ta wykorzystuje brak walidacji metadanych w mechanizmie kwantyzacji, co może prowadzić do nieautoryzowanego dostępu do wrażliwych informacji.

#si #ai #sztucznainteligencja #wiadomości #informacje #technologia

aisight.pl/cyberbezpieczenstwo

  • 1
  • 0
  • 0
  • 1h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
06 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
64.28%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 15 hours ago

Bluesky

Profile picture fallback
CISAが既知の悪用された脆弱性を1件カタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Apr 30) CVE-2026-41940 WebPros cPanel & WHMおよびWP2(WordPress Squared)における重要機能の認証欠落の脆弱性 www.cisa.gov/news-events/...
  • 0
  • 1
  • 0
  • 15h ago
Showing 1 to 10 of 68 CVEs