24h | 7d | 30d

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 15 Posts
  • 35 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

As I was saying, we're not done with page cache LPEs.

Looks like a third variant just dropped (CVE-2026-46300):
github.com/v12-security/pocs/t
github.com/v12-security/pocs/b

openwall.com/lists/oss-securit

Initial reading is defense against #DirtyFrag mitigates this, too, so perhaps not a full round of updates needed here.

  • 6
  • 3
  • 0
  • 16h ago
Profile picture fallback
Officially lost track of Linux page cache LPE's - see also: "cache invalidation and naming things":

https://github.com/v12-security/pocs/tree/main/fragnesia

This is CVE-2026-46300
  • 2
  • 0
  • 0
  • 15h ago
Profile picture fallback
  • 1
  • 1
  • 1
  • 1h ago
Profile picture fallback

Ich möchte anmerken: Es ist noch nicht Freitag! #Fragnesia

security-tracker.debian.org/tr

  • 1
  • 1
  • 0
  • Last hour
Profile picture fallback

Apparently yet another one of those #DirtyFrag-like vulnerabilities in #Linux, this one called #Fragnesia

CVE-2026-46300

openwall.com/lists/oss-securit

#CopyFail

  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback

et voilà il a reçu son nom de code CVE-2026-46300

  • 0
  • 0
  • 0
  • 15h ago
Profile picture fallback

"New Fragnesia Linux flaw lets attackers gain root privileges"

"[...] Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and tracked as CVE-2026-46300) that allows attackers to run malicious code as root."

bleepingcomputer.com/news/secu

  • 0
  • 0
  • 0
  • Last hour

Bluesky

Profile picture fallback
A new variant of the recent Dirty Frag vulnerability, named Fragnesia (CVE-2026-46300), has been discovered in the Linux XFRM ESP-in-TCP subsystem. Similar to Dirty Frag, Fragnesia exploits a vulnerability in the XFRM ESP-in-TCP subsystem to achieve a memory write primitive in the kernel.
  • 4
  • 6
  • 0
  • 9h ago
Profile picture fallback
Linux distros are rolling out patches for a new high-severity kernel privilege escalation vulnerability (known as Fragnasia and tracked as CVE-2026-46300) that allows attackers to run malicious code as root.
  • 4
  • 4
  • 0
  • Last hour
Profile picture fallback
Officially lost track of Linux page cache LPE's: github.com -> This is CVE-2026-46300 Original->
  • 0
  • 1
  • 0
  • 15h ago
Profile picture fallback
真っ赤やね https://security-tracker.debian.org/tracker/CVE-2026-46300
  • 0
  • 1
  • 0
  • 9h ago
Profile picture fallback
Linux KernelのLPE(ローカル権限昇格)の脆弱性(Fragnesia(CopyFail3): CVE-2026-46300) #security #vulnerability #セキュリティ #脆弱性 #linux #kernel #dirtyflag #lpe #fragnesia #copyfail security.sios.jp/vulnerabilit...
  • 0
  • 0
  • 0
  • 9h ago
Profile picture fallback
Fragnesia (CVE-2026-46300): 无竞争条件的内存任意写入 root 提权漏洞分析 引言 Fragnesia(编号 CVE-2026-46300),亦称 Copy Fail 3.0,是 Linux 内核 XFRM ESP-in-TCP 子系统中新发现的一个本地提权漏洞。与 Dirty Pipe 等传统漏洞不同,Fragnesia 不依赖任何竞争条件,能够实现确定性、高成功率的攻击,任何未经授权的本地用户均可借此稳定获取 root 最高权限。 学习目标 理解 Fragnesia 漏洞的技术原理及其与 Dirty Frag / Copy Fail 漏洞家族的关系…
  • 0
  • 0
  • 0
  • 1h ago
Profile picture fallback
Fragnesia (CVE-2026-46300) enables unprivileged local attackers to corrupt kernel page cache and gain root via the XFRM ESP-in-TCP subsystem.
  • 0
  • 0
  • 0
  • Last hour

Overview

  • F5
  • NGINX Plus

13 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
Pending

KEV

Description

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.

Statistics

  • 7 Posts
  • 37 Interactions

Last activity: Last hour

Fediverse

Profile picture fallback

CVE-2026-42945 Heap-based Buffer Overflow in combined with the linux kernel LPEs is "not great" as we say in the industry.

depthfirst.com/nginx-rift

  • 9
  • 7
  • 0
  • 10h ago
Profile picture fallback

CVE-2026-42945: Possible RCE in NGINX:

depthfirst.com/nginx-rift

Requires a specific regex based rewrite directive like

rewrite ^/users/([0-9]+)/profile/(.*)$ /profile.php?id=$1&tab=$2 last;

my.f5.com/manage/s/article/K00

(Of course also found & published by some AI platform. At least they told F5 first.)

And there's a bunch of other vulns in nginx that just dropped, but good luck keeping track if the list of security advisories contains no dates:

nginx.org/en/security_advisori

  • 7
  • 6
  • 0
  • 4h ago
Profile picture fallback

RE: infosec.exchange/@cR0w/1165688

Plenty of prerequisites but worth looking into.

my.f5.com/manage/s/article/K00

NGINX Plus and NGINX Open Source have a vulnerability in the ngx_http_rewrite_module module. This vulnerability exists when the rewrite directive is followed by a rewrite, if, or set directive and an unnamed Perl-Compatible Regular Expression (PCRE) capture (for example, $1, $2) with a replacement string that includes a question mark (?). An unauthenticated attacker along with conditions beyond its control can exploit this vulnerability by sending crafted HTTP requests. This may cause a heap buffer overflow in the NGINX worker process leading to a restart. Additionally, for systems with Address Space Layout Randomization (ASLR ) disabled, code execution is possible. (CVE-2026-42945)

  • 2
  • 2
  • 0
  • 12h ago
Profile picture fallback

#Nginx CVE-2026-42945

A bug in the ngx_http_rewrite_module lets a remote, unauthenticated attacker corrupt the heap of an NGINX worker process by sending crafted URI. The trigger is a common configuration pattern: a rewrite directive with an unnamed regex capture ($1, $2) and a replacement string that contains a question mark, followed by another rewrite, if, or set directive.

https://depthfirst.com/nginx-rift

  • 2
  • 1
  • 0
  • 9h ago

Bluesky

Profile picture fallback
NGINX Rift: An 18-Year-Old Bug Lets Hackers Hijack One-Third of the Internet's Web Servers Critical NGINX heap overflow (CVE-2026-42945, CVSS 9.2) allows unauthenticated RCE via crafted HTTP requests. Read Details- www.cyberkendra.com/2026/05/ngin... #infosec #security #internet #nginx
  • 1
  • 0
  • 0
  • 13h ago
Profile picture fallback
NGINXのrewrite脆弱性 CVE-2026-42945 「NGINX Rift」は何を確認すべきか | ワルブリックス株式会社 https://www.walbrix.co.jp/article/cve-2026-42945-nginx-rewrite.html
  • 0
  • 0
  • 0
  • 5h ago
Profile picture fallback
Et merde… Nginx, RCE sur le traitement des URI, CVE-2026-42945 Et du nginx on en trouve partout, dont sur vos F5 BigIP 😓 Heureusement le PoC actuel nécessite un contournement d’ASLR ou qu’il soit désactivé mais un poc complet ne saurait tarder. PoC github.com/depthfirstdi... Bonne journée fériée 😭
  • 0
  • 0
  • 0
  • Last hour

Overview

  • Palo Alto Networks
  • Cloud NGFW

06 May 2026
Published
12 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
14.43%

Description

A buffer overflow vulnerability in the User-ID™ Authentication Portal (aka Captive Portal) service of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets. The risk of this issue is greatly reduced if you secure access to the User-ID™ Authentication Portal per the best practice guidelines https://knowledgebase.paloaltonetworks.com/KCSArticleDetail by restricting access to only trusted internal IP addresses. Prisma Access, Cloud NGFW and Panorama appliances are not impacted by this vulnerability.

Statistics

  • 3 Posts
  • 6 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Critical Palo Alto PAN-OS Vulnerability CVE-2026-0300 Actively Exploited — Unauthenticated Root RCE on Firewalls
#CyberSecurity
securebulletin.com/critical-pa

  • 4
  • 0
  • 0
  • 20h ago
Profile picture fallback

Wieder Zero-Day Angriffe gegen Palo Alto Firewall

Und täglich grüßt das Murmeltier. Wieder ein amerikanischer Hersteller von proprietärer Netzwerktechnik, dessen Zero-Day "Sicherheitslücke" (Hintertür) von wahrscheinlich staatlich unterstützten Hackern angegriffen wird. Der Netzwerk-Ausrüster Palo Alto ist und ja schon öfter begegnet. Die CISA hat die Lücke CVE-2026-0300 bereits in den KEV Katalog aufgenommen. Normalerweise bedeutet das eine Anweisung an die Behörden, Updates gegen die betreffende Lücke innerhalb kürzester Frist einzuspielen. Nur dass im vorliegenden

pc-fluesterer.info/wordpress/2

#Allgemein #Empfehlung #Hintergrund #Warnung #0day #closedsource #cybercrime #exploits #firewall #foss #hersteller #hintertr #opensource #router #sicherheit #spionage #UnplugTrump #usa #vorbeugen

  • 1
  • 1
  • 0
  • 1h ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0300 PAN-OS: Unauthenticated user initiated Buffer Overflow Vulnerability in User-ID™ Authentication Portal (Severity: CRITICAL)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0300
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Microsoft
  • Microsoft 365 Apps for Enterprise

12 May 2026
Published
13 May 2026
Updated

CVSS v3.1
HIGH (8.4)
EPSS
0.06%

KEV

Description

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Statistics

  • 3 Posts
  • 4 Interactions

Last activity: 19 hours ago

Fediverse

Profile picture fallback

CVE-2026-40361 - Microsoft Word Remote Code Execution Vulnerability:

msrc.microsoft.com/update-guid

What's next - and RCE in Notepad?

  • 2
  • 0
  • 0
  • 23h ago

Bluesky

Profile picture fallback
CVE-2026-40361 is a zero-click Outlook remote code execution flaw requiring patching to protect enterprise inboxes.
  • 1
  • 0
  • 0
  • 21h ago
Profile picture fallback
Microsoft patched CVE-2026-40361, a critical zero-click Outlook bug that can trigger code execution from just reading or previewing an email. The flaw raises serious risks for enterprise inboxes. #Outlook #ExchangeServer #BadWinmail
  • 1
  • 0
  • 0
  • 19h ago

Overview

  • Microsoft
  • Windows 11 version 22H3

12 May 2026
Published
13 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.07%

KEV

Description

Heap-based buffer overflow in Microsoft Windows DNS allows an unauthorized attacker to execute code over a network.

Statistics

  • 4 Posts
  • 2 Interactions

Last activity: 1 hour ago

Fediverse

Profile picture fallback

Hunting CVE-2026-41096 (Windows DNS Client RCE, CVSS 9.8) in Advanced Hunting?

DeviceProcessEvents
| where Timestamp > ago(7d)
| where InitiatingProcessFileName =~ "svchost.exe"
| where InitiatingProcessCommandLine has_any ("dnscache", "NetworkService")
| where FileName !in~ ("conhost.exe", "WerFault.exe", "wermgr.exe")
| project Timestamp, DeviceName, FileName, ProcessCommandLine
| order by Timestamp desc

  • 0
  • 0
  • 0
  • 17h ago
Profile picture fallback

May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...

captechgroup.com/about-us/thre

  • 1
  • 0
  • 0
  • 19h ago
Profile picture fallback

📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE

Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday

🔗 cyber.netsecops.io

  • 1
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture fallback
CVE-2026-41096: Critical Windows DNS Client Heap Overflow – Remote Code Execution via Rogue DNS Responses + Video Introduction The Windows DNS Client service (dnscache) quietly handles every domain name resolution on a Windows machine, from browser lookups to background update checks. A newly…
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • WebPros
  • cPanel

29 Apr 2026
Published
06 May 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
74.24%

Description

cPanel and WHM versions after 11.40 contain an authentication bypass vulnerability in the login flow that allows unauthenticated remote attackers to gain unauthorized access to the control panel.

Statistics

  • 3 Posts

Last activity: 18 hours ago

Fediverse

Profile picture fallback

Seven FuelCMS CVEs documented. XSS callbacks now show IP and headers. Website Scanner detects exposed private keys passively. Scheduled scan exports. API risk filtering.

Also: free scanner for CVE-2026-41940, the cPanel auth bypass exploited for 64 days before a patch existed. No account needed.

pentest-tools.com/network-vuln

  • 0
  • 0
  • 0
  • 22h ago

Bluesky

Profile picture fallback
Major patches hit SAP Commerce Cloud, SAP S/4HANA, and Apple macOS/iOS, while cPanel CVE-2026-41940 is actively exploited to drop a Filemanager backdoor. #SAP #Apple #Texas
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
Ataque a sistemas cPanel explora falha CVE-2026-41940 para instalar backdoor #ataque #cve #falha
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Google
  • Android

04 May 2026
Published
05 May 2026
Updated

CVSS
Pending
EPSS
0.01%

KEV

Description

In adbd_tls_verify_cert of auth.cpp, there is a possible bypass of wireless ADB mutual authentication due to a logic error in the code. This could lead to remote (proximal/adjacent) code execution as the shell user with no additional execution privileges needed. User interaction is not needed for exploitation.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture fallback

PoC Exploit Released for Android Zero-Click CVE-2026-0073 — Silent ADB Shell Access on Android 14–16
#CyberSecurity
securebulletin.com/poc-exploit

  • 4
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture fallback
Android Zero-Click RCE via Wireless Debugging | CVE-2026-0073 – From Network Access to Full Shell + Video Introduction The Android Debug Bridge (ADB) is a powerful tool for developers, but when its security assumptions fail, it can become a backdoor. CVE-2026-0073 is a critical authentication…
  • 0
  • 0
  • 0
  • 23h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

13 May 2026
Published
14 May 2026
Updated

CVSS v4.0
HIGH (7.2)
EPSS
Pending

KEV

Description

A buffer overflow vulnerability in the IKEv2 processing of Palo Alto Networks PAN-OS® software allows an unauthenticated network-based attacker to execute arbitrary code with elevated privileges on the firewall, or cause a denial of service (DoS) condition. Panorama, Cloud NGFW, and Prisma® Access are not impacted by these vulnerabilities.

Statistics

  • 2 Posts
  • 7 Interactions

Last activity: 13 hours ago

Fediverse

Profile picture fallback

RE: infosec.exchange/@cR0w/1165619

security.paloaltonetworks.com/

This issue requires IKEv2 VPN tunnels that is configured with Post Quantum Cryptography (PQC).

  • 1
  • 6
  • 0
  • 14h ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0263 PAN-OS: Remote Code Execution (RCE) in IKEv2 Processing (Severity: HIGH)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0263
  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Microsoft
  • Windows Server 2012

12 May 2026
Published
13 May 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.09%

KEV

Description

Stack-based buffer overflow in Windows Netlogon allows an unauthorized attacker to execute code over a network.

Statistics

  • 3 Posts
  • 2 Interactions

Last activity: 18 hours ago

Fediverse

Profile picture fallback

May 2026 Patch Tuesday: 137 vulnerabilities across Windows, Office, Exchange, Azure. CVE-2026-41089 (Netlogon buffer overflow) grants SYSTEM on domain controllers with no auth required. CVE-2026-41096 (DNS Client) exploitable...

captechgroup.com/about-us/thre

  • 1
  • 0
  • 0
  • 19h ago
Profile picture fallback

📰 Microsoft's May Patch Tuesday: 137 Flaws Fixed, Including Critical Netlogon RCE

Microsoft's May Patch Tuesday is huge: 137 vulnerabilities fixed, 30 critical. No zero-days for the first time in 22 months! 🚨 Key patches for critical RCEs in Netlogon (CVE-2026-41089) and DNS Client (CVE-2026-41096). Patch now! ✅ #PatchTuesday

🔗 cyber.netsecops.io

  • 1
  • 0
  • 0
  • 18h ago

Bluesky

Profile picture fallback
📢 Patch Tuesday mai 2026 : 118 CVE Microsoft dont 3 critiques, volumes records chez Apple, Google, Mozilla et Oracle 📝 … https://cyberveille.ch/posts/2026-05-13-patch-tuesday-mai-2026-118-cve-microsoft-dont-3-critiques-volumes-records-chez-apple-google-mozilla-et-oracle/ #CVE_2026_41089 #Cyberveille
  • 0
  • 0
  • 0
  • 18h ago

Overview

  • Palo Alto Networks
  • Cloud NGFW

13 May 2026
Published
14 May 2026
Updated

CVSS v4.0
HIGH (7.2)
EPSS
Pending

KEV

Description

An authentication bypass vulnerability in Palo Alto Networks PAN-OS® software enables an unauthenticated attacker with network access to bypass authentication controls when Cloud Authentication Service (CAS) is enabled. The risk is higher if CAS is enabled on the management interface and lower when any other login interfaces are used. The risk of this issue is greatly reduced if you secure access to the management web interface by restricting access to only trusted internal IP addresses according to our recommended best practice deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 . This issue is applicable to PAN-OS software on PA-Series and VM-Series firewalls and on Panorama (virtual and M-Series). Cloud NGFW and Prisma Access® are not impacted by this vulnerability.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 13 hours ago

Bluesky

Profile picture fallback
Paloaltoの脆弱性情報 「CVE-2026-0265 PAN-OS: Authentication Bypass with Cloud Authentication Service (CAS) enabled (Severity: HIGH)」が公開されました。 → https://security.paloaltonetworks.com/CVE-2026-0265
  • 0
  • 0
  • 0
  • 13h ago
Showing 1 to 10 of 79 CVEs