24h | 7d | 30d

Overview

  • PackageKit
  • PackageKit

22 Apr 2026
Published
22 Apr 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.22%

KEV

Description

PackageKit is a a D-Bus abstraction layer that allows the user to manage packages in a secure way using a cross-distro, cross-architecture API. PackageKit between and including versions 1.0.2 and 1.3.4 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition on transaction flags that allows unprivileged users to install packages as root and thus leads to a local privilege escalation. This is patched in version 1.3.5. A local unprivileged user can install arbitrary RPM packages as root, including executing RPM scriptlets, without authentication. The vulnerability is a TOCTOU race condition on `transaction->cached_transaction_flags` combined with a silent state-machine guard that discards illegal backward transitions while leaving corrupted flags in place. Three bugs exist in `src/pk-transaction.c`: 1. Unconditional flag overwrite (line 4036): `InstallFiles()` writes caller-supplied flags to `transaction->cached_transaction_flags` without checking whether the transaction has already been authorized/started. A second call blindly overwrites the flags even while the transaction is RUNNING. 2. Silent state-transition rejection (lines 873–882): `pk_transaction_set_state()` silently discards backward state transitions (e.g. `RUNNING` → `WAITING_FOR_AUTH`) but the flag overwrite at step 1 already happened. The transaction continues running with corrupted flags. 3. Late flag read at execution time (lines 2273–2277): The scheduler's idle callback reads cached_transaction_flags at dispatch time, not at authorization time. If flags were overwritten between authorization and execution, the backend sees the attacker's flags.

Statistics

  • 1 Post
  • 7 Interactions

Last activity: 12 hours ago

Fediverse

Profile picture fallback

Pack2TheRoot : une faille vieille de 12 ans offre les clés de votre Linux à n’importe qui goodtech.info/pack2theroot-fai #Sécurité #Àlaune

  • 5
  • 2
  • 0
  • 12h ago

Overview

  • Tenda
  • HG10

25 Apr 2026
Published
25 Apr 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
Pending

KEV

Description

A flaw has been found in Tenda HG10 HG7_HG9_HG10re_300001138_en_xpon. This issue affects the function formRoute of the file /boaform/formRouting of the component Boa Service. This manipulation of the argument nextHop causes buffer overflow. It is possible to initiate the attack remotely. The exploit has been published and may be used.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 3 hours ago

Fediverse

Profile picture fallback

⚠️ HIGH severity: Tenda HG10 (HG7_HG9_HG10re_300001138_en_xpon) buffer overflow via Boa Service (formRoute). Remote RCE/DoS risk. Exploit public, patch pending. Restrict access & monitor Tenda updates. CVE-2026-6988 radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 3h ago

Overview

  • simple-git

25 Apr 2026
Published
25 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
0.08%

KEV

Description

Versions of the package simple-git before 3.36.0 are vulnerable to Remote Code Execution (RCE) due to an incomplete fix for [CVE-2022-25912](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-3112221) that blocks the -c option but not the equivalent --config form. If untrusted input can reach the options argument passed to simple-git, an attacker may still achieve remote code execution by enabling protocol.ext.allow=always and using an ext:: clone source.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 23 hours ago

Fediverse

Profile picture fallback

🚩 CRITICAL: CVE-2026-6951 in simple-git <3.36.0 enables remote code execution via untrusted input to the options argument. Upgrade or block untrusted input! Impact: full system compromise. More: radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 23h ago

Overview

  • Ericsson
  • CodeChecker

24 Apr 2026
Published
24 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.05%

KEV

Description

CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. Authentication bypass occurs when the URL ends with Authentication with certain function calls.  This bypass allows assigning arbitrary permission to any user existing in CodeChecker. This issue affects CodeChecker: through 6.27.3.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 18 hours ago

Fediverse

Profile picture fallback

Ericsson CodeChecker (≤6.27.3) is vulnerable to CRITICAL auth bypass (CVE-2026-25660). Attackers can assign permissions via crafted URLs. Restrict access & monitor for changes. Patch not yet available. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 18h ago

Overview

  • Google
  • Chrome

23 Apr 2026
Published
24 Apr 2026
Updated

CVSS
Pending
EPSS
0.11%

KEV

Description

Use after free in DevTools in Google Chrome prior to 147.0.7727.117 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 17 hours ago

Fediverse

Profile picture fallback

@andrewnez hm, is that search correct? The 343 on linked NVD page seems to include e.g. CVE-2026-6919 which isnt really related?

It's not an in any way relevant difference (4 false associations) but now I am really curious why those are associated....

  • 0
  • 1
  • 0
  • 17h ago

Overview

  • Microsoft
  • Microsoft 365 Apps for Enterprise

26 Jan 2026
Published
01 Apr 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
10.86%

Description

Reliance on untrusted inputs in a security decision in Microsoft Office allows an unauthorized attacker to bypass a security feature locally.

Statistics

  • 1 Post

Last activity: 7 hours ago

Bluesky

Profile picture fallback
Patch Diffing CVE-2026-21509: Microsoft Office OLE Security Bypass
  • 0
  • 0
  • 0
  • 7h ago

Overview

  • BridgeHead Software
  • FileStore

24 Apr 2026
Published
24 Apr 2026
Updated

CVSS v4.0
CRITICAL (9.3)
EPSS
0.20%

KEV

Description

BridgeHead FileStore versions prior to 24A (released in early 2024) expose the Apache Axis2 administration module on network-accessible endpoints with default credentials that allows unauthenticated remote attackers to execute arbitrary OS commands. Attackers can authenticate to the admin console using default credentials, upload a malicious Java archive as a web service, and execute arbitrary commands on the host via SOAP requests to the deployed service.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture fallback

🔥 CVE-2026-39920: BridgeHead FileStore <24A has a CRITICAL flaw — Apache Axis2 admin exposed with default creds, allowing unauthenticated remote OS command execution. Restrict access, change creds & monitor! Patch status pending. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • Microsoft
  • Microsoft Bing

23 Apr 2026
Published
25 Apr 2026
Updated

CVSS v3.1
CRITICAL (10.0)
EPSS
0.28%

KEV

Description

Deserialization of untrusted data in Microsoft Bing allows an unauthorized attacker to execute code over a network.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

Annnnnd Bing sticks the landing with a CVSS 10.0. (* golf.freakin.clap *)

hackingpassion.com/bing-rce-cv

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • ruby
  • erb

24 Apr 2026
Published
25 Apr 2026
Updated

CVSS v3.1
HIGH (8.1)
EPSS
0.08%

KEV

Description

ERB is a templating system for Ruby. Ruby 2.7.0 (before ERB 2.2.0 was published on rubygems.org) introduced an `@_init` instance variable guard in `ERB#result` and `ERB#run` to prevent code execution when an ERB object is reconstructed via `Marshal.load` (deserialization). However, three other public methods that also evaluate `@src` via `eval()` were not given the same guard: `ERB#def_method`, `ERB#def_module`, and `ERB#def_class`. An attacker who can trigger `Marshal.load` on untrusted data in a Ruby application that has `erb` loaded can use `ERB#def_module` (zero-arg, default parameters) as a code execution sink, bypassing the `@_init` protection entirely. ERB 4.0.3.1, 4.0.4.1, 6.0.1.1, and 6.0.4 patch the issue.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
🚨 New HIGH CVE detected in AWS Lambda 🚨 CVE-2026-41316 impacts erb in 3 Lambda base images. Details: https://github.com/aws/aws-lambda-base-images/issues/484 More: https://lambdawatchdog.com/ #AWS #Lambda #CVE #CloudSecurity #Serverless
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Kludex
  • python-multipart

17 Apr 2026
Published
20 Apr 2026
Updated

CVSS v3.1
MEDIUM (5.3)
EPSS
0.02%

KEV

Description

Python-Multipart is a streaming multipart parser for Python. Versions prior to 0.0.26 have a denial of service vulnerability when parsing crafted `multipart/form-data` requests with large preamble or epilogue sections. Upgrade to version 0.0.26 or later, which skips ahead to the next boundary candidate when processing leading CR/LF data and immediately discards epilogue data after the closing boundary.

Statistics

  • 2 Posts

Last activity: 21 hours ago

Bluesky

Profile picture fallback
python3Packages.python-multipart: add patches for CVE-2026-40347 https://github.com/NixOS/nixpkgs/pull/512899 #security
  • 0
  • 0
  • 0
  • 23h ago
Profile picture fallback
[Backport staging-25.11] python3Packages.python-multipart: add patches for CVE-2026-40347 https://github.com/NixOS/nixpkgs/pull/513269 #security
  • 0
  • 0
  • 0
  • 21h ago
Showing 1 to 10 of 23 CVEs