Overview
- Palo Alto Networks
- Cloud NGFW
Description
Statistics
- 2 Posts
- 1 Interaction
Fediverse
Palo Alto Auth Bypass
#threatintel #cve
https://security.paloaltonetworks.com/CVE-2026-0265
Overview
- Canon Marketing Japan Inc.
- GUARDIANWALL MailSuite (On-premises version)
Description
Statistics
- 2 Posts
Fediverse
🚨 CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26). Remote code execution possible. Restrict network access & monitor pop3wallpasswd. Patch pending. https://radar.offseq.com/threat/cve-2026-32661-stack-based-buffer-overflow-in-cano-fe8551b1 #OffSeq #CVE202632661 #infosec #vuln
Overview
Description
Statistics
- 2 Posts
Fediverse
Wazuh – CVE-2026-30893 : un patch est disponible pour cette faille critique https://www.it-connect.fr/wazuh-cve-2026-30893-un-patch-est-disponible-pour-cette-faille-critique/ #ActuCybersécurité #Cybersécurité #Vulnérabilité
Overview
Description
Statistics
- 2 Posts
Bluesky
Overview
- ollama
- ollama
- ollama/ollama
Description
Statistics
- 1 Post
- 8 Interactions
Fediverse
Ollama fixed CVE-2026-7482 in v0.17.1, a critical out-of-bounds read flaw that could leak API keys, prompts, and chat data from exposed servers via crafted GGUF files. 🔓
Researchers also disclosed unpatched Windows update flaws enabling persistent code execution through unsigned updates and path traversal in Ollama 0.12.10–0.17.5. ⚠️
🔗 https://thehackernews.com/2026/05/ollama-out-of-bounds-read-vulnerability.html
#TechNews #Ollama #LLM #AI #Cybersecurity #OpenSource #FOSS #Privacy #Infosec #Windows #Linux #Security #Servers #DataBreach #Technology
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Fediverse
CISA Adds CVE-2026-32202 to KEV Catalog as APT28 Actively Exploits Zero-Click Windows Shell Flaw
#CyberSecurity
https://securebulletin.com/cisa-adds-cve-2026-32202-to-kev-catalog-as-apt28-actively-exploits-zero-click-windows-shell-flaw/
Overview
Description
Statistics
- 1 Post
- 5 Interactions
Fediverse
If you use #dnsmasq on @fedora or @centos Stream - be aware that there are recently disclosed CVEs - https://www.kb.cert.org/vuls/id/471747
@SUSE at least rates one of them a 9.2 on the CVSS 4.0 scale
https://www.suse.com/security/cve/CVE-2026-2291.html
Fedora updates for stable releases are about to hit testing: https://bodhi.fedoraproject.org/updates/?search=dnsmasq-2.92rel2
and if you have the #CentOSHyperscale repo enabled you can `sudo dnf install centos-release-hyperscale-testing && sudo dnf update 'dnsmasq*'`
Please give feedback for the Fedora builds and for the Hyperscale ones if you give them a spin!
https://gitlab.com/CentOS/Hyperscale/rpms/dnsmasq/-/work_items/1
As of the time of posting there is no advisory from #RedHat yet
Overview
Description
Statistics
- 1 Post
- 4 Interactions
Overview
- opnsense
- core
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
🚨 CVE-2026-44194 (CVSS 9.1): OPNsense core <26.1.8 is vulnerable to OS command injection via sync_user.php. Authenticated users with user-management rights can gain root. Update to 26.1.8 ASAP. https://radar.offseq.com/threat/cve-2026-44194-cwe-78-improper-neutralization-of-s-a7008329 #OffSeq #OPNsense #Vuln #BlueTeam
Overview
- Microsoft
- Microsoft Teams
Description
Statistics
- 1 Post
- 2 Interactions
Fediverse
CVE-2026-21535: unauthenticated info disclosure in Microsoft Teams. Network access is all an attacker needs, no credentials at all. The app sitting open on every corporate laptop right now. Go patch it. https://www.bleepingcomputer.com/news/microsoft/microsoft-may-2026-patch-tuesday-fixes-120-flaws-no-zero-days/