24h | 7d | 30d

Overview

  • Apache Software Foundation
  • Apache HTTP Server

04 May 2026
Published
05 May 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

Double Free and possible RCE vulnerability in Apache HTTP Server with the HTTP/2 protocol. This issue affects Apache HTTP Server: 2.4.66. Users are recommended to upgrade to version 2.4.67, which fixes the issue.

Statistics

  • 2 Posts
  • 4 Interactions

Last activity: 18 hours ago

Bluesky

Profile picture fallback
The latest update for #Indusface includes "CVE-2026-23918: Apache HTTP/2 Double-Free Vulnerability with Possible RCE" and "CVE-2026-42208: Pre-Authentication SQL Injection in LiteLLM Exposes API Credentials". #cybersecurity #infosec https://opsmtrs.com/3ySs2VF
  • 0
  • 2
  • 0
  • 22h ago

Overview

  • SAP_SE
  • SAP S/4HANA (SAP Enterprise Search for ABAP)

12 May 2026
Published
12 May 2026
Updated

CVSS v3.1
CRITICAL (9.6)
EPSS
0.01%

KEV

Description

SAP S/4HANA (SAP Enterprise Search for ABAP) contains a SQL injection vulnerability that allows an authenticated attacker to inject malicious SQL statements through user-controlled input. The application directly concatenates this malicious user input into SQL queries, which are then passed to the underlying database without proper validation or sanitization. Upon successful exploitation, an attacker may gain unauthorized access to sensitive database information and could potentially crash the application. This vulnerability has a high impact on the confidentiality and availability of the application, while integrity remains unaffected.

Statistics

  • 1 Post
  • 1 Interaction

Last activity: 19 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL: SQL injection (CVE-2026-34260, CVSS 9.6) in SAP S/4HANA (SAP_BASIS 751-816). Authenticated attackers can access sensitive data & crash apps. No patch yet — restrict access & monitor logs. radar.offseq.com/threat/cve-20

  • 1
  • 0
  • 0
  • 19h ago

Overview

  • multiparty
  • multiparty

12 May 2026
Published
12 May 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.04%

KEV

Description

multiparty@4.2.3 and lower versions are vulnerable to denial of service via regular expression backtracking in the Content-Disposition filename parameter parser. A crafted multipart upload with a long header value can cause regex matching to take seconds, blocking the event loop. Impact: any service accepting multipart uploads via multiparty is affected. Workarounds: limiting upload sizes at the proxy or gateway layer reduces but does not eliminate the attack surface, since a small header of around 8 KB is sufficient to trigger the vulnerable backtracking. Upgrade to multiparty@4.3.0 or higher.

Statistics

  • 2 Posts
  • 1 Interaction

Last activity: 15 hours ago

Fediverse

Profile picture fallback

🚨 High-severity security fix in multiparty@4.3.0 just released!

Patches CVE-2026-8159 — multiparty vulnerable to ReDoS via filename parsing

github.com/pillarjs/multiparty

  • 0
  • 1
  • 1
  • 15h ago

Overview

  • SAP_SE
  • SAP Commerce cloud configuration

12 May 2026
Published
12 May 2026
Updated

CVSS v3.1
CRITICAL (9.6)
EPSS
0.02%

KEV

Description

Due to improper Spring Security configuration, SAP Commerce cloud allows an unauthenticated user to perform malicious configuration upload and code injection, resulting in arbitrary server-side code execution, leading to high impact on Confidentiality, Integrity, and Availability of the application.

Statistics

  • 1 Post

Last activity: 20 hours ago

Fediverse

Profile picture fallback

🚨 CRITICAL (CVSS 9.6): CVE-2026-34263 hits SAP Commerce Cloud (HY_COM 2205, COM_CLOUD 2211/JDK21). Unauthenticated attackers can upload configs & inject code — full server compromise risk. Monitor & restrict config uploads! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 20h ago

Overview

  • n8n-io
  • n8n

04 May 2026
Published
04 May 2026
Updated

CVSS v4.0
HIGH (8.7)
EPSS
0.11%

KEV

Description

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, the MCP OAuth client registration endpoint accepted unauthenticated requests and stored client data without adequate resource controls. An unauthenticated remote attacker could exhaust server memory resources by sending large registration payloads, rendering the n8n instance unavailable. The MCP enable/disable toggle gates MCP access but did not restrict client registrations, meaning the endpoint is reachable regardless of whether MCP access is enabled on the instance. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Checkmarx Zero researcher Ori Ron reported this unauthenticated DoS issue to n8n, who responded promptly with a fix and coordinated disclosure as #CVE-2026-42236 (CVSS v4.0 = 8.7).
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Microsoft
  • Windows 10 Version 1507

08 Jul 2025
Published
13 Feb 2026
Updated

CVSS v3.1
MEDIUM (6.8)
EPSS
0.46%

KEV

Description

Acceptance of extraneous untrusted data with trusted data in Windows BitLocker allows an unauthorized attacker to bypass a security feature with a physical attack.

Statistics

  • 1 Post

Last activity: 17 hours ago

Bluesky

Profile picture fallback
CVE-2025-48804 Exposed: How the ‘BitUnlocker’ Downgrade Attack Shatters Windows 11 BitLocker Encryption in Under 5 Minutes + Video Introduction A newly weaponized proof-of-concept (PoC) tool named "BitUnlocker" has demonstrated that even fully patched Windows 11 systems with BitLocker enabled are…
  • 0
  • 0
  • 0
  • 17h ago

Overview

  • Linux
  • Linux

08 May 2026
Published
11 May 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
0.01%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Statistics

  • 2 Posts

Last activity: 15 hours ago

Fediverse

Profile picture fallback

Dirty Frag: Linux Kernel Local Privilege Escalation via ESP and RxRPC
Unpatched kernel flaw chain (CVE-2026-43284, CVE-2026-43500) enables root escalation on major Linux distributions.

wiz.io/blog/dirty-frag-linux-k

  • 0
  • 0
  • 0
  • 17h ago

Bluesky

Profile picture fallback
Linuxの新たな脆弱性「Dirty Frag」 攻撃で悪用されている可能性(CVE-2026-43284、CVE-2026-43500) | Codebook|Security News https://codebook.machinarecord.com/threatreport/silobreaker-cyber-alert/45540/
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post

Last activity: 8 hours ago

Bluesky

Profile picture fallback
Zoomに、Lowの脆弱性情報 ZSB-26006 が公開されました。 「CVE-2026-30904 : Zoom Workplace for iOS - Protection Mechanism Failure」 CVSSv3: 1.8 → https://www.zoom.com/en/trust/security-bulletin/ZSB-26006/
  • 0
  • 0
  • 0
  • 8h ago

Overview

  • Ingeteam
  • Ingecon Sun EMS Board

12 May 2026
Published
12 May 2026
Updated

CVSS v4.0
CRITICAL (9.2)
EPSS
0.03%

KEV

Description

Insecure generation of credentials in the local SAT (Technical Support) access functionality of the Ingecon Sun EMS Board. The vulnerability arose because the secret access credentials were not based on a secure cryptographic scheme, but rather on a weak hashing algorithm, which could allow an attacker to carry out a privilege escalation.

Statistics

  • 1 Post

Last activity: 13 hours ago

Fediverse

Profile picture fallback

🔴 CVE-2026-8072 (CRITICAL, 9.2): Ingeteam Ingecon Sun EMS Board uses weak hashing for SAT access credentials, risking privilege escalation. No mitigation yet — review access and monitor for updates. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 13h ago

Overview

  • Microsoft
  • .NET 10.0

12 May 2026
Published
12 May 2026
Updated

CVSS v3.1
HIGH (7.3)
EPSS
Pending

KEV

Description

Improper input validation in .NET allows an unauthorized attacker to elevate privileges locally.

Statistics

  • 1 Post

Last activity: 3 hours ago

Bluesky

Profile picture fallback
Microsoft May 2026 Patch Tuesday fixes 120 flaws, no zero-days https://www.europesays.com/uk/955486/ Tag CVE ID CVE Title Severity .NET CVE-2026-35433 .NET Elevation of Privilege Vulnerability Important …#uk #news #uknews
  • 0
  • 0
  • 0
  • 3h ago
Showing 11 to 20 of 60 CVEs