24h | 7d | 30d

Overview

  • Amazon
  • AWS EFS CSI Driver

17 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
MEDIUM (6.5)
EPSS
0.03%

KEV

Description

Improper neutralization of argument delimiters in the volume handling component in AWS EFS CSI Driver (aws-efs-csi-driver) before v3.0.1 allows remote authenticated users with PersistentVolume creation permissions to inject arbitrary mount options via comma injection. To remediate this issue, users should upgrade to version v3.0.1

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
CVE-2026-6437 - Mount Option Injection in Amazon EFS CSI Driver #patchmanagement
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Adobe
  • Acrobat Reader

11 Apr 2026
Published
14 Apr 2026
Updated

CVSS v3.1
HIGH (8.6)
EPSS
4.56%

Description

Acrobat Reader versions 24.001.30356, 26.001.21367 and earlier are affected by an Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.

Statistics

  • 2 Posts

Last activity: 1 hour ago

Bluesky

Profile picture fallback
CVE-2026-34621 PoC isn't a scanner, it's a campaign weaponizer with 62 pre-authenticated Brazilian fintech targets
  • 0
  • 0
  • 1
  • 1h ago

Overview

  • Python Software Foundation
  • CPython

16 Mar 2026
Published
07 Apr 2026
Updated

CVSS v4.0
MEDIUM (6.0)
EPSS
0.13%

KEV

Description

The fix for CVE-2026-0672, which rejected control characters in http.cookies.Morsel, was incomplete. The Morsel.update(), |= operator, and unpickling paths were not patched, allowing control characters to bypass input validation. Additionally, BaseCookie.js_output() lacked the output validation applied to BaseCookie.output().

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-3644 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/455 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • Anviz
  • Anviz CX7 Firmware

17 Apr 2026
Published
17 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
0.06%

KEV

Description

Anviz CX2 Lite and CX7 are vulnerable to unauthenticated firmware uploads. This causes crafted archives to be accepted, enabling attackers to plant and execute code and obtain a reverse shell.

Statistics

  • 1 Post

Last activity: 21 hours ago

Fediverse

Profile picture fallback

⚠️ CRITICAL: Anviz CX7 & CX2 Lite firmware vuln (CVE-2026-35546) allows unauthenticated uploads — attackers can execute code & gain reverse shell. All versions affected. No mitigation yet. radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 21h ago

Overview

  • Pending

03 Mar 2022
Published
21 Oct 2025
Updated

CVSS
Pending
EPSS
0.09%

Description

Arm Mali GPU Kernel Driver allows a non-privileged user to achieve write access to read-only memory pages. This affects Midgard r26p0 through r31p0, Bifrost r0p0 through r35p0, and Valhall r19p0 through r35p0.

Statistics

  • 1 Post

Last activity: 19 hours ago

Bluesky

Profile picture fallback
Walkthrough of an N-day Android GPU driver vulnerability Talk by Angus about analyzing CVE-2022-22706 — a logical bug in the Mali GPU driver that allows getting write access to read-only memory. www.youtube.com/watch?v=G71d...
  • 0
  • 0
  • 0
  • 19h ago

Overview

  • Kozea
  • CairoSVG

13 Mar 2026
Published
16 Mar 2026
Updated

CVSS v3.1
HIGH (7.5)
EPSS
0.03%

KEV

Description

CairoSVG is an SVG converter based on Cairo, a 2D graphics library. Prior to Kozea/CairoSVG has exponential denial of service via recursive <use> element amplification in cairosvg/defs.py. This causes CPU exhaustion from a small input.

Statistics

  • 1 Post

Last activity: 22 hours ago

Bluesky

Profile picture fallback
Stop chasing CVEs like CVE-2026-31899. Here's an evergreen bash script to check & fix recursive DoS in CairoSVG on Ubuntu, Rocky Linux, SUSE — plus iptables mitigation if you can't update. Script + free checklist in blog. Read more:👉 tinyurl.com/4swdfcx4 #Python
  • 0
  • 0
  • 0
  • 22h ago

Overview

  • OpenSSL
  • OpenSSL

13 Mar 2026
Published
17 Mar 2026
Updated

CVSS
Pending
EPSS
0.05%

KEV

Description

Issue summary: An OpenSSL TLS 1.3 server may fail to negotiate the expected preferred key exchange group when its key exchange group configuration includes the default by using the 'DEFAULT' keyword. Impact summary: A less preferred key exchange may be used even when a more preferred group is supported by both client and server, if the group was not included among the client's initial predicated keyshares. This will sometimes be the case with the new hybrid post-quantum groups, if the client chooses to defer their use until specifically requested by the server. If an OpenSSL TLS 1.3 server's configuration uses the 'DEFAULT' keyword to interpolate the built-in default group list into its own configuration, perhaps adding or removing specific elements, then an implementation defect causes the 'DEFAULT' list to lose its 'tuple' structure, and all server-supported groups were treated as a single sufficiently secure 'tuple', with the server not sending a Hello Retry Request (HRR) even when a group in a more preferred tuple was mutually supported. As a result, the client and server might fail to negotiate a mutually supported post-quantum key agreement group, such as 'X25519MLKEM768', if the client's configuration results in only 'classical' groups (such as 'X25519' being the only ones in the client's initial keyshare prediction). OpenSSL 3.5 and later support a new syntax for selecting the most preferred TLS 1.3 key agreement group on TLS servers. The old syntax had a single 'flat' list of groups, and treated all the supported groups as sufficiently secure. If any of the keyshares predicted by the client were supported by the server the most preferred among these was selected, even if other groups supported by the client, but not included in the list of predicted keyshares would have been more preferred, if included. The new syntax partitions the groups into distinct 'tuples' of roughly equivalent security. Within each tuple the most preferred group included among the client's predicted keyshares is chosen, but if the client supports a group from a more preferred tuple, but did not predict any corresponding keyshares, the server will ask the client to retry the ClientHello (by issuing a Hello Retry Request or HRR) with the most preferred mutually supported group. The above works as expected when the server's configuration uses the built-in default group list, or explicitly defines its own list by directly defining the various desired groups and group 'tuples'. No OpenSSL FIPS modules are affected by this issue, the code in question lies outside the FIPS boundary. OpenSSL 3.6 and 3.5 are vulnerable to this issue. OpenSSL 3.6 users should upgrade to OpenSSL 3.6.2 once it is released. OpenSSL 3.5 users should upgrade to OpenSSL 3.5.6 once it is released. OpenSSL 3.4, 3.3, 3.0, 1.0.2 and 1.1.1 are not affected by this issue.

Statistics

  • 1 Post

Last activity: 5 hours ago

Bluesky

Profile picture fallback
🔍 Lambda Watchdog detected that CVE-2026-2673 is no longer present in latest AWS Lambda base image scans. https://github.com/aws/aws-lambda-base-images/issues/454 #AWS #Lambda #Security #CVE #DevOps #SecOps
  • 0
  • 0
  • 0
  • 5h ago

Overview

  • 0xJacky
  • nginx-ui

30 Mar 2026
Published
16 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.8)
EPSS
4.97%

KEV

Description

Nginx UI is a web user interface for the Nginx web server. In versions 2.3.5 and prior, the nginx-ui MCP (Model Context Protocol) integration exposes two HTTP endpoints: /mcp and /mcp_message. While /mcp requires both IP whitelisting and authentication (AuthRequired() middleware), the /mcp_message endpoint only applies IP whitelisting - and the default IP whitelist is empty, which the middleware treats as "allow all". This means any network attacker can invoke all MCP tools without authentication, including restarting nginx, creating/modifying/deleting nginx configuration files, and triggering automatic config reloads - achieving complete nginx service takeover. At time of publication, there are no publicly available patches.

Statistics

  • 1 Post

Last activity: 3 hours ago

Fediverse

Profile picture fallback

VulnCheck added CVE-2026-33032 (MCPwn) to its actively-exploited list on April 13. nginx-ui authenticates /mcp but /mcp_message has no auth middleware. Pluto Security found two HTTP requests to full Nginx takeover. 2,600 reachable instances, fix shipped a month earlier in v2.3.4. Every integration protocol I have shipped across 14 compliant platforms had this failure mode. Uniform auth on audited endpoints, absent on the one added in a hurry.

#CyberSecurity #InfoSec #DevOps #OpenSource

  • 0
  • 0
  • 0
  • 3h ago

Overview

  • MinecAnton209
  • NovumOS

18 Apr 2026
Published
18 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.0)
EPSS
0.01%

KEV

Description

NovumOS is a custom 32-bit operating system written in Zig and x86 Assembly. In versions prior to 0.24, Syscall 15 (MemoryMapRange) allows Ring 3 user-mode processes to map arbitrary virtual address ranges into their address space without validating against forbidden regions, including critical kernel structures such as the IDT, GDT, TSS, and page tables. A local attacker can exploit this to modify kernel interrupt handlers, resulting in privilege escalation from user mode to kernel context. This issue has been fixed in version 0.24.

Statistics

  • 1 Post

Last activity: 15 hours ago

Fediverse

Profile picture fallback

🚩 CRITICAL: CVE-2026-40572 impacts MinecAnton209 NovumOS < 0.24. Syscall 15 flaw allows local privilege escalation by mapping over kernel memory — patch to v0.24+ ASAP! radar.offseq.com/threat/cve-20

  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Fortinet
  • FortiSandbox

14 Apr 2026
Published
15 Apr 2026
Updated

CVSS v3.1
CRITICAL (9.1)
EPSS
0.29%

KEV

Description

A improper neutralization of special elements used in an os command ('os command injection') vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.8 may allow attacker to execute unauthorized code or commands via <insert attack vector here>

Statistics

  • 1 Post

Last activity: 10 hours ago

Bluesky

Profile picture fallback
CVE-2026-39808: Critical FortiSandbox PoC Exploit Drops – Unauthenticated Root RCE via Pipe Injection + Video Introduction: A proof‑of‑concept (PoC) exploit has been publicly released for CVE-2026-39808, a critical command injection vulnerability in Fortinet’s FortiSandbox product. The flaw allows…
  • 0
  • 0
  • 0
  • 10h ago
Showing 31 to 40 of 44 CVEs