24h | 7d | 30d

Overview

  • Google
  • Chrome

06 May 2026
Published
07 May 2026
Updated

CVSS
Pending
EPSS
0.07%

KEV

Description

Use after free in Aura in Google Chrome on Windows prior to 148.0.7778.96 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture fallback
【脆弱性情報】 CVE-2026-7911 GoogleのChromeの脆弱性について CVE-2026-7911は、Windows上のGoogle ChromeのAuraにおける「Use after free」脆弱性です。
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • Google
  • Chrome

06 May 2026
Published
07 May 2026
Updated

CVSS
Pending
EPSS
0.08%

KEV

Description

Use after free in Passwords in Google Chrome prior to 148.0.7778.96 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)

Statistics

  • 1 Post

Last activity: 15 hours ago

Bluesky

Profile picture fallback
【脆弱性情報】 CVE-2026-7921 Google Chromeの脆弱性について CVE-2026-7921は、Google Chromeの148.0.7778.96以前のバージョンにおいて、Passwords機能におけるUse after freeの脆弱性です。
  • 0
  • 0
  • 0
  • 15h ago

Overview

  • win.rar GmbH
  • WinRAR

08 Aug 2025
Published
26 Feb 2026
Updated

CVSS v4.0
HIGH (8.4)
EPSS
9.10%

Description

A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

PSA for anyone with Ukrainian-org exposure: Pterodo Wave-2 droppers chain CVE-2025-8088 + CVE-2025-6218 (WinRAR ADS path-traversal + co-exploit). Both patched in WinRAR 7.13.

A lot of UA orgs run WinRAR like a "forever tool" — installed 5 years ago, never updated. That's the soft target for this campaign.

Audit your endpoint inventory. WinRAR ≤7.12 is not a "next sprint" item.

Signatures: ESET `VBS/Pterodo.CTH trojan` on the dropped VBS implant. Florian Roth's `SUSP_RAR_NTFS_ADS` YARA on the archive itself.

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Langflow
  • Langflow

05 Dec 2025
Published
21 May 2026
Updated

CVSS v4.0
CRITICAL (9.4)
EPSS
9.49%

Description

Langflow versions up to and including 1.6.9 contain a chained vulnerability that enables account takeover and remote code execution. An overly permissive CORS configuration (allow_origins='*' with allow_credentials=True) combined with a refresh token cookie configured as SameSite=None allows a malicious webpage to perform cross-origin requests that include credentials and successfully call the refresh endpoint. An attacker-controlled origin can therefore obtain fresh access_token / refresh_token pairs for a victim session. Obtained tokens permit access to authenticated endpoints — including built-in code-execution functionality — allowing the attacker to execute arbitrary code and achieve full system compromise.

Statistics

  • 1 Post

Last activity: 2 hours ago

Bluesky

Profile picture fallback
CISAが既知の悪用された脆弱性2件をカタログに追加 CISA Adds Two Known Exploited Vulnerabilities to Catalog #CISA (May 21) CVE-2025-34291 Langflow Origin検証エラーの脆弱性 CVE-2026-34926 Trend Micro Apex One (オンプレミス) ディレクトリトラバーサル脆弱性 www.cisa.gov/news-events/...
  • 0
  • 0
  • 0
  • 2h ago

Overview

  • RARLAB
  • WinRAR

21 Jun 2025
Published
26 Feb 2026
Updated

CVSS v3.0
HIGH (7.8)
EPSS
5.69%

Description

RARLAB WinRAR Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of RARLAB WinRAR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of file paths within archive files. A crafted file path can cause the process to traverse to unintended directories. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27198.

Statistics

  • 1 Post

Last activity: 10 hours ago

Fediverse

Profile picture fallback

PSA for anyone with Ukrainian-org exposure: Pterodo Wave-2 droppers chain CVE-2025-8088 + CVE-2025-6218 (WinRAR ADS path-traversal + co-exploit). Both patched in WinRAR 7.13.

A lot of UA orgs run WinRAR like a "forever tool" — installed 5 years ago, never updated. That's the soft target for this campaign.

Audit your endpoint inventory. WinRAR ≤7.12 is not a "next sprint" item.

Signatures: ESET `VBS/Pterodo.CTH trojan` on the dropped VBS implant. Florian Roth's `SUSP_RAR_NTFS_ADS` YARA on the archive itself.

  • 0
  • 0
  • 0
  • 10h ago

Overview

  • Linux
  • Linux

08 May 2026
Published
14 May 2026
Updated

CVSS v3.1
HIGH (8.8)
EPSS
2.63%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: xfrm: esp: avoid in-place decrypt on shared skb frags MSG_SPLICE_PAGES can attach pages from a pipe directly to an skb. TCP marks such skbs with SKBFL_SHARED_FRAG after skb_splice_from_iter(), so later paths that may modify packet data can first make a private copy. The IPv4/IPv6 datagram append paths did not set this flag when splicing pages into UDP skbs. That leaves an ESP-in-UDP packet made from shared pipe pages looking like an ordinary uncloned nonlinear skb. ESP input then takes the no-COW fast path for uncloned skbs without a frag_list and decrypts in place over data that is not owned privately by the skb. Mark IPv4/IPv6 datagram splice frags with SKBFL_SHARED_FRAG, matching TCP. Also make ESP input fall back to skb_cow_data() when the flag is present, so ESP does not decrypt externally backed frags in place. Private nonlinear skb frags still use the existing fast path. This intentionally does not change ESP output. In esp_output_head(), the path that appends the ESP trailer to existing skb tailroom without calling skb_cow_data() is not reachable for nonlinear skbs: skb_tailroom() returns zero when skb->data_len is nonzero, while ESP tailen is positive. Thus ESP output will either use the separate destination-frag path or fall back to skb_cow_data().

Statistics

  • 1 Post
  • 10 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Just pushed a fresh round of updates to Jambula OS Linux including fixes and mitigations for:

✅ dirty frag (CVE-2026-43284/CVE-2026-43500)
✅ fragnesia (CVE-2026-46300)
✅ ssh-keysign-pwn (CVE-2026-46333)

Are you running a Raspberry Pi 5? This is a great time to try Jambula OS - a lightweight, secure, CLI-focused Linux platform built around a local-first service architecture.

Download image & learn more at:

jambula.org

#JambulaOS #Linux #OpenSource #RaspberryPi #SmartHome #HomeLab

  • 5
  • 5
  • 0
  • 7h ago

Overview

  • Linux
  • Linux

11 May 2026
Published
20 May 2026
Updated

CVSS v3.1
HIGH (7.8)
EPSS
1.71%

KEV

Description

In the Linux kernel, the following vulnerability has been resolved: rxrpc: Also unshare DATA/RESPONSE packets when paged frags are present The DATA-packet handler in rxrpc_input_call_event() and the RESPONSE handler in rxrpc_verify_response() copy the skb to a linear one before calling into the security ops only when skb_cloned() is true. An skb that is not cloned but still carries externally-owned paged fragments (e.g. SKBFL_SHARED_FRAG set by splice() into a UDP socket via __ip_append_data, or a chained skb_has_frag_list()) falls through to the in-place decryption path, which binds the frag pages directly into the AEAD/skcipher SGL via skb_to_sgvec(). Extend the gate to also unshare when skb_has_frag_list() or skb_has_shared_frag() is true. This catches the splice-loopback vector and other externally-shared frag sources while preserving the zero-copy fast path for skbs whose frags are kernel-private (e.g. NIC page_pool RX, GRO). The OOM/trace handling already in place is reused.

Statistics

  • 1 Post
  • 10 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Just pushed a fresh round of updates to Jambula OS Linux including fixes and mitigations for:

✅ dirty frag (CVE-2026-43284/CVE-2026-43500)
✅ fragnesia (CVE-2026-46300)
✅ ssh-keysign-pwn (CVE-2026-46333)

Are you running a Raspberry Pi 5? This is a great time to try Jambula OS - a lightweight, secure, CLI-focused Linux platform built around a local-first service architecture.

Download image & learn more at:

jambula.org

#JambulaOS #Linux #OpenSource #RaspberryPi #SmartHome #HomeLab

  • 5
  • 5
  • 0
  • 7h ago

Overview

  • Pending

Pending
Published
Pending
Updated

CVSS
Pending
EPSS
Pending

KEV

Description

This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.

Statistics

  • 1 Post
  • 10 Interactions

Last activity: 7 hours ago

Fediverse

Profile picture fallback

Just pushed a fresh round of updates to Jambula OS Linux including fixes and mitigations for:

✅ dirty frag (CVE-2026-43284/CVE-2026-43500)
✅ fragnesia (CVE-2026-46300)
✅ ssh-keysign-pwn (CVE-2026-46333)

Are you running a Raspberry Pi 5? This is a great time to try Jambula OS - a lightweight, secure, CLI-focused Linux platform built around a local-first service architecture.

Download image & learn more at:

jambula.org

#JambulaOS #Linux #OpenSource #RaspberryPi #SmartHome #HomeLab

  • 5
  • 5
  • 0
  • 7h ago

Overview

  • Apache Software Foundation
  • Apache Tomcat

09 Apr 2026
Published
10 Apr 2026
Updated

CVSS
Pending
EPSS
12.92%

KEV

Description

Padding Oracle vulnerability in Apache Tomcat's EncryptInterceptor with default configuration. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.18, from 10.0.0-M1 through 10.1.52, from 9.0.13 through 9..115, from 8.5.38 through 8.5.100, from 7.0.100 through 7.0.109. Users are recommended to upgrade to version 11.0.19, 10.1.53 and 9.0.116, which fixes the issue.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Tomcat Vulnerability Mitigation: Upgraded Apache Tomcat to version 9.0.117 to address several high-severity vulnerabilities, including CVE-2026-24734, CVE-2026-34487, and CVE-2026-29146
  • 0
  • 0
  • 0
  • 1h ago

Overview

  • Apache Software Foundation
  • Apache Tomcat Native

17 Feb 2026
Published
11 Mar 2026
Updated

CVSS
Pending
EPSS
0.09%

KEV

Description

Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat. When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed. This issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114. The following versions were EOL at the time the CVE was created but are known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected. Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue. Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.

Statistics

  • 1 Post

Last activity: 1 hour ago

Bluesky

Profile picture fallback
Tomcat Vulnerability Mitigation: Upgraded Apache Tomcat to version 9.0.117 to address several high-severity vulnerabilities, including CVE-2026-24734, CVE-2026-34487, and CVE-2026-29146
  • 0
  • 0
  • 0
  • 1h ago
Showing 71 to 80 of 81 CVEs